Match Document Document Title
9043599 Method and server for providing a mobility key  
A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to...
9038178 Detection of malware beaconing activities  
Malware beaconing activity detection is disclosed, including: monitoring a plurality of conversations between an internal device and one or more external destinations; extracting feature sets...
9037867 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...
9038150 Provisioning device for performing provisioning of a field device  
There is provided a provisioning device which provides, in advance, setting information necessary for joining in a wireless network to a first field device which is to newly join the wireless...
9038195 Accessing a cloud-based service using a communication device linked to another communication device via a peer-to-peer ad hoc communication link  
Arrangements described herein relate to accessing a cloud based service. Responsive to a user of a first communication device initiating access to the cloud based service via the first...
9038192 Cryptanalysis method and system  
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
9037844 System and method for securely communicating with electronic meters  
An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link...
9032207 Method and system for processing digital content according to a workflow  
A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content,...
9032209 Optical network terminal management control interface-based passive optical network security enhancement  
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical...
9032487 Method and system for providing service access to a user  
A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local...
9031235 Method and apparatus for use in a downloadable conditional access system  
In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor....
9032494 Network-based revocation, compliance and keying of copy protection systems  
A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target...
9026793 Method for installing rights object for content in memory card  
A method of receiving, by a memory card, a rights object (RO) from a rights issuer (RI) via a terminal. The method includes: receiving from the terminal, a provisioning setup request message...
9027136 Automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP...
9021572 Anonymous access to a service by means of aggregated certificates  
A method of anonymous access to a service, comprising the allocation, by at least one certifying entity, of a plurality of certificates to a user entity, the certificates being calculated on the...
9021605 Method and system for protecting sensitive data in a program  
To protect sensitive data in program code, a method includes providing a programming interface with a capability of allocating a protected region of memory which can only be accessed by authorized...
9021566 Apparatus and method to securely connect to and manage X11 applications on a remote system through an HTTP client  
A web server authenticates a user with a web client using a database user table and provides a list of new applications, suspended application sessions, and running application sessions. In...
9015853 Concealing access patterns to electronic data storage for privacy  
Methods and systems of concealing access patterns to data storage, such as within servers of a cloud computing environment are presented. Server data storage is securely partitioned into smaller...
9015486 Systems, devices, and methods for outputting alerts to indicate the use of a weak hash function  
Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving...
9015477 System and method for secure asynchronous event notification for adaptive streaming based on ISO base media file format  
System and method embodiments are provided for asynchronous event notification and message handling in dynamic adaptive streaming over hypertext transfer protocol (DASH). The embodiments includes...
9015856 Mobile-device user authentication  
In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second...
9015816 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Key assignment for a brand
 
Systems and methods for providing secured network access are provided. A user device located within range of a branded hotspot initiates a request for the secured network access. The request...
9009793 Dynamic pin dual factor authentication using mobile device  
The present invention provides cost efficient two way authentication method in which the authentication module can be provided as a Plug and Play (PnP) architecture enabling dual layer security...
9009790 Association of multiple public user identifiers to disparate applications in an end-user's device  
Devices and methods are disclosed which relate to managing multiple public user identifiers (PUIDs) in a database by setting customizable access rules and requiring authorization from applications...
9009222 Verifying the transfer of a data file  
Techniques for verifying the transfer from a content provider of a selected data file selected by a client device using a proxy server is disclosed. By creating a local set of characteristics of...
9009814 Systems and methods for generating secure passwords  
A computer-implemented method for generating secure passwords may include 1) displaying a user interface for entering a textual password, 2) receiving user input via the user interface to select a...
9009486 Biometric authentication apparatus, biometric authentication method, and computer readable storage medium  
An authentication processing device receives biometric data to be checked from a biometric measuring device; transforms the biometric data that is input from the biometric measuring device by...
9003491 Secure push and status communication between client and server  
Systems and methods of authentication and authorization between a client, a server, and a gateway to facilitate communicating a message between a client and a server through a gateway. The client...
9003476 Communications security systems  
A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client computer receives one or more security...
9001179 Transmission terminal, transmission method, and computer-readable recording medium storing transmission program  
A transmission terminal transmits video data and display data of a screen shared with another transmission terminal to the other transmission terminal via a predetermined relay apparatus. The...
9003540 Mitigating forgery for active content  
Cross Site Request Forgery (CSRF) and other types of fraudulent submission can be mitigated using state information that typically is already maintained for various users. Each submission...
9003188 Recording medium device, terminal device, distribution device, control method, and program recording medium  
When the terminal device attempts to use a special content, which has an attribute including information distinguishing the special content from regular contents and is stored in the recording...
9003195 Password topology monitoring and enforcement  
The systems and methods described herein can be used for enhancing the security of computer passwords by electronically receiving a password, the password comprising a plurality of components,...
8996871 Method and system for generating ciphertext and message authentication codes utilizing shared hardware  
A method and system for generating ciphertext and message authentication codes utilizing shared hardware are disclosed. According to one embodiment, a method is provided of generating ciphertext...
8996873 Secure session capability using public-key cryptography without access to the private key  
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake...
8990562 Secure deployment of provable identity for dynamic application environments  
An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller instructs a VM host to create a VM...
8990902 Client authentication during network boot  
A secure mechanism for performing a network boot sequence and provisioning a remote device may use a private key of a public key/private key encryption mechanism to generate a command by a server...
8989704 Invisible mode for mobile phones to facilitate privacy without breaching trust  
Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a multi-user communications device,...
8990567 Message originator token verification  
A digital signature of a message originator of a message is validated by a processor on message retrieval by a message recipient as a first-tier validation of the message. In response to a...
8990563 Sending protected data in a communication network  
A method and apparatus for sending protected data from a sender unit to a receiver unit via an intermediate unit. A Transfer Init message that contains a ticket associated with the receiver unit...
8984286 Message originator token verification  
A digital signature of a message originator of a message is validated by a processor on message retrieval by a message recipient as a first-tier validation of the message. In response to a...
8978108 Method, device, and system for service presentation  
A method, device and system for service presentation, which includes: receiving a presentation request message; acquiring presentation information from the presentation request message; storing...
8977854 Automatic user authentication and identification for mobile instant messaging application  
Automatic identification and authentication of a user of a mobile application entails receiving from the wireless communications device a unique device identifier and an e-mail address...
8977844 Smartcard formation with authentication keys  
An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes...
8972730 System and method of using a signed GUID  
A method and apparatus wherein the method includes the steps of generating a globally unique identifier (GUID) for a security system appliance, saving a public key and private key of the security...
8972726 System and method for digital rights management using a secure end-to-end protocol with embedded encryption keys  
Various embodiments of a system and method for digital rights management using a secure end-to-end protocol with embedded encryption keys are described. A DRM framework may implement a secure...
8966262 Methods and apparatus for delivering electronic identification components over a wireless network  
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated...
8966264 Signature generation apparatus, signature method, non-transitory computer readable medium storing signature generation program  
A signature generation apparatus includes basic operation execution units each executing a basic operation included in a signature generation procedure; and a whole operation controller connected...
8966592 Authenticating access to a private account at a public computing device  
A computer-implemented technique is presented. The technique can include selectively initiating, at a mobile computing device including one or more processors, communication between the mobile...
8966263 System and method of network equipment remote access authentication in a communications network  
A system and method are provided for key-based network equipment remote access authentication. A remote client machine and a piece of network equipment perform client-server authentication while...