AcclaimIP-ad

Match Document Document Title
8387136 Role-based access control utilizing token profiles  
A method A method and system for managing role-based access control of token data using token profiles is described. In one method, a token processing system (TPS) receives a request from a TPS...
8387134 Information processing apparatus and method of controlling authentication process  
According to one embodiment, an information processing apparatus includes a main body, an authentication unit which performs an authentication process, upon power-on of the main body, if...
8381279 Constraining a login to a subset of access rights  
This document describes tools that constrain a login to a subset of access rights. In one embodiment, the tools generate a constrained password by executing a cryptographic algorithm on a user ID,...
8381284 System and method for enforcing security policies in a virtual environment  
A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a...
8381271 Method and system for providing user access to a secure application  
A method and system for providing remote user access to secure financial applications by deployment of SSO software (126) to client workstations (120), including receiving a password for...
8370903 Image forming apparatus unifying management for use of image forming apparatus and use of web service  
An MFP stores information of a web service for permitting use with respect to each user, and information for limiting a use of its function. When there is a web service allowed to be used by the...
8370925 User policy manageable strength-based password aging  
Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula...
8370927 Portable device with password verification function and system having thereof  
A portable device with password verification function includes several input units, a storage unit and a processing unit. The processing unit is electrically connected with the input units and the...
8370926 Systems and methods for authenticating users  
A computer-implemented method for authenticating users may include identifying an image associated with a user for mutual assurance during an authentication process. The computer-implemented...
8365294 Hardware platform authentication and multi-platform validation  
Methods and apparatuses enable authentication of a hardware platform on a network. The authenticated hardware platform can validate the credentials of virtual machines executing on the hardware...
8364808 Device management system  
A device management system for managing a device based on management information is presented. The system includes a device monitoring unit for obtaining management information from a device, a...
8365262 Method for automatically generating and filling in login information and system for the same  
A system for automatically generating and filling login information to improve the security in storage and use of the login information. The system comprises a monitoring module, a registration...
8365275 Image processing apparatus, session managing method and session managing program  
An image processing apparatus, a session managing method, and a session managing program allow an operator to change his or her role flexibly. The image processing apparatus comprises a session...
8359277 Directory infrastructure for social networking web application services  
A computer-implemented method of implementing information security. The method can include receiving a user input comprising a first user identifier and at least a second user identifier,...
8353027 System and method for enhanced protection and control over the use of identity  
A method of protecting use of an entity's identity is provided. The method comprises setting a status of the identity to a first state, the first state defining a scope of permitted use of the...
8353015 Trusted internet identity  
A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the...
8353026 Credential security system  
A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory...
8353048 Application digital rights management (DRM) and portability using a mobile device for authentication  
A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a...
8346217 Systems, methods and apparatus for controlling access to mobile devices  
Systems, apparatus, methods and articles of manufacture provide for controlling access to one or more functions of a mobile device, or other computing device, based on information about activities...
8347106 Method and apparatus for user authentication based on a user eye characteristic  
An information delivery device interacting with a user's eye, the device comprising an eye characteristic reader for reading at least one characteristic of the user's eye, a retinal projector for...
8347102 Image processing apparatus and method for transmitting encrypted data  
An image processing apparatus generates a password each time transmission of image data is instructed, encrypts the image data with the generated password, transmits the encrypted image data, and...
8347405 Asynchronous java script and XML (AJAX) form-based authentication using java 2 platform enterprise edition (J2EE)  
An apparatus, system, and method are disclosed for Asynchronous Java Script and XML (AJAX) form-based authentication using Java 2 Platform Enterprise Edition (J2EE). The apparatus for AJAX...
8347378 Authentication for computer system management  
An improved solution for authenticating a user seeking to manage a computer system is provided according to aspects of the invention. A user seeking to perform out-of-band management of the...
8347367 Techniques for entry of less than perfect passwords  
A technique of allowing entry of the password which is not 100% correct. This password would be used to verify identity and/or login information in low security techniques. The password is scored...
8347370 Multi-channel multi-factor authentication  
Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security...
8341716 Information processing device, information processing method, and storage media storing user certification program  
The information processing device includes, a communication portion that communicates with a certification device which performs certification of whether or not a user has usage permission, a...
8341404 System and method for intelligence based security  
Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see...
8341718 Short-lived certificate authority service  
An integrated authentication service is described which may receive a bundled request from one or more clients. One or more of the described techniques may be utilized to provide, in response to a...
8336090 System and method for unlimited licensing to a fixed number of devices  
A method and system providing access to electronic content includes receiving a request to access the electronic content from a user device, accessing a unique ID of the user device, and comparing...
8336088 Alias management and value transfer claim processing  
An alias management and value transfer claim processing system is disclosed. A sending entity initiates value transfer identifying a recipient entity using an alias that is unregistered with the...
8332907 Detection and management of controlled files  
A remote device may receive a policy definition, search a file system for files that are to be protected, and disposition identified files to protect the files. After completing the protection, a...
8332932 Keystroke dynamics authentication techniques  
A keystroke dynamics authentication system collects measurements as a user types a phrase on a keyboard. A first set of derived data values are computed based on the collected measurements, and...
8327428 Authenticating linked accounts  
Embodiments of authenticating linked accounts are presented herein. In an implementation, an authentication service provides functionality to form links between a plurality of user accounts. A...
8327436 Infrastructure architecture for secure network management with peer to peer functionality  
Architecture defining a secure virtual network of communities of two or more participants where security and business management reporting is a result of a network architecture and where...
8326358 System and method for access control in a portable electronic device  
A method of access control in an electronic device includes monitoring for input at the electronic device, for each input determined to be one of a plurality of predefined gestures including...
8321683 Electronic control device and method for operating an electric roller shutter  
An electronic control device and method for operating an electric roller shutter include establishing a wireless connection between the electronic control device and an electronic device if a...
8319990 Printing apparatus with data decryption  
A printing apparatus includes a data reading unit that reads data from a storage device that can store pieces of data, the data reading unit being connectable to the storage device, an input panel...
8321924 Method for protecting software accessible over a network using a key device  
The present invention provides a method for protecting software based on network, which combines a client program that communicates with a server in C/S (or B/S) architecture with a key device,...
8320742 Method and apparatus for playing data between external device and TV set  
An apparatus for recording/reproducing external device data in a broadcast receiver and method thereof are disclosed, by which a broadcast receiver allowed by a certification key is enabled to...
8316418 Verification engine for user authentication  
Computer-implemented system and methods for authenticating the identity of a person, for example a customer (1) of an E-Commerce web site (15). The web site or other verification “client” (110)...
8312271 Privacy-protecting integrity attestation of a computing platform  
Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has...
8312556 Information processing apparatus and information processing program updating identification information via E-mail  
An information processing apparatus includes a use restriction unit that restricts use of the information processing apparatus based on identification information stored in an identification...
8307424 Password authentication apparatus and password authentication method  
A password authentication apparatus and a password authentication method for preventing the leakage of password information from user's password input operations includes a memory device for...
8302169 Privacy enhancements for server-side cookies  
A server system receives requests from client systems and sends responses back to the client systems. For a subset of the requests, in addition to responding to a request from a client system, the...
8301771 Methods, systems, and computer program products for transmission control of sensitive application-layer data  
Disclosed are methods, systems, and computer program products for identifying sensitive application-layer data and controlling transmission of the data in a network. According to one method,...
8300808 Arithmetic operation method and arithmetic operation device  
In an arithmetic operation method and an arithmetic operation device arithmetic operations such as exponentiation or scalar multiplication can be performed at high speed. In the case where there...
8302152 Location-based security system for portable electronic device  
A portable electronic device implements a location-dependent security protocol. Without requiring that the user enter any location information, the device determines one or more familiar areas....
8301897 Challenge-based authentication protocol  
Methods and apparatus for authenticating a user are disclosed. According to one aspect of the present invention, a method for authenticating a user includes displaying a first representation of a...
8296825 Method and system for a secure connection in communication networks  
A system for enabling a user to communicate on a virtual private network through a public communication network, the possibility of communicating on the private network depending on the...
8296841 Trusted platform module supported one time passwords  
A Trusted Platform Module (TPM) can be utilized to implement One Time Password (OTP) mechanisms. One or more delegation blobs can be created by the TPM and the delegation authentication values of...