Match Document Document Title
8751233 Digital signatures for communications using text-independent speaker verification  
A speaker-verification digital signature system is disclosed that provides greater confidence in communications having digital signatures because a signing party may be prompted to speak a...
8752131 Facilitating protection of a maintenance entity group  
According to one embodiment, maintenance points of a maintenance entity group are identified. The maintenance points comprise end points and intermediate points. A secure connectivity association...
8752125 Authentication method  
There is disclosed an authentication method comprising requesting a user of a personal mobile terminal to enter a personal code into a personal mobile terminal in response to receipt of an...
8752153 Accessing data based on authenticated user, provider and system  
A method that includes authenticating an authentication system, a user, and a service provider, generating an access code based on a combination of data related to the authenticated user and data...
8752203 System for managing computer data security through portable data access security tokens  
A secure data storage system for controlling access having a data user facility, a data owner facility and a data storage facility, wherein a third party data holder managing the data storage...
8744408 Information communication device and system  
A link unit of a mobile phone operates to establish a connection with one PC selected by the user in a state linkable with a plurality of PCs. The selected one PC checks to see that device...
8745400 Method for authenticating key information between terminals of a communication link  
With the help of a key management protocol, the transmitted key information is authenticated by at least one certificate signed by the terminals, and at least one fingerprint of the public keys or...
8745384 Security management in a group based environment  
Techniques are provided for securely storing data files in, or retrieving data files from, cloud storage. A data file transmitted to cloud storage from a client in an enterprise computing...
8739267 Method and system for communication between a secure information storage device and at least one third party, and corresponding entity, device and third party  
The disclosure relates to a method for communication between a secure information storage device and at least one third party with which information is exchanged. An entity ensures the management...
8737964 Facilitating and authenticating transactions  
A computer, such as a Windows-based PC 23, has associated with it a Subscriber Identity Module (SIM) 15, such as of the type used in a GSM or UMTS cellular or mobile telecommunications network....
8738921 System and method for authenticating a person's identity using a trusted entity  
A system and method are provided for authenticating a person's identity to a business using a trusted entity with a secure repository to store and protect the person's identity information. The...
8738913 Method of deriving and updating traffic encryption key  
A method for efficiently deriving a traffic encryption key for data encryption is disclosed. A method of generating a traffic encryption key (TEK) comprises the steps of receiving, by a mobile...
8737610 Restricted in situ previews for electronic advertising  
Supplemental content such as electronic advertisements may be previewed in situ. That is, supplemental content may be previewed in a context of a live and/or production environment along with the...
8732150 Methods and apparatus for suppressing network feed activities using an information feed in an on-demand database service environment  
Disclosed are systems, apparatus, methods, and computer readable media for suppressing network feed activities using an information feed in an on-demand database service environment. In one...
8732803 Automated entity verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
8732471 Data communication method, computer and information storing medium  
A computer including at least two processors is used to preferably perform a secure data communication. Data containing a processor ID identifying one of the at least two processors provided for a...
8732794 Browser plug-in firewall  
A browser plug-in firewall manages data exchanged between a browser and a plug-in according to a pre-defined list of rights.
8726387 Detecting a trojan horse  
A method and apparatus for detecting a Trojan horse in a suspicious version of a software application in the form of at least one electronic file. A computer device determines a source from which...
8726355 Identity verification via selection of sensible output from recorded digital data  
A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated...
8726023 Authentication using GAA functionality for unidirectional network connections  
Methods, a client entity, network entities, a system, and a computer program product perform authentication between a client entity and a network. The network includes at least a bootstrapping...
8726022 Method for the access of the mobile terminal to the WLAN and for the data communication via the wireless link securely  
The present invention relates to a method for the secure access of mobile terminal to the Wireless Local Area Network (WLAN) and for secure data communication via wireless link, which, combining...
8726019 Context limited shared secret  
In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship...
8726036 Identifying peers by their interpersonal relationships  
According to this disclosure, a user is identified (and selectively granted access to protected resources) by using information that describes the user's interpersonal relationships. This...
8719572 System and method for managing authentication cookie encryption keys  
There is provided a system and method for managing authentication cookie encryption keys. The system comprises a computing device including a memory with authentication data having a key...
8719573 Secure peer discovery and authentication using a shared secret  
During a security technique, an electronic device determines a name by a applying a function to a shared secret, which is shared between a user and another user. This name is advertised in a...
8719948 Method and system for the storage of authentication credentials  
A method, apparatus and computer program product for controlling access to host access credentials required to access a host computer system by a client application is provided. The host access...
8719906 Reactive authorization for publications  
Systems and methods for reactively authorizing publication of information by a third party are coordinated through the use of a presence server. The presence server communicates with other...
8712036 System for encrypting and decrypting a plaintext message with authentication  
The described system and method provide for an encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence...
8713319 Preserving privacy of digital communication information  
Method for verifying that an item of information relating to an issuer has been registered correctly by a receiving entity while preserving the issuer's privacy, which method includes the...
8713318 Email certificates  
Systems and methods for providing an email certificate for an email message. In some aspects, a method includes receiving a request from a user for providing an email certificate for an email...
8712055 Method for detecting security error in mobile telecommunications system and device of mobile telecommunications  
According to one embodiment, a method of performing a re-establishment procedure in a mobile communication system includes: receiving, by a packet data convergence protocol (PDCP) entity, at least...
8713632 Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium  
A user authentication system is provided with a client apparatus and an authentication server. An application program used for processing the measurement results of the measuring apparatus is...
8713677 Anti-phishing system and method  
Systems and methods for anti-phishing are disclosed. At a computing device: identifying, from a user input data stream, a first set of one or more characters, and a second set of one or more...
8705732 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Generating a session key for authentication and secure data transfer
 
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be...
8707038 Method for the encrypted data exchange and communication system  
The embodiments relate to a method for the encrypted data exchange between subscribers of a communication system using cryptography based on elliptical curves, wherein upon a query by a first...
8707046 Method of anonymous entity authentication using group-based anonymous signatures  
Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The...
8705745 Method and system for transmitting deferred media information in an IP multimedia subsystem  
A method for transmitting deferred media information in an Internet Protocol (IP) multimedia subsystem (IMS) includes: a sending party of the media information sends a key generation parameter...
8701173 System and method for providing silent sign on across distributed applications  
A system and method is provided for a distributed computing system where a user can login to a client computer and access a number of different applications installed on web servers. These...
8701210 Adjustable feature access for a controlled environmental system  
The present invention provides apparatuses and methods for restricting access to a control unit in an environmental system based on a lock level. The control unit (e.g., a thermostat) is...
8694782 Wireless authentication using beacon messages  
Systems, methods, and other embodiments associated with wireless authentication using beacon messages are described. According to one embodiment, an access point controller includes a transmitter...
8694785 Broadband certified mail  
The present invention provides a system and method for providing certified voice and/or multimedia mail messages in a broadband signed communication system which uses packetized digital...
8689339 Method, system and apparatus for game data transmission  
The present invention provides a method for game data transmission, including: acquiring, by a client upon logging into a server, a session key assigned by the server; encrypting game data with...
8688981 Method and apparatus for logging in a health information tele-monitoring device by using a personal portable device  
A method of logging in a health information tele-monitoring device by using a personal portable device. The method includes issuing a security key embedded in a health information tele-monitoring...
8688989 Receiver non-repudiation via a secure device  
Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and...
8689291 Wireless access device and method  
The disclosure discloses a wireless access device (2), which includes: a wireless module (204) which establishes a wireless connection with a network, a solid state memory (203) partitioned into...
8689292 Method and systems for dynamically providing communities of interest on an end user workstation  
A method and system provide dynamic communities of interest on an end user workstation utilizing commercial off the shelf products, with central management and the ability for a users to log on...
8683550 System and method for validating a user of an account using a wireless device  
The disclosure provides a system and method of authenticating a user to a network. For the method, if a request for a resource initiated by the device is related to a restricted resource, then the...
8682985 Message tracking between organizations  
Architecture that facilitates cross-boundary message tracking based on a trust relationship in existence between a sender network and a recipient network. A tracking service is deployed in each...
8683568 Using packet interception to integrate risk-based user authentication into online services  
Techniques for using a network analyzer device connected to a network include (a) sniffing packets traversing the network between a web-based application server and a user machine, the user...
8683561 Fixed client identification system for positive identification of client to server  
A tamperproof ClientID system to uniquely identify a client machine is invoked upon connection of a client application to a backend. Upon initial connection, the backend issues a unique ClientID...