Match Document Document Title
8850150 Managing security in solid-state devices  
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a host provides a data block containing a...
8850519 Methods and systems for graphical image authentication  
Systems and methods for providing authentication using an arrangement of dynamic graphical images. The graphical images can be arranged as a grid or matrix for presentation on a device display for...
8850544 User centered privacy built on MashSSL  
The present invention provides a new method for user centered privacy which works across all 3rd party sites where users post content, or even for encryption of emails. Users have an identity with...
8843749 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
8843744 Method and devices for distributing media contents and related computer program product  
A method of distributing media content over networks where content is shared includes coupling downloading metadata, which is accessed to start downloading media contents from the network, with...
8844049 Method for generating a cryptographic key for a protected digital data object on the basis of current components of a computer  
A method for coupling protected digital data object, for example an application program, and a specified computer, which allows for, if desired, individual components of the computer to be...
8837723 Method and apparatus for use in a downloadable conditional access system  
In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor....
8838971 Management of public keys for verification of public warning messages  
Techniques are disclosed for managing one or more public keys used for verification of one or more messages transferred over a communication network associated with a public warning system. In one...
8839403 Local proxy system and method  
A local proxy system includes a storage device having a local proxy and a physical port connection. The local proxy is part of a split proxy configuration having a local proxy and a remote proxy....
8839457 Image storage in electronic documents  
A computer-implemented method for controlling access to digital media involves receiving a URL at a computer server system, decoding the URL, extracting a user ID of a user who submitted the URL...
8837722 Secure content distribution with distributed hardware  
This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between...
8832440 Data security system  
A data security system includes providing a unique identification from a first system to a second system; copying the unique identification in the second system by the first system; and unlocking...
8827163 Anti-fake identification system and method capable of automatically connecting to web address  
This invention relates to an anti-fake identification system and method capable of automatically connecting to web address, in which an electronic tag of commodity is scanned by a reader device so...
8832438 Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus  
A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold...
8832779 Generalized identity mediation and propagation  
Provided are techniques for providing security in a computing system with identity mediation policies that are enterprise service bus (EBS) independent. A mediator component performs service-level...
8832441 Mobile terminal, data communication method, and computer program  
A mobile terminal includes a near-field communication device capable of performing near-field wireless communication with an external device, and a controller configured to instruct the external...
8823968 Image forming apparatus and method for setting license information  
A digital MFP includes a dual I/F storage unit including two different interfaces: an external interface (RFID) and an internal interface (bus). When the power of the digital MFP is turned ON, in...
8825536 Differential online charging for text messages based on network type  
Systems and methods are disclosed for performing online charging for text messages. One embodiment comprises a system that handles a Mobile Originated (MO) text message. The system receives a send...
8826014 Authentication of remote host via closed ports  
A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a...
8826400 System for automated prevention of fraud  
A system for preventing fraud at a service provider's website has a fake credential distributor for creating a set of valid but fake credentials to access such website and distributing such set to...
8826397 Secure remote authentication through an untrusted network  
A method for securely authenticating a user of a consumer device at an access device comprising the following steps. First, a dynamic data element and a first set of transactional information is...
8826367 Elastic resource provisioning in an asymmetric cluster environment  
System, method, computer program product embodiments and combinations and sub-combinations thereof for elastic resource provisioning are provided. An embodiment includes grouping physical...
8826009 Method of handling a certification request  
In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the...
8819433 Message storage and retrieval  
A method of obfuscating messages stored in a message store or messages received by a computing device by comparing portions of the messages to user-specified criteria and encrypting or hiding...
8819410 Private electronic information exchange  
Methods and apparatuses for private electronic information exchange are described herein. In one embodiment, when electronic information is received to be delivered to a recipient, the electronic...
8819432 Method for authentication and signature of a user in an application service, using a mobile telephone as a second factor in addition to and independently of a first factor  
The invention relates to a method for the two-factor authentication of a user in an application service running on an application server. The first authentication factor is a PIN authentication...
8819780 Information processing system, information processing apparatus, and information processing method  
The present invention provides an information processing system, an information processing apparatus, and an information processing method, capable of reducing a load of user authentication on a...
8819766 Domain-based isolation and access control on dynamic objects  
A technique for performing domain-based access control for granular isolation on a data processing system includes assigning, using the data processing system, one or more first domain tags to a...
8819815 Method and system for distributing and tracking information  
Aspects of the present invention are directed to a method and system for distributing information from an information distributor in a banking environment. The method may include composing an...
8819764 Network security monitor apparatus and network security monitor system  
A network security monitoring apparatus and a network security monitoring system manages “permitted” or “not permitted” communication between nodes based on an access policy. A network security...
8819431 Methods and device for electronic entities for the exchange and use of rights  
A method of transferring an item of data representative of a right between two electronic entities, at least one of the electronic entities including short range wireless communication elements...
RE45087 Certificate management and transfer system and method  
A method and system for Certificate management and transfer between messaging clients are disclosed. When communications are established between a first messaging client and a second messaging...
8813237 Thwarting cross-site request forgery (CSRF) and clickjacking attacks  
Embodiments of the invention generally relate to thwarting fraud perpetrated with a computer by receiving a request from a computer to perform a transaction. Embodiments of the invention may...
8812861 Graphical image authentication and security system  
A method and system for protection of and secure access to a computer system or computer network. The method includes the steps of receiving a first login account identifier, such as a user name...
8806203 Server-side security for untrusted clients using directory hiding  
A security mechanism provided by a server protects files in data storage from untrusted clients. In one embodiment, the server generates a filename in response to a request from a client for...
8806217 Functionality watermarking and management  
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes...
8806633 Coordinated detection of a grey-hole attack in a communication network  
In one embodiment, a security device receives one or more first unique identifications of packets sent by a first device to a second device for which a corresponding acknowledgment was purportedly...
8806207 System and method for securing data  
The present invention provides a method for securing data distributed by a first user to at least one recipient user, comprising the steps of; responding to a request from the first user to...
8806573 Authentication control in low-power lossy networks  
Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate...
8806590 Signed ephemeral email addresses  
Architecture for generating a temporary account (e.g., an email address) with a user-supplied friendly name and a secret used to the sign the temporary account. For example, when a user wishes to...
8806190 Method of transmission of encrypted documents from an email application  
The application discloses an improved method of transmitting encrypted emails by prompting the user to select at least one attachment for attaching with the email, prompting the user to select an...
8806607 Unauthorized data transfer detection and prevention  
A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via...
8799653 Storage device and method for storage device state recovery  
A storage device and method for storage device state recovery are provided. In one embodiment, a storage device commences an authentication process to authenticate a host device. The...
8799641 Secure proxying using network intermediaries  
Methods and apparatus for secure proxying using network intermediaries. A system may include one or more servers and a network intermediary. The network intermediary may generate security metadata...
8799646 Methods and systems for authenticating devices  
A computer-implemented method for authenticating devices may include (1) identifying a request from a device for a credentialing service to issue a credential to the device, the request including...
8793496 Systems, methods, and computer program products for secure optimistic mechanisms for constrained devices  
Embodiments of the invention may provide for systems and methods for secure authentication. The systems and methods may include receiving, by a constrained device, a random string transmitted from...
8793777 Verification and authentication systems and methods  
Embodiments of the present invention provide verification and/or authentication service engines that provide a customizable solution that can be “dialed” based on the risk level assigned to...
8793499 Nested digital signatures with constant file size  
A system and method are provided for implementing a digital signature scheme for embedding and validating multiple nested digital signatures in digitally produced documents without modifying a...
8793493 System and method of secure encryption for electronic data transfer  
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives instructions from a first user identifying...
8793483 Computer-based, automated workflow system for sending secure reports  
Computer-based systems and method for automating the workflow for generating and sending e-mails with attached reports to external recipients in order to reduce security breaches in certain...