Match Document Document Title
7770218 Method and system for clearing a password on a computer  
A system for clearing a password on a computer, the system includes an unlocking apparatus corresponding to a keyboard interface of the computer. The unlocking apparatus includes contacts and are...
7765392 Method and apparatus for establishing processor as core root of trust for measurement  
A programmable processor calculates a hash value of a memory region, then monitors program operation to detect a security monitoring system initialization. The hash value is added to extend a...
7765602 Storage on-demand system, and method for processing data in the same  
Data in a storage area to be returned from among storage areas of a storage system is deleted without fail, thereby ensuring data security. When a user's storage-on-demand management program 24 is...
7761905 Method and system for assigning access rights in a computer system  
The invention relates to a system and a method for assigning access rights in a computer system. The system transforms an existing system of access rights to a more structured system. In many...
7761654 System and method of utilizing off-chip memory  
One or more methods and/or systems of utilizing a memory external to an integrated circuit chip are presented. In one embodiment, the system comprises an Integrated circuit containing a logic...
7761910 System and method for assigning an identity to an intelligent electronic device  
A power management architecture for an electrical power distribution system, or portion thereof, is disclosed. The architecture includes multiple intelligent electronic devices (“IED's”)...
7757281 Privilege restriction enforcement in a distributed system  
Remote administrative privileges in a distributed system are disabled by default. To administer a remote system, express action is taken to elevate a user status to obtain remote administrative...
7747869 Process for detecting defective component exchanges  
Method of detecting an unauthorized exchange of components in the case of a technical system, where the control unit (1) sends an encoded message (3) to a component (2) to be checked, in a data...
7748029 Authentication query strategizer and results compiler  
Embodiments of the present invention encompass systems and methods for use in identity authentication. One illustrative application is in the context of authenticating the identity of a subject by...
7748046 Security claim transformation with intermediate claims  
Systems and methods directed at transforming security claims in a federated authentication system using an intermediate format. The systems and methods described herein are directed at...
7743254 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
7742599 Apparatus and method for an iterative cryptographic block  
A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received...
7739734 System and method for protecting a BIOS from unauthorized modifications  
A method for protecting a BIOS from unauthorized modifications includes the steps of: providing a password storing region (122) configured for storing a first password of the BIOS; copying the...
7734757 Method and system for managing shared information  
A method and system for allowing communication devices to synchronously manage shared information are provided. A sender sends single-photon pulses modulated with original random numbers to a...
7735121 Virtual pad  
A system and method for communicating information over an insecure communications network include one or more computing devices that may access a first server via the communication network. In...
7734930 Click passwords  
Methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile and optionally determines offsets for select tiles. Further,...
7730529 Method of operating a computer system and computer system  
A method of operating a computer system comprises the following steps: installing an executable main module of a program on the computer system, storing module data for the main module and/or for...
7725928 System and method for establishing temporary and permanent credentials for secure online commerce  
One embodiment of the present invention provides a system for establishing temporary and permanent credentials for secure remote data access. The system includes a temporary smart card configured...
7725730 Cryptographic methods and apparatus for secure authentication  
Secure authentication protocols, particularly well-suited for use in authenticating mobile communications devices having limited computational resources, are disclosed. In an illustrative...
7720221 Privacy-enhanced e-passport authentication protocol  
A passport authentication protocol provides for encryption of sensitive data such as biometric data and transfer of the encryption key from the passport to the authentication authority to permit...
7707428 Personal identification number recovery method  
Systems and methods are described for recovering a personal identification number. A method, includes: comprising recovering from a lost personal identification number situation and restoring...
7707625 Credential processing device event management  
In a method of monitoring a group of credential processing devices, credential substrates are processed using the credential processing devices of the group. Next, event outputs are received. Each...
7707225 Information processing apparatus, information processing method, and program  
An information processing apparatus configured to perform cryptographic processing in response to a request from a server transmitting encrypted information to control an integrated circuit chip...
7698563 Device and method for inputting password using random keypad  
A device and a method for inputting passwords in ATM or door-lock and etc, having display means are provided. In particular, said device comprises a keypad in display means where numbers or...
7681228 Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions  
Financial institution back office computerized transaction-processing system with embedded privacy and security layer (EPSL) enables strong transaction authentication prior to a merchant or vendor...
7676847 Application execution device, application execution method, integrated circuit, and computer-readable program  
An application is activated with access permission to resources which are granted to unsigned applications. In parallel with the execution of the application, tamper check is performed on the...
7665667 System and method for updating access control mechanisms  
Updating the access control of a smart card at multiple points of the smart card life cycle. The system and method for updating the access control mechanisms during the smart card life cycle...
7669236 Determining whether to grant access to a passcode protected system  
The security of an entity is protected by using passcodes. A passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The...
7669235 Secure domain join for computing devices  
A technique is provided for acquiring security domain access credentials on a computing device. The security domain access credentials are acquired by storing a persistent identity on the...
7669053 System and method for using acoustic digital signature generator as oracle  
A hand-held sonic token can be used as a pseudorandom oracle for a requesting application, which can generate a challenge that is sent to the token. The user of the token decides whether to allow...
7661132 Tag privacy protection method, tag device, backend apparatus, updater, update solicitor and record medium carrying such programs in storage  
A tag device causes a second calculator to read a confidential value from a confidential value memory and to apply a second function F2 which disturbs a relationship between elements of a...
7660981 Verifiable chain of transfer for digital documents  
Methods and apparatus, including computer systems and program products, related to techniques for creating a chain of transfer for a digital document in which every transferor and transferee...
7657532 Password management device, password management method, and password management program  
There is provided a password management device, password management method, and password management program to carry out secure logon. The management device includes: a first password storage...
7650633 Automated organizational role modeling for role based access controls  
Generally speaking, systems, methods and media for automatically generating a role based access control model (RBAC) for an organizational environment with a role based access control system such...
7650498 Secure data provision method and apparatus and data recovery method and system  
To control access to target data whilst relieving the data provider of policing obligations, the data provider provides the target data in encrypted form to a requesting party as part of a data...
7639798 High speed data encryption architecture  
The present invention provides a high speed data encryption architecture in which fabric elements are communicatively coupled to one another via a hardwired interconnect. Each of the fabric...
7630941 Performing horological functions in commercial transactions using time cells  
Mechanisms for controlling a commercial transaction are presented. An article of manufacture has a time cell that is read by an electronic apparatus. In response to a determination of a state of...
7631188 Hierarchical open security information delegation and acquisition  
The invention provides a method and system for secure data transfer and dynamic definition of trustworthiness of various entities by multiple parties in a hierarchy tree or graph structure. The...
7631187 Method for the initialisation of mobile data supports  
With the method, mobile data carriers (IM) are initialized at assigned decentralized read and write stations (WR) within the framework of an authorization system (A). At an authorization authority...
7627895 Trust tokens  
A token issuer and an authentication device provide an identity confirmation device. A token issuer is programmable by a central identity provider to issue certification tokens for use in...
7624441 CA in a card  
A secure method for generating digital documents that are certified by a known authority, comprising the steps of: A. Programming an electronic device with a document issuing method that...
7623666 Automatic setting of security in communication network system  
A communication network system has a plurality of interconnected sub-networks, at least one mobile node having a care-of address dependent on a sub-network currently connected thereto and a home...
7624278 Resetting access account passwords of a multitude of compartmentalized systems  
A method for resetting access account passwords using an interactive voice response system (IVR) can include the step of the IVR receiving a user request to reset a password. Account...
7620737 Methods, apparatus, and program products for abstract applications/components in a ubiquitous computing environment  
Methods, apparatus and program products for using historical contextual data in a ubiquitous computing environment. The historical contextual data can be dispersed among components in an...
7620984 Method of managing computer system  
An embodiment of a method of managing a computer system begins with a step of placing a virtual machine monitor on a computer. The virtual machine monitor includes an interface for a module. The...
7617524 Protection against denial-of-service attacks  
The invention proposes a method for handling authentication requests in a network, wherein the authentication requests may have different types, the method comprising the steps of determining (S1,...
7614082 System and method for privilege management and revocation  
The present disclosure relates generally to the management of privileges associated with certain applications that are accessible by users of electronic equipment, such as, for example, networked...
7614081 Managing and sharing identities on a network  
A digital content file having user history information is received at a first device. The user history information includes an alias name of a previous user of the digital content file. A user may...
7603469 Provisioning aggregated services in a distributed computing environment  
Methods, systems, and computer program products are disclosed for provisioning software resources used with aggregated web services. The disclosed techniques enable heterogeneous identity systems...
7600252 System method and model for social security interoperability among intermittently connected interoperating devices  
System, device, method, and computer program and computer program products for providing communicating between devices having similar or dissimilar characteristics and facilitating seamless...