Match Document Document Title
8793215 Systems and methods for publishing datasets  
Systems and methods for publishing datasets are provided herein. According to some embodiments, methods for publishing datasets may include receiving a request to publish a dataset to at least one...
8788810 Temporary registration of devices  
In a method of temporarily registering a second device with a first device, in which the first device includes a temporary registration mode, the temporary registration mode in the first device is...
8788824 Selective encryption in broker-based messaging systems and methods  
An exemplary method includes transmitting, by a software application subsystem, a request to an encryption services subsystem to route a message generated by an originating software application to...
8788823 System and method for filtering network traffic  
Protocol status information is used to perform traffic filtering by dropping messages that are not consistent with the protocol status information. In one embodiment, a method involves comparing...
8782422 System and method for authenticating documents  
A data processing system for distributing and authenticating documents from a plurality of parties to a recipient data processing apparatus is disclosed. The system comprises a plurality of...
8782771 Real-time industrial firewall  
Providing for employing a real time firewall to secure components of an automation control network from unauthorized communication to or from such components is disclosed herein. A monitoring...
8782415 System for, and method of, providing the transmission, receipt and content of an E-mail message to a recipient  
A server transmits a message and attachments from a sender to a recipient. A hash is provided of (a) the message, (b) an identification of the sender and (c) a hash of the attachments to form a...
8782399 Automated secure DNSSEC provisioning system  
A system and method that maintains a secure chain of trust from domain name owner to publication by extending the trust placed in existing cryptographic identity systems to the records published...
8782759 Identification and access control of users in a disconnected mode environment  
The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile...
8776204 Secure dynamic authority delegation  
In a communication network wherein a first computing device represents a resource owner and a second computing device represents a resource requestor, the resource owner detects an occurrence of...
8776214 Authentication manager  
Disclosed are various embodiments for an authentication manager. A security credential is generated based at least in part on a security credential specification associated with a network site....
8775807 Credential tracking  
In one implementation, a credential associated with a user identifier and a location is stored at a client device. A request to output a representation of the credential in a manner that enables a...
8775808 System and method for performing a management operation  
There is provided a system and method of performing a management operation. An exemplary method comprises receiving a command that comprises information derived from a private key in response to a...
8775818 Multifactor validation of requests to thwart dynamic cross-site attacks  
An apparatus and a method for validating requests to thwart cross-site attacks is described. A user identifier token, a request identifier token, and a timestamp, are generated at a web...
8774409 Method of handover  
A method for quickly performing a handover in a wireless access system is disclosed. The method for quickly performing a handover includes transmitting a handover request message to a serving base...
8775804 Matching authentication method, device and system for wireless communication  
A matching authentication method for wireless communication equipment comprises that: a device at the transmitting end sends a matching request (S101) to a device at the receiving end; the device...
8775806 System and method for providing unique encryption key  
A system and method for providing a unique encryption key including a receiver, at a Voice over Internet Protocol (VoIP) adapter, configured to receive a configuration file, a processor, at the...
8775815 Enterprise-specific functionality watermarking and management  
A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is...
8769262 VPN connection system and VPN connection method  
For establishing a VPN connection in the call-back type, a VPN server establishes an always-on connection through a unique protocol different from the electronic mail delivery system. A client...
8769284 Securing communication  
An apparatus comprising a processor, the processor configured to select a first cryptographic key, encrypt a message with the first cryptographic key to produce a first encrypted message, and...
8769649 Full spectrum cyber identification determination process  
A full spectrum cyber identification determination process for accurately and reliably determining and reporting any identification determination from a full spectrum of possible cyber...
8769308 Home (e)Node-B with new functionality  
A wireless communication device is configured as an in-home node-B (H(e)NB). The H(e)NB is configured to perform a locking function to control modification of carrier and user controlled...
8769707 Systems and methods for challenge-response animation and randomization testing  
Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise...
8769278 Apparatus and method for efficiently and securely exchanging connection data  
An apparatus, method, and machine-readable medium are described for securely and efficiently exchanging connection data for a peer-to-peer (“P2P”) session on a network comprising. For example, in...
8769705 Method for flexible data protection with dynamically authorized data receivers in a content network or in cloud storage and content delivery services  
A networking system comprising an application service that runs on a cloud infrastructure and is configured to receive dual encrypted content from a content provider and re-encrypt the dual...
8769285 Methods and apparatus for deriving, communicating and/or verifying ownership of expressions  
Methods and apparatus for generating, communicating, and/or verifying ownership of expressions are described. Various embodiments are well suited for use in a wireless peer to peer communications...
8769280 Authentication apparatus and method for non-real-time IPTV system  
An authentication apparatus for a non-real-time IPTV system decrypts a first encrypted value included in a contents request message received from a device using a preset session key, and then...
8769286 Methods and systems for increasing the security of electronic messages  
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes,...
8763097 System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication  
Systems and methods of authentication according to the invention are provided comprising a user, a service client, a service server, a portable communications device and an authentication server,...
8762724 Website authentication  
Embodiments of website authentication including receiving a request from a user to view a website within a graphical user interface (GUI); generating a one time password (OTP); storing the...
8762726 System and method for secure access  
The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a...
8762717 Authentication device  
According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which...
8763093 Access control management  
The subject disclosure relates to authorization based on a determination of permissions that can be granted for an action(s) to be performed on a resource. The determination of the permission is...
8761744 Mobile virtual communication invitations  
In general, in an aspect, the invention provides a method including prompting a first user of a first mobile communication device to invite a second user of a second mobile communication device to...
8762985 User terminal device and service providing method thereof  
A method for providing a service in a user terminal device, which includes downloading a service hub program, installing the service hub program, generating an icon container corresponding to the...
8756690 Extensible authentication protocol attack detection systems and methods  
The present disclosure provides systems and methods for detecting attacks against authentication mechanisms that generate Transport Layer Security (TLS) tunnels using a server public key. Such...
8756423 System and method for establishing a secure group of entities in a computer network  
This invention relates to a system and method for establishing a secure group of entities in a computer network, such as those originating from different trust domains, for the purpose of...
8756422 System and method for secure and/or interactive dissemination of information  
An interactive information dissemination system includes a media server (210) for receiving a plurality of media elements and storing the media elements in a database. A sender client (200)...
8756668 Dynamic PSK for hotspots  
Systems and methods for providing secured network access are provided. A user device located within range of a hotspot initiates a request sent via an open communication network associated with...
8756684 System and method for network security including detection of attacks through partner websites  
A computer readable storage medium has instructions for execution on a computer. The instructions monitor transactions between a server and a set of clients. An evaluation of session indicators...
8756702 Electronic apparatus, information processing method, and program  
The present invention relates to an electronic apparatus, an information processing method, and a program that allow a provision server of an application to be capable of easily causing an...
8756426 Functionality watermarking and management  
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes...
8756421 Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method  
Provided are an authentication device using a true random number generating element or a pseudo-random number generating element, for example, a USB token, an authentication apparatus using the...
8755519 Lattice scheme for establishing a secure multi-identity authentication context  
This disclosure describes a secure and computationally-efficient method to establish a single authentication context for multiple identities. The method is implemented in an authentication system...
8751808 Method and system for sharing trusted contact information  
A method and system for sharing trusted contact information between trusted, known and unknown parties, without revealing the contact information itself, thus protecting the party defined in the...
8751802 Storage device and method and for storage device state recovery  
A storage device and method for storage device state recovery are provided. In one embodiment, a storage device commences an authentication process to authenticate a host device. The...
8752140 System and methods for trusted internet domain networking  
A method of performing a trusted dynamic host configuration protocol (DHCPT). The method comprises receiving a trusted dynamic host configuration protocol request message, wherein the request...
8751791 Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event  
A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a communication network enables improved network...
8751792 Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party  
A method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party is disclosed. The method includes the following steps:...
8752127 Systems and methods for identifying devices by a trusted service manager  
Embodiments of the invention provide systems and methods for identifying devices by a trusted service manager. According to one example embodiment of the invention, a method for identifying...