Match Document Document Title
7350228 Method for securing digital content  
A method for secure distribution of digital content to an untrusted environment, comprising the steps of; constructing a relatively trusted environment within the untrusted environment;...
7346923 Federated identity management within a distributed portal server  
Techniques are disclosed for federating identity management within a distributed portal server, leveraging Web services techniques and a number of industry standards. Identities are managed across...
7343623 Authentication query strategizer and results compiler  
Embodiments of the present invention encompass systems and methods for use in identity authentication. One illustrative application is in the context of authenticating the identity of a subject by...
7340600 Authorization infrastructure based on public key cryptography  
A public key authorization infrastructure includes a client program accessible by a user and an application program. A certificate authority issues a long-term certificate that binds a public key...
7334261 Machine post-launch configuration and option upgrade with master key  
By providing a secure EEPROM (Electrically Erasable Programmable Read Only Memory) device or other non-volatile memory (NVM) in an arrangement of a master key system operation key (SOK) plus any...
7325121 System and method of utilizing off-chip memory  
One or more methods and/or systems of utilizing a memory external to an integrated circuit chip are presented. In one embodiment, the system comprises an integrated circuit containing a logic...
7324645 Method to authenticate a mobile station, a communications system and a mobile station  
A method to authenticate a mobile station B in a mobile network, so that the mobile station B is authenticated and an encryption key is agreed between mobile stations A and B using user data...
7322043 Allowing an electronic device accessing a service to be authenticated  
A method for allowing an electronic device accessing a service to be authenticated. A communications device is loaded with a first identifier. To gain access to the service, the communications...
7315946 Out-of-band tokens for rights access  
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an...
7315949 Method and system for providing a personal identification security feature to a portable computing device  
One embodiment in accordance with the present invention includes implementing a personal digital assistant (PDA) with a wireless personal identification mechanism. Specifically, the wireless...
7313814 Scalable, error resilient DRM for scalable media  
An exemplary digital rights management engine and related methods divides multimedia content into service level layers, encrypts at least some of the layers, and offers access to the encrypted...
7310814 Service providing system, service providing apparatus, service providing method, and program for implementing the method  
There is provided a service providing system that is capable of preventing personal information on a user who has used a service from being leaked to other users without spoiling the convenience...
7308707 Communication and authentication of a composite credential utilizing obfuscation  
A method of communication is such that a first party (30) communicates a composite credential (54) across a distributed electronic network (44) to a second Party (32). The composite credential...
7305701 Methods and arrangements for controlling access to resources based on authentication method  
In accordance with certain aspects of the present invention, improved methods and arrangements are provided that improve access control within a computer. The methods and arrangements specifically...
7305559 Software method for improved password entry  
A software method of authentication is described that uses both relative and absolute values of inter-keystroke intervals measured during entry of a unique identifier. Both the relative and...
7293286 Federated management of content repositories  
A method for integrating a plurality of content repositories into a virtual content repository (VCR), comprising providing credential information to each one of said plurality of content...
7292230 Method of deactivating device lock state, and electronic device  
An electronic device comprises a touch screen and is configured to enter a lock state upon the fulfilment of a predetermined condition. The device is configured to display one or more images on...
7293292 Method and system for securely and selectively providing optional features or premium functionality in a printer  
A method and system of selectively and securely enabling an added or premium functionality in a printer can be created by transmitting or inputting to the printer an electronic key correlated to...
7286671 Secure network access method  
The present invention provides network-layer authentication protocols for authenticating mobile client and access router to each other. The present invention uses Router Discovery as a carrier to...
7284125 Method and apparatus for personal identification  
A user-worn device 10a that is to be installed in user-worn equipment 30a that can be worn by a user, and a user device 20a that is to be installed in user equipment 40a to be used by the user are...
7284265 System and method for incremental refresh of a compiled access control table in a content management system  
System and method for authorizing access to an entity by a user, by binding an access control list to each entity; specifying for the user a set of user privileges; intersecting the access control...
7284271 Authorizing a requesting entity to operate upon data structures  
Authorizing a requesting entity to have a service perform a particular action in a manner that is at least partially independent of the underlying target data structure. An authorization station...
7275258 Apparatus and method for multi-threaded password management  
An apparatus and method for multi-threaded password management are provided. With the apparatus and method, resources may be grouped into families of resources. A family of resources is defined as...
7272727 Method for managing external storage devices  
An apparatus, system, and method enable a new platform storage system to have access to an external storage system having data encrypted thereon by an existing platform storage system. Encryption...
7269726 Lightweight public key infrastructure employing unsigned certificates  
A public key infrastructure (PKI) includes a subject, a verifier, and certificate authority that issues a first unsigned certificate to the subject that binds a public key of the subject to...
7266838 Secure resource  
Preventing replay attacks without user involvement. A method according to one embodiment of the invention includes recording a serial number that was verified following a previous request to...
7263718 Security framework for supporting kernel-based hypervisors within a computing system  
An inventive security framework for supporting kernel-based hypervisors within a computer system. The security framework includes a security master, one or more security modules and a security...
7257834 Security framework data scheme  
The present disclosure is a method for bridging requests for access to resources between requestors in a distributed network and an authenticator servicing the distributed network. The bridging...
7254830 Insertion of messages in digital data  
The invention proposes a method of inserting a message in a subset (VO) of digital data representing physical quantities, characterized in that it includes the steps of: estimating (E4) a capacity...
7249379 Method and apparatus for implementing process-based security in a computer system  
A method is disclosed for providing process-based security in a special purpose computer system, comprising the steps of: configuring the special purpose computer with an operating system and at...
7246247 Secure device  
A secure device is provided that can store programs therein, the secure device including: a low-protection level storage unit; a high-protection level storage unit; a program acquiring unit that...
7246374 Enhancing computer system security via multiple user desktops  
Users can create multiple different desktops for themselves and easily switch between these desktops. These multiple desktops are “walled off” from one another, limiting the ability of processes...
7243239 Click passwords  
Methods, systems, devices and/or storage media for passwords. An exemplary method tiles an image, associates an index with each tile and optionally determines offsets for select tiles. Further,...
7240367 User interface and method for inputting password and password system using the same  
A password system and a method for authenticating a user of such a password system are disclosed. The present invention provides a novel method for inputting a password which is capable of...
7237117 Universal secure registry  
A secure registry system and method for the use thereof are provided which permits secure access to a database containing selected data on a plurality of entities, at least portions of which...
7234157 Remote authentication caching on a trusted client or gateway system  
In a system providing for user access of secure resources upon user authentication by a remote authentication server, a successful user authentication is saved locally for use when the...
7222365 Non-algorithmic vectored steganography  
According to the invention, a system for verifying a steganogram is disclosed. Included in the system are a first system, a second system, a steganogram, and a steganogram preparer. The first...
7222362 Non-transferable anonymous credentials  
An anonymous credential system which requires a user who is asserting a credential to have knowledge of the master key of the user who was originally granted that credential. In order for a user...
7219234 System and method for managing access rights and privileges in a data processing system  
An improved system and method is provided for managing system-level privileges and for granting access rights to system resources within a data processing system. System-level privileges are...
7210167 Credential management  
Described herein is an implementation of a technology for managing credentials. With an implementation, a credential manager is domain-authentication aware and concurrent authentications with...
7206938 Key sequence rhythm recognition system and method  
A user recognition and identification system and method is presented in which text entered by a user at a keyboard is evaluated against previously recorded keystrokes by the user for the presence...
7194591 Data communication apparatus and method for managing memory in the same  
A plurality of services are defined for one service memory field (overlap service), and a plurality of access methods, such as “only read” and “read/write”, are set in the service memory field....
7188358 Email access control scheme for communication network using identification concealment mechanism  
An email access control scheme capable of resolving problems of the real email address and enabling a unique identification of the identity of the user while concealing the user identification is...
7185363 Using a first device to engage in a digital rights management transaction on behalf of a second device  
A first device is used to initiate and direct a rights-management transaction, such as content licensing, acquisition, or activation, on behalf of a second device. The first device may, for...
7185364 Access system interface  
An access system provides identity management and/or access management services for a network. An application program interface for the access system enables an application without a web agent...
7181764 System and method for a subscription model trusted email database for use in antispam  
The invention is directed to implementing a trust rating subscription model for email addresses and/or domains in a trust-oriented email network that is supported by a deployment of a trusted...
7178167 Method for preventing unauthorized access to information equipment  
Unauthorized access to a computer is disclosed by providing information to an authorized user to evaluate accesses to the computer. The computer or other information equipment increments a value...
7177426 Electronic file protection using location  
An invention for electronic file protection using location and other entropy factors is provided. Environment information regarding a computer is obtained, wherein the environment information...
7171687 Contents distribution apparatus  
To acquire contents prior to a distribution request from a client in a time zone having sufficient network bandwidth, and efficiently use network bandwidth. An access trends analysis handler...
7168091 Method and system of transaction security  
A method and system for secure authentication of a user in a session conducted over an interactive communication channel, such as a two-way telephony communication channel, with an authenticating...