Match Document Document Title
8590026 Method and system for generating a touch CAPTCHA  
The present invention provides a method and system for automated test for human presence at a client device capable of receiving touch sensitive response. At a server, the method includes...
8589688 Message authentication device, message authentication method, message authentication program and storage medium therefor  
A message authentication device, a message authentication method, a message authentication program and a storage medium therefor are provided, so as to realize higher speed processing than an...
8589694 System, method, and apparatus for graduated difficulty of human response tests  
A server to implement human response tests of graduated difficulty can suppress access by spambots. The server includes a network interface and a test controller. The network interface connects...
8583928 Portable security transaction protocol  
A technique for providing message authenticity includes accepting transaction information, accepting a first data item used for authenticating an originating user, cryptographically processing the...
8582760 Method and system of managing and filtering electronic messages using cryptographic techniques  
Undesirable electronic messages, such as the unsolicited broadcast e-mail known as spam, is not only a nuisance, but wastes both computer and user resources. Conversely, desirable electronic...
8584224 Ticket based strong authentication with web service  
A system for authenticating a user to a relying party. A user sends an access request to a relying party web application. In response, the application sends a page with JavaScript that detects a...
8583921 Method and system for identity authentication  
Used in a communication involving Entity 1 and Entity 2 to authenticate Entity 1's identity, a digital identification of Entity 1 comprises an encrypted character string wherein the string is...
8583927 Streaming system and streaming method  
A streaming system includes an authoring unit (2), a stream server (3) and a client terminal (5). The authoring unit generates a file composed of encrypted contents data and the ancillary...
8578506 Digital rights management in user-controlled environment  
A method of controlling access to content comprises receiving, at a domain gateway (3) of a domain (4), a request from a device (5) in the domain for access to the content. It is determined at the...
8578164 Method of one-way access authentication  
A method of one-way access authentication is disclosed. The method includes the following steps. According to system parameters set up by a third entity, a second entity sends an authentication...
8578446 Authentication apparatus and entity device  
A configuration including, in authentication contexts, function unit identification information unique to the function unit that has executed an authentication subprocess in entity devices permits...
8578025 Switching between connectivity types to maintain connectivity  
Techniques are provided for leveraging narrowband connectivity (such as dial-up communications or other types of low bandwidth communications) to provision or configure broadband connectivity...
8577037 Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm  
A network device includes an input circuit and a key mixing circuit. The input circuit is configured to receive i) a message and ii) a plurality of packets from a transmitting device. The message...
8578454 Two-factor authentication systems and methods  
Systems and methods for authenticating defined user actions over a computer network. An authentication service receives an authentication request from an authenticating service to perform an...
8572380 Streaming system and streaming method  
A streaming system includes an authoring unit (2), a stream server (3) and a client terminal (5). The authoring unit generates a file composed of encrypted contents data and the ancillary...
8572378 Method for protecting the first message of security protocol  
The present invention provides a method for protecting the first message of a security protocol and the method includes the following steps: 1) initialization step; 2) the initiating side sends...
8572373 Method, apparatus and system for secure electronic mail  
An embodiment relates generally to a method of selecting certificates. The method includes invoking a send option for an email client and displaying a send mail user interface for the email...
8572708 Method and arrangement for integration of different authentication infrastructures  
A method that provides efficient integration of infrastructure for federated single sign on (e.g. Liberty ID-FP framework) and generic bootstrapping architecture (e.g. 3GPP GAA/GBA architecture)...
8572382 Out-of band authentication method and system for communication over a data network  
A method and system for out-of-band authentication of messages transmitted, e.g. as packets, on a communication network, whereby a first stream of data is received by a sender control module from...
8572383 Key exchange device, key exchange processing system, key exchange method, and program  
A key exchange apparatus according to the present invention includes storage 250 and arithmetic controller 260 and performs a key exchange process with an external companion apparatus through a...
8572389 System and method for protecting master encryption keys  
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices....
8572381 Challenge protected user queries  
A method, apparatus and computer program product for providing challenge protected user queries on a local system is presented. A query is presented to a user. A response to the query is received...
8566578 Method and system for ensuring compliance in public clouds using fine-grained data ownership based encryption  
A method and system for ensuring compliance in public clouds using fine-grained encryption based on data ownership that includes a process for ensuring compliance in public clouds using...
8564809 Printing system for maintaining confidentiality of print jobs  
A printing apparatus to process a print job is provided. The printing apparatus includes a printing unit to form an image according to print data, a displaying device to display information...
8566587 Network system and method for operating network system  
A control network system connected with a node having a unique identifier includes a KDC4B for distributing a first key to the node for cryptographic communication, a PS4B for supplying a function...
8566908 Database application security  
A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a...
8560655 Methods and apparatus for controlling the transmission and receipt of email messages  
Methods and apparatus for identifying unwanted email messages by transmitting metadata with an outbound email message that indicates the total number of email messages sent by that sender in a...
8559637 Securing information exchanged via a network  
A privacy key is provided over a network. An information page is provided over the network. A submission of data that is to be transmitted over the network in response to the information page is...
8560820 Single security model in booting a computing device  
A method and apparatus for securely booting software components in an electronic device to establish an operating environment are described herein. According to an aspect of the invention,...
8560859 Double authentication for controlling disruptive operations on storage resources  
A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first...
8561206 System, method, and computer program product for allowing access to data based on a recipient identifier included with the data  
A system, method, and computer program product are provided for allowing access to data based on a recipient identifier included with the data. In use, data is received at a device of a recipient....
8561173 Authentication processing apparatus, authentication processing method, recording medium storing authentication processing program, recording medium storing information processing program and information processing system  
An authentication processing apparatus, which includes: an authentication processing section that performs authentication using an authentication method selected from authentication methods...
8560839 Tamper proof location services  
A secure location system is described herein that leverages location-based services and hardware to make access decisions. Many mobile computers have location devices, such as GPS. They also have...
8553245 Management of image forming apparatus based on user authentication  
An image forming apparatus connected via a network with an authentication server for user authentication based on biometric information about a user. The image forming apparatus is also connected...
8555067 Methods and apparatus for delivering electronic identification components over a wireless network  
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated...
8554749 Data file access control  
In one embodiment, a data file and policy are generated. The policy is then associated with the data file, wherein the policy includes one or more unassigned accounts and an access control...
8555065 Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors  
A system and method for encoding, transmitting and decoding data is described which defines a plurality of bit patterns into a predetermined color combination of red/green/blue colors. A message...
8549087 Methods and systems for allocating and indicating trustworthiness of secure communications  
Embodiments of the present invention enable allocating and indicating the trustworthiness of a message, especially messages that comprise content that has been digitally signed. In some...
8548172 Secure dissemination of events in a publish/subscribe network  
Various embodiments of systems and methods to securely disseminate events in publish/subscribe network are described herein. One or more subscribers are authorized to receive events from a...
8549598 Multifunction apparatus, authentication server, and multifunction apparatus control system  
A multifunction apparatus 21 of the present invention communicates with an information processing apparatus 51 via a communication network 50. The multifunction apparatus 21 includes an apparatus...
8549316 Method and apparatus for password output  
A method and an apparatus for account and/or password output are disclosed. In the present invention, a hot-key corresponding to an account and/or a password is set in advance. By entering the...
8549296 Simple authentication of messages  
Methods and systems for using simple authenticated messages are disclosed for use with implementing (i) synchronization schemes, (ii) encoded control messaging schemes, and (iii) encrypted data...
8549287 Ciphering as a part of the multicast concept  
The invention proposes a method for transmitting a message to a plurality of user entities in a network by using a multicast service, comprising the steps of encrypting a multicast message by...
8547201 Protective-control measuring system and device and data transmission method  
According to one embodiment, when sending a transmission target main data 21, an authentication-tag generator unit 13 generates an authentication tag 23 by using a main data 21 and a key data 22...
8549314 Password generation methods and systems  
Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of...
8548163 Simultaneous scalar multiplication method  
In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in...
8544084 System and method for secure control of resources of wireless mobile communication devices  
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset....
8543091 Secure short message service (SMS) communications  
Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of providing secure Short Message...
8543799 Client authentication during network boot  
A secure mechanism for performing a network boot sequence and provisioning a remote device may use a private key of a public key/private key encryption mechanism to generate a command by a server...
8543827 Methods and systems for providing access control to secured data  
In a system for providing access control management to electronic data, techniques to secure the electronic data and keep the electronic data secured at all times are disclosed. According to one...