Match Document Document Title
8639930 Automated entity verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
8639925 Method for protecting a sensor and data of the sensor from manipulation and a sensor to that end  
A method for protecting a sensor and data of the sensor from manipulation, as well as a sensor to that end; in the course of the authentication, a random number being sent by a control unit to the...
8640216 Systems and methods for cross site forgery protection  
The present solution described herein is directed towards systems and methods to prevent cross-site request forgeries based on web form verification using unique identifiers. The present solution...
8640249 Digital broadcasting conditional access system and method  
Provided is a digital broadcasting conditional access system and method, including a digital broadcasting transmitter and a digital broadcasting receiver. The transmitter scrambles a broadcasting...
8639823 Switching between connectivity types to maintain connectivity  
Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity...
8638932 Security method and system and computer-readable medium storing computer program for executing the security method  
A security method and system for maintaining security between a client and a server and a computer-readable medium storing a computer program for executing the security method are provided. The...
8635454 Authentication systems and methods using a packet telephony device  
Authentication systems and methods for increasing the security of online account access and transactions by leveraging the use of customer equipment provided by VoIP service providers. A method...
8635680 Secure identification of intranet network  
A method is provided for network identification based on high entropy data on a network which are not easily guessed or obtained outside the network, which can prevent an attacker from “spoofing”...
8635455 Encrypted communication device with restricted rate of encryption key retrievals from memory  
A device for encrypted communication with external entities is configured to frustrate side channel attacks attempting to determine an encryption key. The device has a first memory, an encryption...
8635664 Method and system for securing application program interfaces in unified extensible firmware interface  
A method and system for securing an unified extensible firmware interface application program interface includes establishing a software hook for the application program interface during a...
8635670 Secure centralized backup using locally derived authentication model  
A system and method for performing backup operations is provided. Mechanisms facilitate a secure centralized backup system with a locally derived authentication model. A local centralized storage...
8635445 Method for digital identity authentication  
In a preferred embodiment of the invention, an authenticating device (22) receives a first digital identity (43) and a second digital identity (63). The authenticating device (22) uses the second...
8630007 Image forming apparatus, method for managing print job, and computer-readable storage medium for computer program  
An image forming apparatus is configured to access a storage that stores, therein, first associating information indicating a first terminal identifier for identifying a terminal and a first user...
8631231 Mobile device initiated transaction  
One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter, determining an associated trusted party...
8626929 Scalable session management using an encrypted session key  
Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key...
8627075 Communication device that receives external device information from an external device using near field communication  
A communication device, which can simplify various setting processes, transmits, to a server via a network, external device information received from an external device by using proximity wireless...
8625793 Resynchronization for push message security using secret keys  
A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the...
8627439 Processing communication events in a communications system  
A method of communicating over a communications system includes determining that a communication event at a user terminal of the communications system requires use of a feature for processing...
8621217 Method and apparatus for trusted branded email  
A trusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages...
8621209 Confidence-based authentication  
Disclosed are various embodiments that perform confidence-based authentication of a user. An identification of a user account is obtained from a user, and a minimum confidence threshold is...
8621218 Method and apparatus for mutual authentication in downloadable conditional access system  
Disclosed is a mutual authentication method and apparatus in a CAS including a headend system and DCAS host. In particular, example embodiments relate to a mutual authentication method and...
8619986 Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier  
An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The method begins by receiving an...
8621203 Method and apparatus for authenticating a mobile device  
An approach is provided for authenticating a mobile device. A mobile device initiates transmission of a request to an authentication platform for generating a public-key certificate to access a...
8621219 Communication system having plural terminals and method for controlling terminal in communication system  
A method and communication system for assigning the control authorization for controlling functions of a device from a terminal to another terminal in a communication system is provided. Through...
8621577 Method for performing multiple pre-shared key based authentication at once and system for executing the method  
A method and apparatus for performing a multiple Pre-Shared Key (PSK) based authentication in a single procedure is described, where the multiple PSK based authentication generates a combined...
8615659 System and method for acquiring terminal binding key  
A first terminal subscribes to at least one service using a service guide in which information necessary for reception of each service is stored, and sends the service guide and an identifier (ID)...
8612773 Method and system for software installation  
A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an...
8612769 Electronic signature method and device  
An electronic signature method uses a signature generation unit with a memory that is spatially separated from a data processing device. At least one biometric trait of a person who will...
8612761 Method of executing a cryptographic protocol between two electronic entities  
Perfected cryptographic protocol making it possible to counter attacks based on the analysis of the current consumption during the execution of a DES or similar. According to the invention, a...
8613098 Method and system for providing a dynamic image verification system to confirm human input  
A method and system for providing a dynamic image verification system to confirm human input whereby a dynamic verification image that is pictorial in nature, and/or is animated, is displayed as...
8612760 Decrypting identity key from battery with root key in host  
Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for...
8613104 Protected and virtual interfaces for COM aggregation  
An outer COM object can be provided with privileged access to protected functionality in an inner COM object. An inner COM object can offer a custom protected interface to an outer COM object by...
8607065 Trusted and confidential remote TPM initialization  
Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other...
8607052 Management apparatus and copying apparatus  
The management apparatus 105a manages copying of information from an original recording medium 101a to a copy recording medium 102a. The management apparatus 105a comprises: a...
8605869 Method and apparatus for forcing a call to a carrier provided voice mail facility  
Disclosed are systems and techniques by which a caller may specify a callee's telephone number and be connected directly to a carrier provided voice mail facility associated with the identified...
8601547 Cookie-based detection of spam account generation  
A computer implemented method for detecting and preventing spam account generation is disclosed. Upon receiving an account creation request from a client, the server analyzes the request and...
8601553 Techniques of imposing access control policies  
A technique of imposing access control policies is presented. The technique comprises receiving a token which is associated with a datum by a tokenization server. The technique also includes...
8601560 Method for user terminal authentication of interface server and interface server and user terminal thereof  
Provided are a method for authenticating a user terminal in an interface server, and an interface server and a user terminal using the same. The method includes receiving authentication request...
8601548 Password popularity-based limiting of online account creation requests  
Upon receiving an account creation request from a client, the server determines a count of new account requests, each having a respective password, received during a predefined time period, that...
8595504 Light weight authentication and secret retrieval  
A method for authenticating a message in a network is provided. The method includes a step of generating, in a sink device, a private key and a public key. The private key includes a plurality of...
8595496 Method and system for updating time information of a DRM device  
A method and system for updating time information of a digital rights management (DRM) includes a time server transmitting a time information message to a consumer electronics (CE) device, the CE...
8595495 System and method for secure communications  
A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that the receiver received the message...
8595497 Electronic file sending method  
An electronic file sending method is provided to securely and easily send en electronic file to a receiver. A receiving apparatus receives from a sending apparatus an electronic mail including an...
8595856 Apparatus and method for installing software  
An apparatus and method for installing a software package are provided. The apparatus includes a storage unit which stores a software package used to operate the apparatus by a digital device and...
8595492 On-demand protection and authorization of playback of media assets  
On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a...
8594628 Credential generation for automatic authentication on wireless access network  
Network devices provide seamless offloading of data communications from a service provider's cellular network to an alternate access network outside of the service provider's cellular network....
8595498 Method for authenticating access to a secured chip by test device  
A method for authenticating access to a secured chip SC by a test device TD, the test device storing at least one common key CK and one test key TK, the secured chip SC storing the same common key...
8595810 Method for automatically updating application access security  
A method for automatically updating access security on existing applications with multi-factor authentication, intelligent auto-login, single sign-on, proximity logout, pro-active loss prevention...
8593252 Electronic lock box proximity access control  
An electronic lock box system includes a wireless portable transponder that communicates with an electronic lock box using a low power radio link. The portable transponder includes: a wide area...
8589687 Architecture for supporting secure communication network setup in a wireless local area network (WLAN)  
In a communication network, an architecture for supporting secure communication network setup in a wireless local area network (WLAN) is provided. The architecture may be utilized in a...