AcclaimIP-ad

Match Document Document Title
8949619 Systems, methods and apparatus for multivariate authentication  
Systems, methods, and apparatus are disclosed for electronically sharing data using authentication variables, such as biometrics and contextual data. Example contextual data includes machine...
8943579 Trusted communications with child processes  
A method to identify a child process to a parent process in an operating system includes obtaining a token and login identifier from the operating system. The parent process creates a remote...
8938613 Techniques for secure message offloading  
Techniques for secure message offloading are presented. An intermediary is transparently situated between a user's local messaging client and an external and remote messaging client. The user...
8938797 User validation using images  
A method of validating a user, comprises the steps of:—storing for a user data representative of a validation code for the user comprising a combination of symbols selected from a set of symbols;...
8935777 Login using QR code  
Systems and methods are disclosed herein for a user to use a trusted device to provide sensitive information to an identity provider via QR (Quick Response) code for the identity provider to...
8935764 Network system for implementing a cloud platform  
A network system for implementing a cloud platform within a network to which a device defining a computing environment for a user has access comprises an application management module, a community...
8931080 Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource  
A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a resource. The method includes inputting,...
8931082 Multi-security-CPU system  
A computing system includes a first security central processing unit (SCPU) of a system-on-a-chip (SOC), the first SCPU configured to execute functions of a first security level. The computing...
8931081 Device identification for externalizing password from device coupled with user control of external password service  
Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password...
8922806 Administration server and image processing system  
An administration server is capable of authenticating a user. The administration server includes a communication unit for receiving a user authentication request including user identification...
8925058 Authentication involving authentication operations which cross reference authentication factors  
A technique of authenticating a person involves obtaining, during a current authentication session to authenticate the person, a first authentication factor from the person and a second...
8918610 Protection of chips against attacks  
A chip including a processor for performing a predetermined operation, a provider for providing a clock signal, with which the processor is clocked, a counter for decrementing or incrementing a...
8918848 Method and system for third party client authentication  
Methods and systems for third party client authentication of a client. A method includes displaying a user interface on a display of the client, the user interface including an option to select a...
8913270 Authentication system having an authentication apparatus including an authentication unit configured to search records of identification information associated with group information to find matching identification information matching obtained identification information of a user, authentication method, and apparatus  
An authentication system includes an apparatus and an authentication apparatus configured to perform authentication of a user of the apparatus. The apparatus includes an identification information...
8910251 Using social information for authenticating a user session  
A social CAPTCHA is presented to authenticate a member of the social network. The social CAPTCHA includes one or more challenge questions based on information available in the social network, such...
8902043 Mitigating conformational bias in authentication systems  
An authentication method and system to combat confirmation bias provides for an authentication system that upon matching an access request to a record for a given user in an authentication system...
8902444 Image processing apparatus and method, including user authentication, and storage medium  
An image processing apparatus which is capable of realizing security improvements without degrading the usability. A user is authenticated, and an operation screen accepting an operation input...
8898453 Authentication server and method for granting tokens  
An authentication server and method are provided for generating tokens for use by a mobile electronic device for accessing a service. Communications between the device and the authentication...
8898802 Electronic computer data management method, program, and recording medium  
The present invention provides a data management program for performing monitoring so that user data provided to the client cannot be copied and utilized for a purpose other than the intended...
8898755 Trusted internet identity  
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the...
8898759 Application registration, authorization, and verification  
A system that includes a memory to store registration information for a particular application hosted by a particular user device, where the registration information includes context information...
8898756 System and method for password recovery  
A method and system for password recovery in computer applications is disclosed. Passwords in the same computer application may be recovered according to different criteria. Criteria for password...
8892900 Privacy-protecting integrity attestation of a computing platform  
Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has...
8892897 Method for generating and detecting auditable passwords  
A method for creating a password on an electronic computing device is disclosed. On the electronic computing device, a first password is obtained. The first password comprises a string of one or...
8887268 Electronic device, password control method, and program  
There is provided an electronic device capable of safely obtaining password information even when a password of an external storage device of any type is forgotten. An electronic device 100...
8887212 Extended connectivity point-of-deployment apparatus and concomitant method thereof  
A POD module system includes a housing, a coaxial cable connector formed on the housing and connectable to a first device to receive a cable signal, a port formed on the housing to receive a wire...
8887253 Method of assigning a user key in a convergence network  
Discussed is a method of operating a CPNS (converged personal network service) gateway apparatus. The method includes transmitting a registration request message including user information to a...
8881266 Enterprise password reset  
One embodiment of the present invention provides a system for automatically authenticating a user. During operation, the system receives a user's request for authentication. The system then...
8881226 Provisioning user permissions using attribute-based access-control policies  
An attribute-based access control policy (e.g., XACML policy) for a set of elements depends on attributes carried by elements in one of several predefined categories. In order to evaluate such...
8875258 Constraining a login to a subset of access rights  
This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID,...
8875281 Methods and systems for using derived user accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
8875128 Controlling permissions in virtualization environment using hierarchical labeling  
A host controller associates each virtual machine with at least one label from a hierarchy of labels, where each label represents a distinct virtual machine parameter. The host controller also...
8869255 Method and system for abstracted and randomized one-time use passwords for transactional authentication  
A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security...
8869265 System and method for enforcing security policies in a virtual environment  
A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a...
8868742 Method for communication between a terminal and a server  
The invention relates to a method for the communication of a terminal (10) with a server (14), the terminal including an application and computer software capable of communicating with the server...
8863252 Trusted access to third party applications systems and methods  
A method of downloading trusted content. The method comprises sending by a mobile device a request for a trusted content to a server, wherein the mobile device comprises a first mobile device...
8863263 Server apparatus and program for single sign-on  
A server apparatus includes an analyzer unit which analyzes log-in information for a server received from a client, determines an authentication scheme of the server, and extracts, from the log-in...
8862890 Method and apparatus for processing biometric information  
A biometric-information processing apparatus and method including storing sample biometric information of a user each time biometric authentication processing for verifying sample biometric...
8862882 Systems and methods for authenticating devices by adding secure features to Wi-Fi tags  
Systems and methods are described herein for authenticating a user device that uses a wireless local area network. The user device may generate an encrypted authentication block and/or digitally...
8863004 Method and apparatus for increasing the functionality of a user device in a locked state  
An approach is provided for increasing the functionality of a user device when the device is in an, at least in part, locked state. The approach involves presentation of a first user interface and...
8856917 Single sign-on for remote desktops  
A mechanism is provided for automatically logging into a cloud based system that does not accept token log-on credentials generated by a single sign-on service. In an embodiment, a one-time...
8856863 Method and system for rapid accreditation/re-accreditation of agile IT environments, for example service oriented architecture (SOA)  
A system and method for managing and analyzing security requirements in reusable models. At least one functional model, at least one security implementation model, at least one requirement model,...
8850533 Multi-level authentication for medical data access  
Techniques for multi-level authentication for medical data access are supported. A system may include a central medical information management system that provides restricted access to medical...
8850559 Security method of a portable device  
An application program of the portable device receives a command of an owner when the portable device is powered on. The application program notifies a basic input/output system to set a...
8848258 Output system, creating apparatus, display apparatus, output method, and recording medium for creating output data, displaying a preview image corresponding to the output data, and outputting the output data  
When output data is created, image data for preview image is generated based on the output data. Based on the image data, a preview image corresponding to the output data is displayed.
8850211 Method and apparatus for improving code and data signing  
Methods and computing devices enable code and/or data software on computer devices to be verified using methods and signatures which can be updated by a signing server after distribution. Updated...
8850558 Controlling access to a process using a separate hardware device  
A method and apparatus for automatic user authentication are described. The method includes receiving information at a device, the device including a credential container; storing the information...
8850191 Scalable groups of authenticated entities  
Example embodiments provide various techniques for securing communications within a group of entities. In one example method, a request from an entity to join the group is received and a signed,...
8843749 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
8844024 Systems and methods for using tiered signing certificates to manage the behavior of executables  
Computer-implemented methods and systems for using tiered signing certificates to manage the behavior of executables are disclosed. In one example, a method for performing such a task may include:...