Match Document Document Title
7159127 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Federated management of content repositories
 
A method for integrating a plurality of content repositories into a virtual content repository (VCR), comprising providing credential information to each one of said plurality of content...
7159240 Operating system upgrades in a trusted operating system environment  
Operating system upgrades in a trusted operating system environment allow a current trusted core of an operating system installed on a computing device to be upgraded to a new trusted core. The...
7155738 System and method for managing a trusted email datastore  
A Trust Email Datastore (TED) system is employed to maintain a list of message addresses with associated trust ratings. The trust rating of a message address is derived from an underlying message...
7152048 Memphis: multiple electronic money payment highlevel integrated security  
A method for a financial services provider to securely process corporate payment requests includes a step of issuing a primary digital certificate to a primary certificate holder of a corporation....
7149310 Method and system for authorizing generation of asymmetric crypto-keys  
A method and system for generating asymmetric crypto-keys usable by network users to transform messages is provided. The system includes a first network station associated with a user, a second...
7150036 Method of and personal computer for displaying content received from a content delivery server using a disk drive which includes a network address for the content delivery server and a server-contacting program  
A personal computer system displays digital content received from a content delivery server. The content delivery server provides the digital content as a result of being contacted by a...
7149311 Methods and apparatus for providing networked cryptographic devices resilient to capture  
Techniques are provided by which a device that performs private key operations (e.g., signatures or decryptions) in networked applications, and whose local private key is activated with, for...
7143440 User authentication system and method  
A user authentication method includes creating an authentication key in the form of a user formula, presenting a user with an arrangement of variables, each assigned a value, applying the assigned...
7136489 Method and system for enhancing network security using a multilateral authorization mechanism  
A method and system is provided for implementing a multilateral authorization quorum in a computer network. The authorization quorum comprises a total number of stakeholders out of which a...
7136488 Microprocessor using asynchronous public key decryption processing  
In a microprocessor that internally has a microprocessor specific secret key, a key management unit is provided to carry out a key registration for reading out from an external memory a...
7137140 Transaction verification  
A customer computer 12, vendor computer 16 and verification computer 14 are interconnected by means of a network 18, such as the internet The customer 12 can initiate a transaction, such as the...
7114180 Method and system for authenticating and authorizing requestors interacting with content servers  
A method and system for authenticating and authorizing requesters interacting with content servers. A message including a request is forwarded from an upstream device and received by an...
7107615 Parameter verification in an authentication system and method  
A system, method, and program embodied in a computer readable medium are provided for parameter authentication. In one embodiment, the method comprises the steps of examining an authenticated...
7107454 Signature system presenting user signature information  
A user inputs identification information in a terminal, and generates identification information and bar code information about a signature program. A receiver reads the bar code information of...
7103912 User authorization management system using a meta-password and method for same  
A user authentication information management method receives a meta-password from a user. A repository (34) lists network addresses (36) and associated handles (38), each handle having an...
7100203 Operating session reauthorization in a user-operated device  
An authorization-update process for use in a user-operated device re-authorizes an operating session after a rapid idle timeout using the authorization-update process, which has fewer steps than a...
7096505 System and method to support varying maximum cryptographic strength for common data security architecture (CDSA) applications  
A technique for cryptographic strength selection for at least one application is provided, in accordance with a framework for providing cryptographic support of the at least one application. Data...
7093282 Method for supporting dynamic password  
A method of generating dynamic password is disclosed. A method of generating a dynamic password comprising the steps of providing a plurality of variable parameters, each parameter from the...
7093296 System and method for dynamically extending a DRM system using authenticated external DPR modules  
A rights management module controls access to a data set by processing requests for flexibly defined types of access to the data set and determines if the requested access may be granted. The...
7089595 Device and method for disabling an override hardware pin assertion  
One embodiment of present invention is a method for preventing the modification of a primary pass-phrase of an electronic system. Access to stored information such as a primary pass-phrase is...
7080406 Method for transferring privilege access to a resource manager with subsequent loss of privilege by the initiating identity  
The present invention describes a privilege transfer method between programs in a computing system. This transfer method allows a resource manager such as a security manager to be initially...
7076799 Control of unciphered user traffic  
In a communications system, the subscriber data in a home network of a subscriber is provided with a subscriber ciphering profile, which indicates whether an unciphered call, session or data...
7073197 Methods and apparatus for protecting information  
System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or...
7065786 Password generation and verification system and method therefor  
A system and method for facilitating password control and maintenance is provided. A system 10 is provided where a plurality of categories are set so that a single piece or multiple pieces of...
7032243 System and method for a group-based network access control for computer  
Systems and methods for group-based network access control systems are provided. The group-based network access control system includes a software process operating on a computer. The software...
7020778 Method for issuing an electronic identity  
A method for issuing an electronic identity based on previously certified electronic identity. This is accomplished by providing a method to use a previously certified identity to create another...
7017050 Clearinghouse server for internet telephony and multimedia communications  
A clearinghouse server for routing multi-media communications, including telephony calls, between a source device and a destination device via a distributed computer network, such as the global...
6993658 Use of personal communication devices for user authentication  
A password setting system for a secure system includes a user token server and a communication module. The user token server generates a random token in response to a request for a new password...
6978385 Data processing system and method for remote recovery of a primary password  
A data processing system and method are disclosed for remotely recovering a client computer system's primary password. The primary password be correctly entered prior to the client computer system...
6978381 Enhancement to a system for automated generation of file access control system commands  
A secure data processing system having a plurality of resources accessible over a network arrangement such as the Internet and including a server, maintains lists of three categories of access...
6973575 System and method for voice recognition password reset  
A system and method for providing a password to a user using voice recognition technology. The user's voice signature is captured and stored in order to identify the user. When the user forgets or...
6971014 Device and method for administration of identifying characteristics  
The invention relates to a device and a method for administering, in particular for creating and changing, identifying characteristics. During input of the new identifying characteristic by a user...
6957338 Individual authentication system performing authentication in multiple steps  
An individual authentication system is disclosed, by which the data processing device which needs the individual authentication can be used and managed with higher security. The individual...
6952775 Method and system for electronic authentification  
An electronic authentication method for identifying a user who is going to use a recording medium into which the information for making use of any kind of computerized service has been stored,...
6950202 Apparatus for retrieving document data  
An information input/output system capable of reliably preventing improper leakage of information and of keeping confidential information secret. The information input/output system provides a...
6895503 Method and apparatus for hierarchical assignment of rights to documents and documents having such rights  
Digital rights management allows one or more of usage rights and delegation rights to be associated with a document. Through the use of the usage rights and the delegation rights, a hierarchy of...
6868404 DIGITAL DATA RECORDING DEVICE, DIGITAL DATA MEMORY DEVICE, AND DIGITAL DATA UTILIZING DEVICE FOR CONVERTING MANAGEMENT INFORMATION WHICH CONTAINS RESTRICTIVE INFORMATION USING A DIFFERENT KEY IN EACH MANAGEMENT INFORMATION SEND/RECEIVE SESSION  
In each digital content utilize session, a memory card generates conversion key information for specifying a data conversion, while a player generates inverse conversion key information for...
6862687 Checking device and recording medium for checking the identification of an operator  
A CPU displays an image on a display device with reference to an image location table stored in advance in a RAM. When coordinates on the image are sequentially designated by an input device, the...
6834347 Target self-security for upgrades for an embedded device  
Authentication of an upgrade to computer readable program code of a target embedded device is accomplished by causing the computer processor of the embedded device to access an unique machine...
6826691 Arrangement for encryption/decryption of data and data carrier incorporating same  
An arrangement (6) for encrypting/decrypting data includes a random access memory (12) for holding the data and a processor (10) for processing the data. The processor includes a memory map...
6826716 Test programs for enterprise web applications  
Testing J2EE applications, wherein J2EE applications comprise modules, the testing including identifying (204), from an application deployment descriptor, modules comprised within the J2EE...
6799286 Methods and arrangements for providing non-modal error information in a graphical user interface  
Methods and arrangements are provided that automatically display error information during a logon process or other similar process. The method and arrangements automatically display error...
6792541 Data storage device using certification keys and method to perform access control using certification keys  
A code range which is the range of usable identification codes (corresponding to file names or directory names) is stored in an area defining area corresponding to a directory, and a layer...
6766458 Testing a computer system  
A computer program for checking user configurable security settings operates as either an on-demand application or a memory resident application. The security checking program may enforce the...
6766457 Method for controlling access to a multiplicity of objects using a customizable object-oriented access control hook  
A computer-implemented object-oriented method for controlling access to a multiplicity of objects is disclosed. The method includes creating specific access control object types, each including a...
6763465 Method of ensuring that the PC is not used to make unauthorized and surreptitious telephone calls  
The present invention prevents unauthorized access and modifications to programs and non-executable files, particularly a dialer program, stored on a personal computer system (PC) by providing a...
6760842 Finite state automata security system  
Disclosed is an apparatus and method to build programs from activity function units (AFUs) within a graphical environment. Each AFU is made from graphical representations of functional units...
6754830 Method and coupling arrangement for preventing unauthorized access to a microprocessor  
A method is presented for preventing the unauthorized use of a certain protected interface (102) in a processor (101. 101′). An indication (NO PAT, ALARM) of attempted use of the protected...
6748084 Data access control system and method thereof  
A data access control system and a method thereof is disclosed. First, the master key is divided into n subkeys to be kept by n holders, by way of secret sharing. The master key reconstruction...
6738913 Storage device and access control method  
A storage device is provided for gaining access to a storage medium and for reading data from or writing data to the storage medium. The storage medium has a plurality of access control areas for...