Match Document Document Title
8347091 Authenticator apparatus  
An authenticator apparatus which makes it difficult for an unauthorized user to masquerade and enhances safety includes an authenticating information holding unit (102) previously stores...
8342944 Persistent state systems, methods and software  
In one example embodiment, a wagering game system includes at least one wagering game computer program operative on the wagering game platform to detect a wager. A persistent state manager...
8347095 System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison  
A sending device prepares a key for each electronic message sent by the device by applying an algorithm to specified data in the message and then incorporates the key in the message. A receiving...
8347096 Authentication token with incremental key establishment capacity  
The present invention relates to the field of strong authentication tokens and more specifically to methods and apparatus employing cryptographic key establishment protocols for such strong...
8347077 Authenticating a registration request with a mobility key provided to an authenticator  
Authenticating a registration request from a mobile node includes an authenticator operable to facilitate a communication session for the mobile node. Access authentication to provide the mobile...
8347093 Privacy preserving name verification  
Aspects of the invention pertain to preserving the privacy of users in on-line systems while also enabling verification that the users are who they purport to be. Confidential personal information...
8341705 Method, apparatus, and computer product for managing operation  
Administrative right information corresponding to a domain and a service group, domain information, and service group information are stored in a system resource DB. When an administrator makes a...
8341728 Authentication device and authentication control method of a semiconductor chip  
An authentication device and method of a semiconductor chip which sends and receives authentication information, performs a login process for permitting an input to the semiconductor chip and an...
8341715 System and method for shared resource owner based access control  
Method and system for controlling application access to a shared resource in a runtime environment. The shared resource is owned by a remote resource owner. An access control ticket including a...
8340298 Key management and user authentication for quantum cryptography networks  
Key management and user authentication systems and methods for quantum cryptography networks that allow for users securely communicate over a traditional communication link (TC-link). The method...
8340299 Key management system and method  
Methods and systems are disclosed for providing secured data transmission and for managing cryptographic keys. One embodiment of the invention provides secure key management when separate devices...
8341726 System and method for controlling email propagation  
A system and method for controlling the propagation of an email message includes defining at least a first email recipient and a second email recipient of the email message. A first email...
8340286 Interleaving and deinterleaving method for preventing periodic position interference  
A method for implementing volatile cipher key and separate verification module by collecting physical features includes the steps of setting physical features sensor on a handset, collecting...
8340296 Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains  
Disclosed herein is a method and system for registering and verifying a smart card certificate for users moving between public key infrastructure domains, which allows a user moving between...
8336100 Systems and methods for using reputation data to detect packed malware  
A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3)...
8333317 System and method for authenticating the proximity of a wireless token to a computing device  
Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be...
8335544 Sharing account information and a phone number between personal mobile phone and an in-vehicle embedded phone  
A phone embedded within a vehicle for automatically using a service plan of a proximate personal mobile phone. The embedded phone includes an internal communication component that detects the...
8331556 Asymmetrical method of encryption or signature verification  
The invention proposes a method and a device for decrypting an encrypted message represented by a sequence C or applying an electronic signature to a sequence C, said sequence C consisting of data...
8327145 Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method  
A method for transmitting a Rights Object (RO) includes generating a password key by encrypting a password, generating the RO using the password key, and transmitting the RO from a first device to...
8325913 System and method of authentication  
Disclosed herein are systems, methods and computer readable media for performing authentication. The proposed scheme utilizes new algorithms that introduce randomness using a physical value for...
8327143 Techniques to provide access point authentication for wireless network  
According to an example embodiment, an apparatus may include a client device including a processor and memory. The client device may be configured to obtain, via a secure communication, a...
8327134 System, method and program product for checking revocation status of a biometric reference template  
A system, method and program product for checking the revocation status of a biometric reference template. The method includes creating a revocation object for a reference template generated for...
8326937 Method and system for content driven electronic messaging  
A system and method for intelligent electronic message routing. An Informant server transmits an electronic message to be routed to a destination and stores a plurality of stylesheets containing...
8321352 Fingerprinting for software license inventory management  
Various techniques for software license inventory and asset management are disclosed. A fingerprint may be generated and associated with various copies of software applications installed on a...
8320533 System and method for replying to voice messages left by callers  
An exemplary system and associated method for a communications system allowing responses to messages in an electronic environment are disclosed. The communications need not be based on the same...
8320880 Apparatus and methods for secure architectures in wireless networks  
Apparatus, methods, computer readable media and processors may provide a secure architecture within which a client application on a wireless device may, in some aspects, exchange information...
8321675 Method and apparatus for facilitating efficient authenticated encryption  
A shared-key encryption scheme that uses identically keyed block-cipher calls, low additional overhead, supports the encryption of arbitrary-length strings, produces a minimal-length-ciphertext,...
8321678 System and method to send a message using multiple authentication mechanisms  
A system may include a sender computing system to transmit first authentication data in association with a message, the first authentication data conforming to a first authentication mechanism,...
8316233 Systems and methods for accessing secure and certified electronic messages  
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email...
8315591 System and method for conditionally attempting an emergency call setup  
A system and method are provided for a communications device to conditionally attempt an emergency call setup. The communications device maintains at least one condition for attempting emergency...
8316461 Method for sharing rights objects between users  
Provided is a method for delivering all or part of a rights object (RO) of a user associated with the content to other users. The method includes creating a rights object to be transmitted to a...
8312555 Device, system and method for service delivery with anti-emulation mechanism  
A method for service delivery to a client, in which the client selects a service, and establishes a connection with a system server to which it sends an identity associated with the client and an...
8312275 Network device authentication  
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network...
8312278 Access authentication method applying to IBSS network  
An access authentication method applying to IBSS network involves the following steps of: 1) performing authentication role configuration for network entities; 2) authenticating an authentication...
8312523 Enhanced security for electronic communications  
Techniques are described for providing enhanced security for electronic communications, such as by including in a message sent between two services a digital signature that is generated by using...
8312274 Image processing apparatus and method for controlling the same  
The present invention improves security of image data when communication between an image managing apparatus that stores the image data of a submitted job and an image processing apparatus is not...
8311562 Differentiating a portion of a text message shown in a listing on a handheld communication device using an icon  
A handheld wireless communication device includes features to send and receive text messages. The handheld wireless communication device is further equipped with a microprocessor configured to run...
8312520 Methods and systems to detect attacks on internet transactions  
A method and system are disclosed for detecting interference with a remote visual interface, such as a HTML webpage, at a client computer, particularly to determine if a malicious attack such as...
8307406 Database application security  
A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a...
8307433 Client side username/password credential protection  
A method of protecting username/password (U/P) credentials operates on a client computer that cooperates with an anti-phishing scheme that generates a client warning at the client computer when a...
8307407 Selectable captchas  
A system for displaying a set of selectable CAPTCHAs produces a first set of CAPTCHAs whose images are based at least partially on an alphanumeric sequence, where a respective CAPTCHA in the first...
8307208 Confidential communication method  
In SSL encryption communication in which a client and a server share a password, the client generates random number data, encrypts the random number data with a public key and a password, and...
8301205 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Sharing account information and a phone number between personal mobile phone and an in-vehicle embedded phone
 
A phone embedded within a vehicle for automatically using a service plan of a proximate personal mobile phone. The embedded phone includes an internal communication component that detects the...
8300809 System and method for modulus obfuscation  
Disclosed herein are methods for obfuscating data via a modulus operation. A client device receives input data, stores an operation value, performs a modulus obfuscation on the operation value,...
8301888 System and method for generating secured authentication image files for use in device authentication  
A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure authentication image file and a received...
8302176 Validity checking system, validity checking method, information processing card, checking device, and authentication apparatus  
OBJECTIVE A user is prevented from inadvertently inputting authentication information to an unauthorized authentication system. In this manner, authentication information leakage is certainly...
8301802 Systems and methods for detecting and preventing flooding attacks in a network environment  
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing...
8296381 Method and computer program product for receiving an update to a previously received email message  
A method and computer program product enable an email user to receive an update to a previously received email message. An email client receives an update to the previously received email message...
8295477 Cryptanalysis method and system  
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
8296565 Communication protocol for device authentication  
A communication protocol between a master device, such as a mobile phone, and a peripheral device facilitates authentication of the peripheral device. When a peripheral device is detected, the...