Match Document Document Title
9043902 Apparatus for controlling processor execution in a secure environment  
Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a...
9043898 Access management system  
An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is...
9043867 Information sharing  
Systems and methods for the sharing of information between organizations are disclosed. Policies that govern the permissions for the sharing of information are represented as Boolean functions...
9043827 Method and system for providing conditional access to encrypted content  
A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network....
9041812 Automated authorization to access surveillance video based on pre-specified events  
Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a...
9043863 Policy enforcing browser  
A web browser that includes a network policy enforcement unit, a storage policy enforcement unit, and an ancillary policy enforcement unit is disclosed. The network policy enforcement unit...
9043899 Variable domain resource data security for data processing systems  
The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product...
9036172 Image forming apparatus, image forming method, and storage medium  
An image forming includes a predetermined-act acquisition unit, an output control unit, and an image forming unit. The predetermined-act acquisition unit is configured to obtain a predetermined...
9038164 Electronic device, electronic device controlling method, and computer program product  
An electronic device includes: display controller; user presence determination module; user authentication module; and controller. The user presence determination module determines presence of a...
9038169 Method and system for managing and controlling direct access of an administrator to a computer system  
A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the...
9038165 Information processing apparatus, information processing system, and computer program product  
According to an embodiment, there is provided is an information processing apparatus including: a storage unit that stores therein information, which is set for a screen to be displayed on an...
9032509 Identity verification in virtual worlds using encoded data  
An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential...
9030993 Communication device, connection method and storage medium  
In order that even a wireless terminal whose an unique ID is not registered in the filter list can use simply the access point without a prior setting task by user, a communication device includes...
9030946 Method of securing network access radio systems  
A method of providing security for network access radio systems and associated access radio security systems used with the systems. The method includes connecting an access radio having a radio...
9031536 Method for mitigating the unauthorized use of a device  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
9032479 Method, mobile terminal and system for providing different authentication values according to contact method of mobile terminal  
System and method of authenticating a terminal. An authentication system which provides an authentication value specified by a tilt angle of a terminal, includes a terminal which measures the tilt...
9027084 Methods and apparatuses for securely operating shared host devices with portable apparatuses  
The present invention provides methods and apparatuses that utilize a portable apparatus to securely operate a host electronic device. Typically, each portable apparatus includes a data storage...
9027118 Image processing apparatus, control method, and computer-readable storage medium for computer program  
An image processing apparatus performs specific processing on images read out of a document having pages as follows. Each of the pages is a member assigned to at least any one of groups. The...
9027119 Authentication frequency and challenge type based on application usage  
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g.,...
9027117 Multiple-access-level lock screen  
A multiple-access-level lock screen system allows different levels of functionality to be accessed on a computing device. For example, when a device is in a locked state, a user can select (e.g.,...
9021579 Smartphone data backup and restoration system  
A Smartphone data backup and restoration system on a physical layer is connected to a Smartphone through a data transmission line, and the data backup and restoration system and the Smartphone are...
9021556 System and method for virtual device communication filtering  
Embodiments of the present invention are directed to a method and system for virtual device communication filtering. The method includes receiving, within an electronic system, an instantiation...
9015798 User authentication using pointing device  
Methods and apparatus for performing user authentication using pointing device gestures are disclosed. An example method includes receiving, by a computing device, input data from a pointing...
9015805 Terminal activation method  
The invention relates to a method for activating a terminal (4) by an operator, the activation of the terminal allowing secured exchanges of information between the terminal (4) and a secured...
9015809 Establishing connectivity between an enterprise security perimeter of a device and an enterprise  
A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security...
9009844 Methods and apparatus for knowledge-based authentication using historically-aware questionnaires  
Knowledge-based authentication (KBA) is provided using historically-aware questionnaires. The KBA can obtain a plurality of historically different answers from the user to at least one question;...
9009777 Automatic role activation  
A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set...
9009705 Authenticated distribution of virtual machine images  
A computer implemented method, a computer program product, and a computer distribute a virtual machine image. A request for a virtual machine image is received. Responsive to receiving the request...
9009486 Biometric authentication apparatus, biometric authentication method, and computer readable storage medium  
An authentication processing device receives biometric data to be checked from a biometric measuring device; transforms the biometric data that is input from the biometric measuring device by...
9009278 Device management server, device management client, and method for locating a target operation object  
In the field of communications, to solve the problem in the prior art that a device management (DM) server needs to communicate with user terminals for multiple times to obtain Uniform Resource...
9009840 Validating machine images  
In a resource-on-demand environment, virtual machine images are validated before use. A provider or source of a virtual machine image may generate a manifest, indicating executable components of...
9003514 System and method to troubleshoot a defect in operation of a machine  
A system and method to troubleshoot a defect in at least one machine is provided. The system includes a portable device having a tracking system to detect when within a threshold proximity of a...
9003188 Recording medium device, terminal device, distribution device, control method, and program recording medium  
When the terminal device attempts to use a special content, which has an attribute including information distinguishing the special content from regular contents and is stored in the recording...
8994982 Image forming device, image forming method, and image forming program  
The image forming device includes an image data input unit that receives image data of a document; a set password acquisition unit that acquires information regarding a password from the image...
8997210 Leveraging a peripheral device to execute a machine instruction  
A method includes executing microcode in a processing unit of a processor to implement a machine instruction, wherein the microcode is to manipulate the processing unit to access a peripheral...
8996880 System and method for providing access to an information handling system  
An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a...
8997243 Temporal proximity to verify physical proximity  
A security system assesses the response time to requests for information to determine whether the responding system is in physical proximity to the requesting system. Generally, physical proximity...
8996860 Tolerance factor-based secret decay  
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach...
8997191 Gradual template generation  
Embodiments of the invention relate to collecting keystroke timing data of samples of a phrase input by a user on an input device during different user sessions, and creating a biometric user...
8994978 Image processing apparatus that facilitates printing of password-protected documents, and corresponding method for forming images  
An image forming apparatus performs a direct printing function. A selecting section selects at least two files from a plurality of files stored in at least one of an internal storage medium and an...
8997215 Authentication using multi-tier multi-class objects  
The invention provides a method and apparatus for authenticating a user in a touchscreen environment. A first tier may be defined having at least one object, and a destination tier may be defined...
8997209 Memory device comprising a plurality of memory chips, authentication system and authentication method thereof  
A memory device includes a plurality of memory chips, including one or more memory chips that store authentication information, and a controller including a first register that stores information...
8997184 Systems and methods for providing a one-time authorization  
Systems and methods for presenting a request are disclosed. The systems and methods may include one or more steps, such as receiving, by an electronic device, request information from an entity....
8997216 Recording medium apparatus and control method for authenticating a device based on a revocation list  
A storage unit 601g of a recording medium device 600g stores a content and a revocation list. The revocation list includes a revocation identifier that is associated with the content and...
8990884 Quantifying risk based on relationships and applying protections based on business rules  
An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request...
8990925 Security for a non-3GPP access to an evolved packet system  
A home subscriber server (400) receives a request for authentication information from an authentication server (300) and transforms cryptographic keys for a user equipment (100) into access...
8989386 Method and device for providing at least one secure cryptographic key  
A device is configured for providing at least one secure cryptographic key for performing a cryptographic security function using a control device which requires a cryptographic key therefor. A...
8989452 Method for authenticating identity of handset user  
A method for authenticating the identity of a handset user is provided. The method includes: obtaining, a login account and a password from the user; judging whether the login account and the...
8989380 Controlling communication of a wireless communication device  
In a system and method of controlling a wireless communication module in communication with an electronic device, when a manufacturer certificate, a wireless device credential, and a user...
8990893 Enterprise application session control and monitoring in a large distributed environment  
Mechanisms are provided for performing centralized control of application sessions across a distributed computing environment comprising a plurality of application servers. A request to perform an...