AcclaimIP-ad

Match Document Document Title
8726019 Context limited shared secret  
In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship...
8726346 Secure provision of a digital content protection scheme  
Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust...
8719907 Computerized authorization system and method  
A computerized authorization system configured to authorize electronically-made requests to an electronic entity. The computerized authorization system comprises a store configured to store an...
8713657 System and methods for weak authentication data reinforcement  
Systems and methods for weak authentication data reinforcement are described. In some embodiments, authentication data is received in a request to authenticate a user. In response to detecting...
8712057 Apparatus and method for an iterative cryptographic block  
A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received...
8713125 Method and system for scaling usage of a social based application on an online social network  
Method, system and computer program to provide transparent scalability to Online Social Networks and better performance of its back-end databases, by an efficient partitioning of the underlying...
8713632 Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium  
A user authentication system is provided with a client apparatus and an authentication server. An application program used for processing the measurement results of the measuring apparatus is...
8707051 Method and system for embedded high performance reconfigurable firmware cipher  
A firmware cipher component is provided which can be configured and programmed to efficiently implement a broad range of cryptographic ciphers while accelerating their processing. This firmware...
8707449 Acquiring access to a token controlled system resource  
Acquiring access to a token controlled system resource, including: receiving, by a token broker, a command that requires access to the token controlled system resource, where the token broker is...
8707418 System and methods for web-application communication  
A system for providing communication between one or more clients (50) and one or more service providers (70) is disclosed. The system comprises an access gateway (10) for maintaining...
8707031 Identity-based certificate management  
Methods for managing digital certificates, including issuance, validation, and revocation are disclosed. Various embodiments involve querying a directory service with entries that correspond to a...
8701184 Authentication apparatus, authentication method, and computer-readable recording medium storing authentication program  
An authentication apparatus includes: a database section that stores a password; an entry section through which a password is entered; a storage section that stores an entered password which is...
8701183 Hardware-based human presence detection  
A method, system, and computer program product containing instructions to provide hardware-based human presence detection. Rather than rely upon software to display a CAPTCHA image, hardware in...
8695085 Self-protecting storage  
A method and apparatus for managing passwords for accessing data in a storage is provided. The method comprises generating and storing a password, generating and providing to the storage a request...
8686829 Lock code recovery system  
A lock code recovery system for selectively sending a lock code to a proximate personal electronic device is provided. A recognizable code is associated with the proximate personal electronic...
8689322 Authentication method for information apparatus  
Disclosed herein is an authentication method for an information apparatus. The method includes receiving a first password, generated based on the system time of the information apparatus, from an...
8689305 Information processing apparatus, user authentication method, and storage medium  
When a first MFP that manages first and second conversion values of user authentication information accesses a second MFP, the first MFP queries about which conversion value is used by the second...
8683578 Methods and systems for using derived user accounts  
Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user...
8683561 Fixed client identification system for positive identification of client to server  
A tamperproof ClientID system to uniquely identify a client machine is invoked upon connection of a client application to a backend. Upon initial connection, the backend issues a unique ClientID...
8683571 System and method for authentication of users in a secure computer system  
A system and method for authenticating a user in a secure computer system. A client computer transmits a request for a sign-on page, the secure computer system responds by transmitting a prompt...
8676998 Reverse network authentication for nonstandard threat profiles  
A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection,...
8667296 Generating a password from a media item  
A method for generating a password for a user account. The method includes selecting a media item from a media library associated with a user; selecting a portion of the media item; generating a...
8667578 Web management authorization and delegation framework  
Described is a technology in which a non-administrator computer/web user is allowed to perform an administrative-level task within a certain context and/or scope. An authorization store is queried...
8667560 Authenticating a user with picture messaging  
Systems and methods for authenticating a user of a service are disclosed. A host of a service provides a user interface that can be accessed via a display of a terminal. Upon successfully...
8661529 Information processing device  
An information processing device includes a processing unit which performs user authentication. The processing unit includes a setting part that determines setting of operation of a target device...
8661239 Encryption device and method for controlling download and access operations performed to a mobile terminal  
An encryption device and method for controlling download and access operations performed to a mobile terminal are disclosed. A switch circuit (102) is disposed on download channels (107, 108)...
8650620 Methods and apparatus to control privileges of mobile device applications  
Methods and apparatus to control privileges of mobile device applications are disclosed. A disclosed example method includes assigning a process identifier to an application on a mobile device,...
8650623 Risk adaptive information flow based access control  
Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among...
8650636 Picture gesture authentication  
In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen 172 may display a personalized...
8646034 Bootstrap of NFC application using GBA  
The present invention provides a bootstrap system comprising a network system and a mobile handset where the mobile handset can easily receive services of NFC bootstrap application. The handset is...
8646048 System, method and computer program product for authenticating and authorizing an external entity  
In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an...
8640200 Authored injections of context that are resolved at authentication time  
Techniques are described for enabling principals to inject context information into a credential (e.g. session credential). Once the credential has been issued, any arbitrary principal is allowed...
8640211 System and methods for universal password control  
A system and method is described for controlling the password(s) of one or more programs through a universal program. The universal control program allows access to one or more other programs and...
8635683 Method to improve fraud detection on conference calling systems by detecting re-use of conference moderator passwords  
An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes...
8635447 Managing certificates between software environments  
A method is used in managing certificates between software environments. In a Flex operating environment, a certificate store is maintained that is accessible to a Java operating environment. In...
8635687 Method and device for control by consumers over personal data  
There is provided a method and device for providing personal data of first party to a second party. The personal data is stored in an electronic device comprising a mechanism for locking and...
8632003 Multiple persona information cards  
A computer-implemented method can include selecting an information card from a group of identified information cards, selecting a persona from a group of identified personae that are associated...
8631487 Simple algebraic and multi-layer passwords  
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a...
8627451 Systems and methods for providing an isolated execution environment for accessing untrusted content  
A sandbox tool can cooperate with components of a secure operating system to create an isolated execution environment for accessing untrusted content without exposing other processes and resources...
8627095 Information processing apparatus, information processing method, and program  
An information processing apparatus according to the present invention includes a biometric authentication unit that authenticates one piece of biometric information based on registered biometric...
8627455 Manufacturing method of a memory device to be authenticated  
According to one embodiment, a manufacturing method of a device to be authenticated, wherein the device includes a first memory area which is prohibited from data-reading and data-writing after...
8627406 Device for protection of the data and executable codes of a computer system  
A security and protection device (1) for protection of the data and executable codes of any fixed or portable computer system and that has a memory medium to be protected. The security and...
8621584 Credential provider that encapsulates other credential providers  
Systems, methods, and computer readable media for encapsulating multiple Windows® based credential providers (CPs) within a single wrapping CP are described. In general, CP credentials and fields...
8621561 Selective authorization based on authentication input attributes  
Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an...
8614805 Information processing apparatus, information processing system, and computer readable medium storing program  
An information processing apparatus includes an accepting unit, a memory, a controller, and a switch unit. The accepting unit accepts an identifier and a storage site information item representing...
8613059 Methods, systems and computer program products for secure access to information  
Methods for secure communications are provided. The methods include creating a safe user account on a secure access system, wherein creating an account includes provision of at least one strong...
8613065 Method and system for multiple passcode generation  
This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a...
8607330 Orderly change between new and old passwords  
A processor stores a current password in a current password storage area, which results in committing the current password as a valid password. In turn, the processor initiates a password change...
8607064 Biometric authentication device and biometric authentication method  
A biometric authentication device performs authentication of a user based on biometric information. In the biometric authentication device, a registry information storage stores pre-registered...
8607313 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Methods and apparatus to control privileges of mobile device applications
 
Methods and apparatus to control privileges of mobile device applications are disclosed. A disclosed example method includes assigning a process identifier to an application on a mobile device,...