Match Document Document Title
8898742 Systems and methods for controlling access to content distributed over a network  
A computer-implemented method is provided for controlling use of a file on a user device. The method includes transmitting authentication information to a system and downloading the file from the...
8898452 Protocol translation  
A system and method for securing data by receiving encrypted data at a security appliance transmitted from a client, wherein at least a portion of the encrypted data is encrypted according to a...
8898461 Battery authentication method and apparatus  
Improved handling of battery recognition tasks in an electronic device such as a cell phone, smart phone, computer system, recording device or others is facilitated. Recognition of a battery so as...
8892889 Information processing apparatus, program, storage medium and information processing system  
Provided is an information processing apparatus including a reception unit that receives a request for access to an IC chip from an application having access right information for accessing to the...
8893266 System and method for secure control of resources of wireless mobile communication devices  
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset....
8892880 System and method for obtaining an authorization key to use a product  
A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based...
RE45254 Implicit population of access control lists  
Communication applications may include lists of users with which a user of the application communicates. If two users of a communications application each include the other user on their user...
8893246 Method and system for authenticating a point of access  
Rogue or malicious access points pose a threat to wireless networks (32) and the users of these networks. In order to prevent or reduce this threat a method and system is proposed that verifies...
8887298 Updating and validating documents secured cryptographically  
Aspects of the subject matter described herein relate to updating and validating documents secured cryptographically. In aspects, documents are encrypted to protect them from unauthorized access....
8887254 Database system, computer system, and computer-readable storage medium for decrypting a data record  
A database system comprising: a memory containing multiple data records, wherein each of the data records has a data record asymmetric key pair for cryptographic encryption and decryption, wherein...
8887300 Automated message transmission prevention based on a physical reaction  
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some...
8886939 Secure authenticated distance measurement  
The invention relates to a method for a first communication device to performing authenticated distance measurement between said first communication device and a second communication device,...
8887305 Methods and devices for presenting email addresses  
Methods and devices for data entry are disclosed. An example method includes executing an application on a mobile device, the application requiring a login to access at least a portion of data...
8886938 System and method for cross-site reference forgery attack prevention using double validated tokens with time sensitivity  
A method and system for validating a form, that includes providing, to a client, the form comprising a primary token, receiving, in response to the client loading the page form, a request for a...
8886940 Hash function using a card shuffling process  
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of...
8886930 DNS flood protection platform for a network  
Embodiments are directed towards providing protection to DNS servers against DNS flood attacks by causing a requesting device to perform multiple DNS lookup requests for resolving a resource...
8887233 Cookie-based acceleration of an authentication protocol  
A system uses a proxy server to authenticate a client with an authentication protocol that does not support caching. Rather than cache the client's authentication credentials, or access a client...
8881231 Automatically performing an action upon a login  
Techniques for automatically performing one or more actions responsive to a successful login. In one embodiment, an action automatically performed responsive to the login uses content created...
8881305 Methods and apparatus for maintaining secure connections in a wireless communication network  
In one illustrative example, a method in a mobile communication device operating in a wireless local area network (WLAN) involves performing, via a wireless AP of the WLAN, a first authentication...
8873754 Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system  
A proxy-based encryption method includes generating, according to a private key of a sending end and a public key of a receiving end, proxy keys that correspond to at least two proxy servers,...
8874768 Methods for providing security over untrusted networks  
Methods for providing for secure communications across data networks, including untrusted networks. In one embodiment, the method comprises establishing security associations between devices on...
8875236 Security in communication networks  
Disclosed is a method including allowing an application server to request setup of a session on behalf of a user terminal, and using mechanisms of a generic peer authentication procedure for...
8874685 Compliance protocol and architecture  
A process for centrally managing a large number of computers from a central location when technical expertise is not available at each end point nor can other remote management techniques be...
8874915 Optimized encryption key exchange  
An encryption key module in a content providing server receives a request to stream electronic media data to the user device. The encryption key module identifies a predefined shared secret key...
8874912 Systems and methods for securely transferring personal identifiers  
A system for transferring secured data has an authentication facilitator that transmits data indicative of a graphical key pad to a remote display device of a user computing device and, in...
8875267 Active learning-based fraud detection in adaptive authentication systems  
Active learning-based fraud detection techniques are provided in adaptive authentication systems. An authentication request from an authentication requestor is processed by receiving the...
8874914 Secure and automated credential information transfer mechanism  
A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the...
8868911 Method for key generation, member authentication, and communication security in dynamic group  
The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification...
8868910 Elliptic curve cryptographic signature  
A method includes generating a randomized base point and causing the randomized base point and a private key to be loaded into a signature engine device. The method also includes signing a message...
8869251 Remote provision of consistent one-time password functionality for disparate on-line resources  
Consistent one-time password (OTP) functionality is provided from a presentation server to secure various on-line resources. A seed file can be provided to or created by a service provider for...
8868918 Authentication method  
Method enabling a user to verify the operation of a personal cryptographic device, comprising the following steps: a) a user (2) enters an access request in a terminal (3) (100), d) a personal...
8868719 Identity and reputation monitoring  
Monitoring for potential misuses of identity information is disclosed. A profile comprising a user's identity information is received. An indication from a third party website that at least a...
8861722 Generating a session key for authentication and secure data transfer  
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be...
8863225 Generalized identity mediation and propagation  
Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level...
8863244 Communication abuse prevention  
Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended...
8863268 Security module and method within an information handling system  
A security module and method within an information handling system are disclosed. In a particular form, a processing module can include a local processor configurable to initiate access to...
8862870 Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination  
The present disclosure is directed towards systems and methods for performing multi-level tagging of encrypted items for additional security and efficient encrypted item determination. A device...
8863226 Two-party, role-based transaction verification  
Two-party, role-based email verification can be used by an administrator to control the sending of emails by an authorized user. Various administrator notification/approval options may be...
8862890 Method and apparatus for processing biometric information  
A biometric-information processing apparatus and method including storing sample biometric information of a user each time biometric authentication processing for verifying sample biometric...
8862884 Method of generation of a secret key for a wireless communication system  
The present invention concerns a method of generation of a secret key, shared between a first terminal and a second terminal. The key is generated from the impulse response of the transmission...
8862882 Systems and methods for authenticating devices by adding secure features to Wi-Fi tags  
Systems and methods are described herein for authenticating a user device that uses a wireless local area network. The user device may generate an encrypted authentication block and/or digitally...
8863246 Searching and replacing credentials in a disparate credential store environment  
Apparatus and methods are described for searching and replacing user credentials in a multiple disparate credential store environment. Upon authentication of a user to change credentials,...
8856510 Method for joining user domain and method for exchanging information in user domain  
A method for joining a user domain based on digital right management (DRM), a method for exchanging information between a user device and a domain enforcement agent, and a method for exchanging...
8856523 Method and device for communication on a communication link between an aircraft and a ground station  
A communication method on a communication link between an aircraft and a ground station, the communication capable of being configured according to a plurality of safety levels in which, when the...
8856886 Location-targeted online services  
Described are various implementations of location-targeted online services. When a user accesses the Internet from a supported location, he'll be able to use premium or exclusive online services...
8850209 Schema signing  
In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the...
8850204 Multi-band/multi-link secure key generation and delivery protocol  
A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.
8850203 Secure key management in multimedia communication system  
Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a...
8850197 Optical network terminal management control interface-based passive optical network security enhancement  
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical...
8847729 Just in time visitor authentication and visitor access media issuance for a physical site  
A host organization system for a host organization of a physical site, receives a request, by a visitor with an identifier of a visitor organization for a visitor access medium, for access to the...