Match Document Document Title
8456670 Printing device and printing system for controlling authentication print jobs  
A printing device includes a processor, an attribute managing part configured to be activated by the processor to communicate with a host device and to control an authentication printing job...
8458467 Method and apparatus for adaptive application message payload content transformation in a network infrastructure element  
Application message payload data elements are transformed within a network infrastructure element such as a packet data router or switch. The network element has application message transformation...
8457315 Pilot transmission in a wireless communication system  
Techniques for transmitting pilot and traffic data are described. In one aspect, a terminal may scramble its pilot with a scrambling sequence generated based on a set of static and dynamic...
8458472 Authentication method and communications system used for authentication  
An authentication method authenticates between subscribers of a communications system using an asymmetric elliptic curve encryption algorithm. The method involves providing a first and at least...
8452959 Method and system for registering a presence user with a presence service  
A method, performed by a registrar of a presence service, for registering a user with a presence service. The method entails negotiating a key with a client device operated by the user in order to...
8453260 Unit using OS and image forming apparatus using the same  
A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with its own operating system (OS), which...
8452975 Signature and verification method, signature generation device, and signature verification device  
The present invention provides a signature generation device and a signature verification device capable of countering a transcript attack that seeks a private key by analyzing a plurality of...
8453224 Single sign-on authentication  
Apparatus, systems, and methods may operate to receive a request from a node to provide access to a web site, to provide site authenticity information associated with the web site to the node, and...
8452964 Method for providing confidentiality protection of control signaling using certificate  
A method of enabling a mobile station (MS) to perform initial ranging in a wireless communication system includes transmitting a first message to a base station (BS), the first message comprising...
8453240 System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment without comprising security  
A secure communication module that accepts a cryptographic message if a nonce value for the received message is greater than the largest nonce value yet seen. If the received nonce value is not...
8452972 Methods and systems for encoding and protecting data using digital signature and watermarking techniques  
Systems and methods are provided for protecting and managing electronic data signals. In one embodiment a strong watermark is inserted in a data signal that is divided into a sequence of blocks,...
8452016 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
8452962 Method and apparatus for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture  
A method and apparatus that simulates a workflow and analyzes the behavior of information assurance attributes through a data providence architecture is disclosed. The method may include injecting...
8453207 Methods and systems for improving the security of secret authentication data during authentication transactions  
A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled...
8452961 Method and system for authentication between electronic devices with minimal user intervention  
A method and system for authentication between electronic devices with reduced user intervention is provided. An authentication process for electronic devices (e.g., CE devices) establishes...
8452954 Methods and systems to bind a device to a computer system  
Methods and systems to bind a computer device to one or more computer systems, such that only an authorized computer system may access a protected portion of the device. A processor within the...
8447980 System and method for processing encoded messages for exchange with a mobile data communication device  
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is...
8447981 Method and system for generating and distributing mobile IP security key after re-authentication  
A method for generating and distributing MIP security key after Re-Authentication, including: an AAA Server generates an EMSK during a Re-Authentication process; the MS generate a new first MIP...
8447979 Method and apparatus for binding update between mobile node and correspondent node  
A method and apparatus for binding update between a mobile node and a correspondent node is disclosed. The method includes: encrypting, by the correspondent node, a parameter for generating a...
8448225 Login process apparatus, login process method, and program  
An authority group definition that defines a combination of utilization authorities as an authority group, user information required to register local user information or to convert externally...
8443194 Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system  
The invention relates to a method of authentication and session key agreement for secure data transmission between a first and second data communication entity in an electronic data transmission...
8443195 Method and apparatus for performing security communication  
Provided is a method of performing secured communication. In the method, a secured communication request for performing secured communication is received from the second device, a security key...
8442225 Method and system for the secured distribution of audiovisual data by transaction marking  
The application relates to a method for distributing a marked audiovisual sequence from a nominal audiovisual sequence, said nominal audiovisual sequence having a nominal content, wherein a first...
8442236 Method for communicating entitlement data from a server, related server, client systems and computer program product  
A server communicates a set of entitlement data representative of the entitlement of a client to access corresponding contents data by using a set of keys and a non-invertible cryptographic...
8441988 Method for providing home agent geographic redundancy via a service redundancy protocol  
Methods and systems for providing redundancy in servicing packet data communications within wireless mobile data networks are disclosed. More particularly, the method and system provide a...
8443448 System and method for detection of non-compliant software installation  
A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules...
8437802 Methods and systems for identity management in wireless devices  
Methods and devices for allowing a wireless communication device (1301) initially unauthorized for communication with a network to obtain persistent soft network subscription credential...
8437578 Digital anti-counterfeiting software method and apparatus  
This invention relates generally to a method and apparatus, as implemented by a software program on a computer system, for digitally producing counterfeit-deterring scrambled or encoded indicia...
8438395 Digitally watermarking documents associated with vehicles  
The present invention provides steganographically embedded auxiliary data in motor vehicle documentation. The auxiliary data is used to authenticate the documentation or provide additional or...
8438632 Image processing device  
A low-cost Multi Function Peripheral (MFP) prevents a user from forgetting to cancel an authenticated state. The MFP includes a scanner unit, a printer unit, a touch screen, and a reset key for...
8438388 Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network  
A method and apparatus for distributing Certificate Revocation List (CRL) information in an ad hoc network are provided. Ad hoc nodes in an ad hoc network can each transmit one or more certificate...
8433909 One-to-many electronic signature process  
Aspects of the invention include methods and systems for electronically signing a plurality of documents, such as an insurance application, a loan application, a set of mortgage papers, a bank...
8434156 Method, access node, and system for obtaining data  
The present invention discloses a method, an access node, and a system for obtaining data. The method includes: receiving a data obtaining request sent by a client and obtaining an authentication...
8434127 Access control system, access control method, electronic device and control program  
Provided is the access control system for controlling an access on a task basis without modifying a device side to be accessed and without applying a task ID at each access to a device. The access...
8433917 Access control system, access control device, program and recording medium  
Effective utilization of a database while protecting a data provider's privacy is accomplished by an access control system which controls access to a database in which open information and secret...
8434136 Full spectrum cyber identification determination process  
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber...
8429414 Apparatus and method of generating and detecting prevention and control data for verifying validity of data  
A method of generating prevention and control data to verify validity of data to be transmitted, and an apparatus to perform the method, the method including generating the prevention and control...
8429730 Authenticating users and on-line sites  
A method and system enables a user and/or an on-line site to be authenticated by comparing a received password with an expected password, transmitting a new password if the received and expected...
8424065 Apparatus and method of identity and virtual object management and sharing among virtual worlds  
A system for centrally managing credential information of a user and a virtual object of a user across a plurality of virtual world (or corresponding virtual world servers) is disclosed. The...
8423770 Method and system for providing secure codes for marking on items  
A method and system for creating a group of marking codes for marking items in a code generation and validation system and validating the marking codes. The code generation and validation system...
8424080 Electronic device and authentication method of electronic device  
An authentication method of an electronic device is disclosed. A plurality of key inputs is received from a user via activation of input keys. At least one key input from the key inputs is...
8423437 Certified email system and method  
A certified email system for providing a time stamp for a presented file, particularly when the presented file is an email. Preferably a demanding party receives the email; generates a unique...
8417259 Localized detection of mobile devices  
Various aspects are disclosed herein for detection of mobile devices. Detection of mobile devices can be localized to an environment that is radio frequency enclosed. Within this environment, any...
8417390 Code replacement for irrigation controllers  
Described herein are several embodiments relating to modular irrigation controllers. In many implementations, methods of implementing irrigation control are provided that detect a presence of a...
8417951 Roaming authentication method based on WAPI  
A roaming authentication method based on WAPI. The present invention includes the steps of adopting a terminal and a wireless access point to initiate a WAPI security mechanism, relating the...
8418234 Authentication of a principal in a federation  
Methods, systems, and computer program products are disclosed that give entities flexibility to implement custom authentication methods of other entities for authentication of a principal in a...
8418224 Information processing apparatus, information processing method, and program  
Disclosed is a technique which aims to suitably limit access to stored information from an external apparatus which is not permitted to access the information. An information processing apparatus...
8412944 Document certification system and method  
A professional subscriber station, a document authority station and a client station are provided. The professional subscriber station has a first electronic device for creating a document for...
8412937 Method and system for authentication of a low-resource prover  
A method is presented for enabling authentication of a prover in a Radio Frequency Identification system comprising the prover and a verifier, the method comprising the steps of: the prover...
8412941 Secure data exchange technique  
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party...