Match Document Document Title
8683577 Authentication method, authentication device and computer-readable medium storing instructions for authentication processing capable of ensuring security and usability  
An authentication method in a system having a display and a storage device is provided. The authentication method includes the steps of registering an object selected for each user from among a...
8683565 Authentication  
User authentication is based on a home network user database that authenticates users to external service providers. A user logs into home network and starts accessing the external service by...
8683205 Accessing data utilizing entity registration in multiple dispersed storage networks  
A method begins by a processing module determining whether a data access request is requesting access to data stored in a plurality of dispersed storage networks (DSNs). The method continues with...
8683492 Verifying information stored on a managed network device  
A method and mechanism for verifying information on a managed device is provided. A request is received at a managed device that contains one or more values that comprise proposals for a correct...
8677482 Hardware security for software processes  
A system and method for secure processing is provided, wherein a monitor application is injected into a secure application binary within the security perimeter of a secure processor. The...
8676998 Reverse network authentication for nonstandard threat profiles  
A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection,...
8677155 System for detecting intrusions by devices with openable casing  
The invention comprises an intrusion-detection system based on a switch 1 that provides more effective protection by means of an innovative arrangement of three intrusion-detection contacts...
8676995 System and method for enabling pairing of a companion device with a mate device for performing a companion service  
A method is provided in one example embodiment and includes establishing a connection between a first client and a messaging fabric of a conductor element associated with a video system; receiving...
8675878 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
8677139 Method to provide authentication using a universal identifier  
Once an individual is issued a Universal Identifier (UID) it uniquely identifies that person anywhere in the world. The UID could be embedded in any type of device, token or apparatus that is...
8677126 Method and system for digital rights management of documents  
A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the digital content may be customized for...
8677124 Method and device for securing data transfers  
The method of securing data transfer comprises: a step of attempting to transmit a document from a document sender to at least one document recipient, by implementing at least one transmission...
8671446 Method and system for configuring a rule file for firewall of web server  
A method, a system, and a computer program product embodying computer readable code for configuring a rule file for a Web application firewall. The method includes: blocking a response created by...
8666072 Method and a system for receiving a multimedia signal, a cryptograophic entity for said reception method and system, and a method and a black box for producing said cryptographic entity  
This method of receiving a multimedia signal scrambled by means of a control word uses a first cryptographic entity that can be connected to any one of P second cryptographic entities to form part...
8667284 Detection of invalid escrow keys  
A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each...
8667283 Soft message signing  
A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of...
8667278 Information processing apparatus and data transmission method of information processing apparatus  
An apparatus stores first divided trust information which is one portion resulting from division of trust information generated by a transmission target apparatus that is a transmission target for...
8667266 System and method for sending encrypted messages to a distribution list  
A system and method for sending encrypted messages to a distribution list. In one embodiment, the method comprises: identifying a distribution list address in a message; determining one or more...
8667280 Method and apparatus for applying a partial password in a multi-factor authentication scheme  
A method includes receiving, via a server, a User ID and Password from a client device, and generating a Secret PIN (SPIN). Values for a Partial Password and an encrypted version of the SPIN...
8667609 System to inform about trademarks similar to provided input  
Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and...
8667279 Systems and methods for securely place shifting media content  
Systems and methods are provided for securely providing a place-shifted media stream from a place shifting device to a remote player via a communications network. A request for a connection is...
8667267 System and method for communicating with a key management system  
A method for providing authenticated access to an encrypted file system includes generating a first seed; providing a request for a key to a key server, the request including at least a first seed...
8667295 Encoding a validity period in a password  
A password authentication mechanism is capable of determining whether a password has expired without referring to a database or other information repository. Additional information can be encoded...
8667270 Securely upgrading or downgrading platform components  
A method for securely altering a platform component is provided, comprising: assigning certificates for public encryption and signature verification keys for the device; assigning certificates for...
8667281 Systems and methods for transferring authentication credentials  
A computer-implemented method for transferring authentication credentials may include 1) identifying a request to receive an authentication credential that is stored on a first computing device...
8661529 Information processing device  
An information processing device includes a processing unit which performs user authentication. The processing unit includes a setting part that determines setting of operation of a target device...
8661515 Audible authentication for wireless network enrollment  
An audible authentication of a wireless device for enrollment onto a secure wireless network includes an unauthorized wireless device that audibly emits a uniquely identifying secret code (e.g., a...
8661539 Intrusion threat detection  
A system is disclosed that can be used to monitor for an attempted intrusion of an access system. The system detects an access system event in the access system and determines whether the access...
8661257 Generic bootstrapping architecture usage with Web applications and Web pages  
A method includes receiving at a network application function a request related to a generic bootstrapping architecture key originated from a user equipment. The received request includes a...
8661531 System and method for secure control of resources of wireless mobile communication devices  
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset....
8661251 Method and device for creating a group signature and related method and device for verifying a group signature  
A method for creating a group signature of a message to be implemented by a member of a group in a system, the system including a trust authority, the group including at least the member provided...
8660268 Keyed pseudo-random number generator  
A method and apparatus for client authentication using a pseudo-random number generation system. The pseudo-random number generation utilizes a secret key as well as state information as input...
8661507 Managed peer-to-peer applications, systems and methods for distributed data access and storage  
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity. Secure and...
8656462 HTTP authentication and authorization management  
Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a state manager that is used to identify and maintain...
8655957 System and method for confirming that the origin of an electronic mail message is valid  
A system and method for preventing e-mail spoofing, in which a receiving e-mail checking server system sends a message to a confirmation server associated with a network domain of the sending...
8656166 Storage and authentication of data transactions  
Data is transmitted between a first user and a second user via an information technology communications network, in a method comprising the steps of: generating a first hash value for a selected...
8656485 Projection display device and method for controlling projection display device  
A projection display device that operates, in case that the second authentication information which is input does not match the first authentication information which is stored, operates in the...
8656167 Systems and methods for secure workgroup management and communication  
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split or share a data set into multiple...
8656175 Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit  
When performing secure processing using confidential information that needs to be confidential, the secure processing device according to the present invention prevents the confidential...
8656176 Simple visual authentication of documents exchanged in commerce  
Verifying the integrity of a received binary object by calculating a first displayable authenticator derived from an input binary object. The first authenticator is then attached to the input...
8655318 Method and system for anonymous operation of a mobile node  
A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous...
8656168 Information processing apparatus, recovery apparatus, and disk recovery method  
An information processing apparatus includes: a disk to store data; a transmitting and receiving unit to exchange information with a recovery apparatus over a network; an authentication processor...
8650399 Memory device and chip set processor pairing  
Systems, devices and/or methods that facilitate mutual authentication for processor and memory pairing are presented. A processor and a suitably equipped memory can be provided with a shared...
8650617 Method and system for real-time insertion of services during a call session over a communication network  
A method and apparatus for real-time insertion of services into an IP telephony call session are disclosed. A client initiates a service request message to a second server. The service request...
8649509 Systems and computer program products for generating and verifying randomized hash values  
A system generates a randomized hash value and/or verifies data against a randomized hash value. A hashing circuit can respond to data by randomly selecting a hashing algorithm parameter among a...
8644514 Security model for a relay network system  
According to one general aspect, a method may include acquiring a message. In some embodiments, the method may also include determining if a relay station (RS) is allowed to manipulate portions of...
8645689 Stateless agent  
Secure and stateless data transfer between a source agent at a first computer system and a destination agent at a second computer system is provided. A first list of labels of content structures...
8646055 Method and system for pre-shared-key-based network security access control  
A method and system for pre-shared-key-based network access control are disclosed. The method includes the following steps: 1) security policy negotiation is implemented between a REQuester (REQ)...
8645693 Zero-knowledge based authentication method, system, and apparatus  
In the fields of data security and system reliability and qualification, this disclosure is of a method, system and apparatus for verifying or authenticating a device to a host using a...
8646057 Authentication and authorization of user and access to network resources using openid  
A method includes receiving by an OpenID network device a user log in; logging in, by the OpenID network device, the user to an OpenID account; receiving, by the OpenID network device and from a...