Match Document Document Title
8042157 System for restricting data access  
A filter is arranged to selectively block or allow a data access command from an initiator according to whether the initiator is secure or insecure and whether a data source or destination being...
8041955 Grid mutual authorization through proxy certificate generation  
A mechanism for mutual authorization of a secondary resource in a grid of resource computers is provided. When a primary resource attempts to offload a grid computing job to a secondary resource,...
8042174 Image processing device  
An image processing device is provide with an external storage which is detachably connectable to the image processing device, an inputting unit configured to allow a user to input user...
8032927 Verification engine for user authentication  
Computer-implemented system and methods for authenticating the identity of a person, for example a customer (1) of an E-Commerce web site (15). The web site or other verification “client” (110)...
8032935 Security synchronization services  
As a result of the inability to assign security in multiple applications at one time, there is an opportunity to tie the disparate security systems together. Security synchronization services is a...
8024566 Persistent storage implementations for session data within a multi-tiered enterprise network  
A system is described in which similar session objects are managed within session domains. In addition, in one embodiment, a persistence storage interface is employed which maps each session...
8024575 System and method for creation and use of strong passwords  
The system and method uses user generated questions and answers of multiple levels for added protection from adversaries. There are a first set of question(s) and answer(s) corresponding to the...
8024577 Password recovery system  
The present invention provides a password recovery system that re-supplies a password to only the legitimate user of the password. The password recovery system includes a memory card with CPU and...
8024791 Providing hints while entering protected information  
One or more hints can be presented during the entry of protected information. Traditionally, for security reasons, the protected information is displayed as ambiguous characters, hindering the...
8024775 Sketch-based password authentication  
A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of the user and an input edge...
8015116 Methods for authentication  
A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is configured to receive a unique user...
8015597 Disseminating additional data used for controlling access  
Issuing and disseminating a data about a credential includes having an entity issue authenticated data indicating that the credential has been revoked, causing the authenticated data to be stored...
8011007 Out-of-band tokens for rights access  
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an...
8006294 System and method for single sign-on  
The single sign-on is implemented without requiring knowledge of a lower layer such as HTTP and HTML by using a single sign-on module which stores knowledge to store single sign-on and a single...
8006291 Multi-channel multi-factor authentication  
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security...
8006097 Password generation using genre selection  
Presently disclosed herein are a method, system, and computer-readable medium for managing a user-defined genre-based password. In one embodiment, the method includes steps for creating a...
8006300 Two-channel challenge-response authentication method in random partial shared secret recognition system  
Random partial shared secret recognition is combined with using more than one communication channel between server-side resources and two logical or physical client-side data processing machines....
8006298 Fraud detection system and method  
A computer implemented method is provided for detecting potential fraud or unauthorized activity when resetting an application password in an application in which a computer system including a...
8001376 Fixed client identification system for positive identification of client to server  
A tamperproof ClientID system to uniquely identify a client machine is invoked upon connection of a client application to a backend. Upon initial connection, the backend issues a unique ClientID...
8001387 Removable storage medium with biometric access  
In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and...
7996883 Centralized identity management for delegating resource management in a technology outsourcing environment  
Delegating resource management to customers in a technology outsourcing environment includes providing the customer with a secured user interface (e.g., HTML pages) for selecting one or more...
7996891 Systems, methods and computer program products for generating anonymous assertions  
Systems, methods and computer program products for generating anonymous assertions. Exemplary embodiments include a method for generating anonymous assertions, the method comprising engaging...
7996680 Secure data log management  
In one embodiment a secure computer system comprises a processor and a memory module including logic instructions stored on a computer readable medium which. When executed by the processor, the...
7984499 Processing device and associated methodology for authorized device certificate updating  
A configuration for preventing authentication processing due to continuous use of an old authorized device certificate, and illegal use of contents is provided. An arrangement is made wherein with...
7984488 Credential roaming in electronic computing systems  
An exemplary system enabling credential roaming among a plurality of different computing devices may include an event handler to receive event notifications such as, e.g., a client logon. The...
7984491 System, method and program for off-line user authentication  
Disclosed is an off-line user authentication system, which is designed to present a presentation pattern to a user subject to authentication, and apply a one-time-password derivation rule serving...
7971241 Techniques for providing verifiable security in storage devices  
A verifiable security mode is provided for securing data on a storage device, such as a hard disk drive. When the verifiable security mode is enabled, only authenticated accesses to data stored on...
7971242 Printing system  
This invention provides a printing system which reduces cost while stably operating an authentication server function associated with a print process. To accomplish this, this invention relates to...
7966649 System and method for login resistant to compromise  
A method for authentication to a computer system by providing a challenge display presenting a plurality of possible second passwords, each of which is associated with an individual response code,...
7966489 Method and apparatus for selecting an appropriate authentication method on a client  
In one embodiment, a method for facilitating authentication and ease the configuration of authentication includes receiving a credential type selection and selecting one or more authentication...
7958547 Single sign-on method for web-based applications  
A method for single-sign on of a user on a client machine to one or more target applications on target application servers in a computer information-processing network, including: accessing an...
7958348 Method for securing an electronic certificate  
A method is for securing and verifying an electronic certificate issued by an authority to an owner. The certificate is stored in the memory of a user unit operated by the owner. The user unit...
7958362 User authentication based on asymmetric cryptography utilizing RSA with personalized secret  
A method for authenticating a user to a computer system is disclosed, comprising using a first input and a second input in producing a digital signature in response to a challenge. The digital...
7954152 Session management by analysis of requests and responses  
Session management by analysis of requests and responses is described herein. A gateway receives requests from a client system, forwards the same to a protected resource, and receives responses...
7954147 Method for securely enabling dynamic instrumentation  
A method is provided for securely enabling dynamic instrumentation. The method includes categorizing probes, upon creation, into one or more classes, providing lists of permissions for activating...
7949137 Virtual disk management methods  
Virtual disks management methods and systems. First, a file space is set and a first password is set. A first device code is acquired. The file space is encrypted according to the first password...
7949879 Secure password entry  
Secure password entry is facilitated by displaying a password prompt comprising a changing stream of random characters, where a particular character within the stream of random characters is...
7945948 System, method and program for off-line user authentication  
Disclosed is an off-line user authentication system, which is designed to present a presentation pattern to a user subject to authentication, and apply a one-time-password derivation rule serving...
7941845 Systems and methods for controlling production quantities  
Systems and methods are provided for controlling the number of products produced by contract manufacturers in order to prevent unauthorized overproduction. Each authorized device that is produced...
7941835 Multi-mode credential authorization  
A method for authenticating an identity involves first receiving a first credential over a first communications channel, and determining a second communications channel provisionally associated...
7941785 System and method for managing information objects  
A system and method for managing information on a network using an identity index may include a software program stored on a computer-readable medium which is operable to associate one or more...
7937754 Information processing apparatus, control method for the apparatus, and information processing system  
Update firmware is stored as one binary file. The binary file includes firmware data necessary for operating a controller unit and root certificate data necessary for a printer apparatus to...
7930591 Method and apparatus for providing intelligent error messaging  
A method and apparatus for providing intelligent error messaging is disclosed wherein a user of a mobile communications device is provided with descriptive error messaging information to assist...
7930735 Service management framework  
Articles and associated methods, systems, and computer program products relate to a service framework to register multiple plug-ins on a client and to provide access to functionality that would...
7926102 Confidential content search engine method  
A confidential content search engine method is provided. With the method, a security compliance search engine is provided for searching one or more client computing devices for items of...
7926089 Router for managing trust relationships  
One embodiment relates to a method of managing trust relationships between federated identity and service providers. An assertion of a user identity is received from an identity provider via a...
7917941 System and method for providing physical web security using IP addresses  
A system and method for providing security for an Internet server. The system comprises: a logical security system for processing login and password data received from a client device during a...
7917768 System control via characteristic gait signature  
A device includes an access control element to compare new acceleration data from an accelerometer with registered gait signature associated with an authorized user of a mobile device to determine...
7913301 Remote feature activation authentication file system  
A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component is provided. The system includes an authentication file...
7908648 Method and system for enabling remote access to a computer system  
Method and systems configured for allowing a non-local remote user to access a computer system with a particular authorization level. Such access is facilitated by examining non-local directory...