Match Document Document Title
8412938 Zero-knowledge based authentication method, system, and apparatus  
In the fields of data security and system reliability and qualification, this disclosure is of a method, system and apparatus for verifying or authenticating a device to a host using a...
8412250 Methods and systems for slow associated control channel signaling  
Methods and systems for slow associated control channel signaling are disclosed. An example method for securing communications in a mobile network disclosed herein comprises transmitting a first...
8412942 Method and system for seamless SSID creation, authentication and encryption  
Using an identifier generation algorithm, a device coupled to a communication network generates an SSID and associated encryption key for a mobile device using its unique identifier. The...
8413220 System and method for user authentication  
A method for user authentication involves initiating an authentication process, receiving images associated with the authentication process, selecting an image from the images to generate a...
8407479 Data authentication and tamper detection  
One embodiment includes a method that includes receiving an ephemeral value from a challenging device. The method also includes retrieving data whose content is presumed known to the challenging...
8407474 Pre-authentication method, authentication system and authentication apparatus  
A pre-authentication method and an authentication system related to the mobile communications field are disclosed. The pre-authentication method includes: when a mobile node (MN) enters a visited...
8406733 Automated device provisioning and activation  
Devices and methods for receiving control-plane communications from a network element over a secure service control link are disclosed. The network element includes a service control server link...
8407486 Sending and releasing pending messages  
Releasing pending messages is provided. An electronic message is received via a network from a sending client device. The electronic message includes a request to place the electronic message in a...
8402274 System and method of sharing contents data in network  
A technique for sharing contents data in a network. In order to easily share the contents data in the network without using a physical media apparatus or a personal computer, a contents data...
8400260 System and method for securing authorized access by a mobile data device of a document processing device  
The subject application is directed to securing authorized access to a document processing device. Address information data associated with each mobile data device is first stored in a data...
8402516 Apparatus and method for establishing a peer-to-peer communication session with a host device  
An apparatus and method of establishing a peer-to-peer communication session between a host device and a client device. Routing information of the host device is received from a server via a wide...
8401195 Method of automatically populating a list of managed secure communications group members  
Methods of automatically populating a secure group list in a key variable loader and of providing keys to a secure group are presented. After a user selects a secure group and encryption algorithm...
8402515 Apparatus and method for establishing a peer-to-peer communication session with a client device  
An apparatus and method of establishing a peer-to-peer communication session between a host device and a client device. Routing information of the client device is received from the server by a...
8396934 Communication method and apparatus for the efficient and reliable transmission of TT ethernet messages  
The goal of the present invention is to improve the useful data efficiency and reliability in the use of commercially available ETHERNET controllers, in a distributed real time computer system, by...
8396211 System and method for dynamic modification of allowable electronic message properties  
A system and method for dynamically and automatically updating the appropriate fields on the message application screen of an electronic message to show which of the appropriate service book,...
8392971 Techniques for authenticating access to a private account at a public computing device using a user's mobile computing device  
A computer-implemented method technique is presented. The technique can include selectively initiating, at a mobile computing device including one or more processors, communication between the...
8392716 Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method  
An initiator shares y_ir with a responder, calculates HASH_I on the basis of y_ir, and sends HASH_I to an IKE proxy server. The initiator receives a digital signature SIG_S generated for HASH_I...
8392711 Staged establishment of secure strings of symbols  
A multi-stage technique of establishing a plurality of secure strings of symbols is disclosed. In the first stage, the illustrative embodiment establishes a first-stage string of symbols with each...
8391495 Secure shell used to open a user's encrypted file system keystore  
The present invention provides a computer implemented method, apparatus, and data processing system for associating a private part of a keystore of a user with a user authentication process in an...
8386784 Apparatus and method for securely submitting and processing a request  
An apparatus and a method for securely submitting a request and an apparatus and a method for securely processing a request. The apparatus for securely submitting a request includes a request...
8386781 Unit using OS and image forming apparatus using the same  
A chip mountable on a replaceable unit used in an image forming job is disclosed. The chip includes a central processing unit (CPU) to perform at least one of authentication and cryptographic data...
8386776 Certificate generating/distributing system, certificate generating/distributing method and certificate generating/distributing program  
In a certificate generating/distributing system, an authentication apparatus includes token transmitting means transmitting, to a service mediating apparatus, a certificate generation request...
8386775 Tolerant key verification method  
A tolerant key verification method is provided. The tolerant key verification method comprises the following steps. A first key is generated instantly according to first characteristic values from...
8386782 Authenticated group key agreement in groups such as ad-hoc scenarios  
The invention provides a method, system, device and computer program product for setting up a secure session among three or more devices or parties of a communication group, including...
8385207 Method and apparatus for end-to-end network congestion management  
The invention provides a method and apparatus for network congestion management. The method includes inserting a probe frame into data traffic in the network from a first endpoint in the network,...
8379819 Indexing recordings of telephony sessions  
Improved indexing of telephony sessions is achieved by: (a) receiving, during the recording of the telephony session or during a playback of the recording, an indication including parameters which...
8380980 System and method for providing security in mobile WiMAX network system  
A system for providing security in a mobile Microwave Access (WiMAX) network system is constructed with a licensed certification authority providing a certificate and a first encryption module...
8380991 Hash function based on polymorphic code  
In the field of computer data security, a hash process which is typically keyless and embodied in a computing apparatus is highly secure in terms of being resistant to attack. The hash process...
8374341 Hash function using a cue sports game process  
In the computer data security field, cryptographic hash function processes embodied in a computer system and which are typically keyless, but are highly secure. The processes are based on the type...
8375211 Optimization of signing soap body element  
An XML digital signature mechanism for providing message integrity. A sending party serializes a source XML document into a serialized byte array, calculates the source offset and length of the...
8370630 Client device, mail system, program, and recording medium  
A mail system having high security is realized by mounting TCP2 for mail communication between client apparatuses. The present invention relates to a mail communication system which is connected...
8369521 Smart card based encryption key and password generation and management  
An apparatus can include a smart card based encryption key management system used to generate an encryption key using encryption key seed material, and an encryption key data store to store the...
8368516 Secure data exchange with a transponder  
A method includes transmitting, from a base station, a first request and receiving, from a transponder, a first code transmitted responsive to the first request. The method includes transmitting,...
8370503 Authentication option support for binding revocation in mobile internet protocol version 6  
A network component comprising at least one processor configured to implement a method comprising sending a message comprising an authentication mobility option to a mobile node, wherein the...
8364951 System for digital rights management using distributed provisioning and authentication  
A digital rights management system (DRM) for restricting and permitting content access in a digital content distribution network such as a network used to deliver television programming. The DRM...
8360874 Dynamic gaming library  
A method for casino operators and/or players to instantly “create” new games without requiring recertification by a gaming laboratory. New games are created on the fly by making combinations of...
8364962 Communication data freshness confirmation system  
A receiving device sends challenge information to a transmitting device. The transmitting device initializes a time varying parameter and transmits communication data together with data derived...
8359394 Tearing and conformal transformation human interactive proof  
The HIP creation technique described herein pertains to a technique for creating a human interactive proof (HIP) by applying tearing and/or a conformal transformation to a string of characters...
8359470 Increased security during network entry of wireless communication devices  
What is disclosed is a method of operating a wireless communication system. The method includes exchanging wireless communications between a wireless access node and a wireless communication...
8359469 One way authentication  
A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols....
8356178 Method and apparatus for authenticated data storage  
A method includes: computing a first message authentication code for each of a plurality of sets of data blocks on a data storage medium, and authenticating the sets of data blocks by computing a...
8356179 Entity bi-directional identificator method and system based on trustable third party  
An entity bi-directional identification method and system based on a trustable third party thereof are provided. The system comprises a first entity, which is for sending a first message to a...
8356176 Method and system for authenticating peer devices using EAP  
A system and method for authenticating a peer device onto a network using Extensible Authentication Protocol (EAP). The key lifetime associated with the keying material generated in the peer...
8356182 Electronic signature system and electronic signature verifying method  
A key creating device creates a first public key and a first secret key of the electronic signature method satisfying the noncounterfeitability and a second public key and the first secret key of...
8352598 Method of providing completely automated public turing test to tell computer and human apart based on image  
Disclosed is a method of providing a completely automated public turing test to tell a computer and a human apart (CAPTCHA) based on image. The method comprises the steps of: storing a plurality...
8353015 Trusted internet identity  
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the...
8352603 Limiting resources consumed by rejected subscriber end stations  
A method performed in a network element coupled between a subscriber end station and an AAA server for avoiding AAA processing by at least temporarily suppressing AAA access-request messages for a...
8352740 Secure execution environment on external device  
A device, such as a smartcard, may be externally-connected to a host platform and may be used to enhance or extend security services provided by the host platform's Trusted Platform Module (TPM)....
8344885 Container with interior enclosure of composite material having embedded security element  
An apparatus is disclosed including one or more security structures. The one or more security structures includes: a weldable frame; a plurality of composite panels, each panel securable to the...
8345313 Image forming apparatus, method and control program, for enabling image formation of a valid print object while disabling image formation of an invalid print object on a page including a plurality of print objects  
There is described an image forming apparatus, which make it possible to appropriately print each of a valid print object and an invalid print object. The apparatus includes: a printing section to...