Match Document Document Title
8510574 Network apparatus and communication controlling method  
Disclosed is a network apparatuses, which makes it possible to effectively re-establish the cryptographic communication without increasing its processing burden and deteriorating the security...
8510819 System and method for managing and securing mobile devices  
Systems and methods are provided for securing at least one mobile device. A server includes a controller and a non-transitory computer readable medium storing instructions executable by the...
8510557 Secure message and file delivery  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8504836 Secure and efficient domain key distribution for device registration  
A domain key is securely distributed from a device in an existing network to a device outside the network. Each device generates the session key on its own using the first random number, the...
8504829 Certification system in network and method thereof  
A certification system connected to a radio communication system which includes a device configured to perform a first certification based on first information received via the radio communication...
8504840 Content defacement protection system  
A method and mechanism for protecting a website against defacement are provided. A content owner may associate content with a digital signature. The digital signature allows a recipient of the...
8504626 System and method for content tagging and distribution through email  
A system and method for content tagging and distribution through email are provided. A user-to-tag record including content tags, each associated with one or more users, is maintained. An incoming...
8504810 Remote PC bootup via a handheld communication device  
A method computer usable medium and computer system circuitry are disclosed for starting or “booting up” a computer from a remote location using a remote command device such as a cellular...
8503679 Short message encryption  
A method and system for securely communicating information via a low bandwidth channel uses encryption that adds comparatively little overhead to the size of the transmission. This method and...
8499156 Method for implementing encryption and transmission of information and system thereof  
The invention discloses a method for implementing encryption and transmission of information and system thereof. The method comprises the following steps when a sender sends information to a...
8499332 Electronic board provided with security functions and method for ensuring electronic board security  
An electronic card is disclosed including circuits of the protected zone include at least one control circuit. The electronic card further includes another zone defining a non-protected...
8499160 Public key encryption with digital signature scheme  
An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process....
8499061 Method for inserting a new device in a community of devices  
The invention relates to a method for inserting a new device in a community of devices wherein each device of the community is able to store insertion requests received from at least one new...
8499151 Secure platform voucher service for software components within an execution environment  
Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor,...
8499045 Systems and methods for protecting header fields in a message  
Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In...
8495375 Methods and systems for secure channel initialization  
Methods and systems for secure channel initialization between a client network element and a server network element are disclosed. In accordance with one embodiment of the present disclosure, the...
8495757 System and method for placing an electronic apparatus into a protected state in response to environmental data  
A system and method is disclosed for placing an electronic apparatus into a protected state in response to environmental data. The method discloses: receiving a set of environmental data...
8494165 Secure communications between devices using a trusted server  
A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes receiving a first request from the first mobile computing device...
8495381 Authenticated remote PIN unblock  
This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise,...
8495752 AV server device, TV receiver incorporating AV server and personal computer incorporating AV server  
There is provided an AV server device in a home network for enabling transmission/reception of an AV content between digital AV apparatuses connected with communication interfaces of different...
8495751 Systems and methods for controlling access to content distributed over a network  
A computer-implemented method is provided for controlling use of a file on a user device. The method includes transmitting authentication information to a system and downloading the file from the...
8490198 Techniques for local personalization of content  
Techniques for the local personalization of content are presented. A content personalization service is dynamically pushed from a server environment to a client processing environment associated...
8489874 Encryption STE communications through private branch exchange (PBX)  
A reach back secure communications terminal includes a digital PBX adapter that offers immediate and secure voice, data and video connectivity over any of various commercially available PBX...
8489886 Double authentication for controlling disruptive operations on storage resources  
A method, data processing system and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system...
8489878 Communication across domains  
Communication across domains is described. In at least one implementation, a determination is made that an amount of data to be communicated via an Iframe exceeds a threshold amount. The data is...
8490161 Methods, systems and computer program products for provisioning VLAN services in a network  
Provisioning VLAN services in a network patching system includes receiving a request to provide a VLAN service to an individual communication channel, determining whether a switch connector port...
8484723 Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer  
A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may...
8484467 Authentication in communications networks  
The invention relates to a method of authenticating a user equipment in a communications network. The method involves sending a message from a network entity to the user equipment. This message...
8484472 System and method of filtering unsolicited messages  
A secure correlation identifier (SCID) for authentically correlating notifications received from event sources with subscriptions, a SCID authentication system and method of filtering unsolicited...
8478989 Method and apparatus to authenticate and authorize user access to a system  
A method, apparatus, and system are provided for authenticating a user. According to one embodiment, a request for authentication of a user is received via a secondary site, the request for...
8478266 Method and system for anonymous operation of a mobile node  
A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous...
8479269 Method and system for redirecting unauthorized wireless communication devices away from a femtocell  
Methods and systems are disclosed for reducing a number of unauthorized wireless communication devices (WCDs) using a femtocell. A femtocell may transmit a pilot beacon on a macro-network carrier,...
8474004 System for implementing security on telecommunications terminals  
A system includes at least one telecommunications terminal having data processing capabilities, the telecommunications terminal being susceptible of having installed thereon software applications,...
8473745 Rights enforcement and usage reporting on a client device  
An integrity hash is obtained of rights information stored at a client device. The rights information is associated with content stored at the client device. The integrity hash is encrypted using...
8474026 Realization of access control conditions as boolean expressions in credential authentications  
A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may...
8473744 Methods and systems for unilateral authentication of messages  
Disclosed is an authentication mechanism that enables an information recipient to ascertain that the information comes from the sender it purports to be from. This mechanism integrates a...
8473738 Mode of information transmission and complex protection  
The mode is intended for application in simplex and duplex channels of arbitrary including low, quality with implementation of tasks for complex protection of information. The unified signal...
8468343 System and method for securing wireless transmissions  
A system and method for securing wireless transmissions is provided. A method for transmitting secure messages includes selecting a bin of codewords from a plurality of bins. The bin of codewords...
8468351 Digital data authentication  
A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a...
8468348 Closed loop communication  
Disclosed are various embodiments of a system. In one embodiment, among others, a method comprises intercepting a communication between a first party and a second party in a communication forum,...
8468578 Establishing access controls in a premise-based environment  
Establishing access controls includes establishing a communication session between an unrecognized user identity of a user device and a destination system through an online access provider device...
8468355 Multi-dimensional credentialing using veiled certificates  
In accordance with certain embodiments of the present disclosure, a method for creating a veiled certificate is provided. The method comprises requesting a certificate from a regulator by sending...
8463938 Address couplet communication filtering  
A method, apparatus, and system are disclosed that provide an approved address couplet listing for communication handling. An inbound communication including sender and recipient field entries may...
8464058 Password-based cryptographic method and apparatus  
A password-based cryptographic method is effected between a first party with a specified identity and secret password and a second party with a master secret. During a registration phase, a...
8463710 System and method for processing tokenless biometric electronic transmissions using an electronic rule module clearinghouse  
Herein is described a tokenless biometric method for processing electronic transmissions, using at least one user biometric sample, an electronic identicator and an electronic rule module...
8464059 System and method for device bound public key infrastructure  
Techniques are provided secured communication of data, such as in the context of a public key infrastructure (PKI). In one embodiment, the technique may involve using a private key that is bound...
8458273 Content rights management for document contents and systems, structures, and methods therefor  
A document comprises a body having at least one defined portion therein, each defined portion being represented in the body of the document as a body object, each of the document and each body...
8458474 Method of authenticating an entity by a verification entity  
A method of authenticating an entity by a verification entity, said entities sharing a pair of secret keys X and Y which are n×m (n, m>i) binary matrices. The method may be applied to...
8458477 Communication with non-repudiation  
Apparatus, systems, and methods may operate to compare a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at...
8458470 Authentication in data management  
Systems and methods for authentication in a data management system are provided. In one embodiment, the method comprises identifying a plurality of data ciphers based on a pre-defined set of...