Match Document Document Title
8161534 Authenticating users with memorable personal questions  
One embodiment provides a system that verifies a user's identity. The system generates a list including a plurality of items and formulates a substantially large set of security questions base on...
8161281 High assurance data tagger for I/O feeds  
The present invention is a method and system for high-assurance data tagging for input/output feeds. The method may include executing a high-assurance tagging application on a microprocessor...
8161545 Keyboard with programmable username and password keys and system  
A computer input system and method that includes a plurality of username keys and a plurality of password keys that can be selectively programmed by the user. When the user is required to enter a...
8156550 Establishing secure data transmission using unsecured E-mail  
In one embodiment, a host entity may create a trusted connection with a guest entity. The host entity may encrypt a trusted connection invitation for an external guest entity using a proof of...
8151343 Method and system for providing authentication credentials  
A method for authenticating a user, that includes receiving an account identifier from the user, obtaining a media prompt from an account based on the account identifier, presenting the user with...
8151344 Method and apparatus to authenticate a user  
One embodiment provides a system that uses an authenticated channel to authenticate a user. The system can register a user by storing an association between a username, a password, and a unique...
8151331 Information providing system and design information providing server  
A design information providing system, which does not allow continuation of manufacturing of products unless a patent license contract is concluded, includes a terminal apparatus (40a) of a user...
8132254 Protecting system control registers in a data processing apparatus  
A data processing apparatus and method for protecting system control registers is provided. Processing logic is providing for executing software routines and a plurality of system control...
8132018 Techniques for password attack mitigation  
Apparatus, system, and method having a first counter to record a number of invalid authentication requests, a first timer to set a first time period based on a value of the first counter, and an...
8132017 Method and apparatus for securely synchronizing password systems  
A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the...
8132230 Image processor  
A procedure for login in a case where a prescribed job is executed in an image processor is simplified. An image processor includes: input unit accepting an input of user authentication...
8132019 Arrangements for interfacing with a user access manager  
Arrangements which permit the employment of dedicated user-access management architecture with more than text-based access. Particularly contemplated herein are arrangements for accepting user...
8127132 Method and apparatus for executing industrial manufacture  
A software object is positioned in structures, such as a functional structure, location structure and order structure, where each structure consists of a hierarchy of software objects. In each...
8127367 Refreshing software licenses  
A license access agent is configured to execute on a client computer. The license access agent comprises a license manager configured to receive a software license upon a request for authorizing...
8122158 Method for improving I/O performance of host systems by applying future time interval policies when using external storage systems  
A method, system, and a computer program product for improving IO (input/output) performance of host systems using external storage systems. An aspect of the present invention predicts policies to...
8122497 Networked physical security access control system and method  
A distributed networked physical security access control system for controlling a plurality of security access devices comprises a plurality of access server appliances in communication with a...
8117652 Password input using mouse clicking  
Digits are randomly distributed into any number of a first group of sets. A type and frequency of a user input action, such as clicking a computer mouse, is associated with each set. Next, all the...
8117444 Host computer, mobile communication device, program, and recording medium  
The object of the present invention is to provide an authentication system capable of achieving suitable authentication processing while guaranteeing the maximum convenience for the customer. A...
8116453 Gaming console-specific user authentication  
Systems, methods, and computer program products are provided for user authentication required for conducting online financial institution transactions. The disclosed embodiments leverage the...
8111413 Approach for securely printing policy-enabled electronic documents based on print driver and printing device support  
An approach is provided for securely printing policy-enabled electronic documents. According to the approach, a determination is made at a client device whether policy-enabled printing has been...
8112794 Management of multiple connections to a security token access device  
A security token access device, a user device such as a computing device or communications device, and a method for managing multiple connections between multiple user devices and the access...
8112624 Method and system for certificate revocation list compression  
Embodiments of the present invention provide a compression capability for compressing a CRL, such as an X.509 CRL, stored as a file, data structure or data object in a computer system having a...
8112791 Secure launching of browser from privileged process  
Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a web browser pointed...
8108914 Converged logical and physical security  
A security management system that includes a hierarchical security platform, converged IT and physical security management, unified credentialing, credential issuance and incident(s) management....
8108926 Method and system for online trust management using statistical and probability modeling  
A method and system to manage security in an online collaborative process are provided. The method includes receiving a requirement containing trustworthiness properties of a participant and...
8099779 Federated management of content repositories  
A method for integrating a plurality of content repositories into a virtual content repository (VCR), comprising providing credential information to each one of said plurality of content...
RE43119 Password protected modular computer method and device  
A method and device for securing a removable Attached Computer Module (“ACM”) 10. ACM 10 inserts into a Computer Module Bay (“CMB”) 40 within a peripheral console to form a functional computer...
8095969 Security assertion revocation  
Security assertion revocation enables a revocation granularity in a security scheme down to the level of individual assertions. In an example implementation, a security token includes multiple...
8095970 Dynamically associating attribute values with objects  
Dynamically associating an attribute and an associated value to an object includes dynamically associating attribute-value sets to an object, but is not so limited. An exemplary system includes a...
8094663 System and method for authentication of SP ethernet aggregation networks  
A Service Provider (SP) authentication method includes receiving a message from a subscriber-premises device, the message being compatible with an authentication protocol and being transported...
8087074 One time password  
A token calculates a one time password by generating a HMAC-SHA-1 value based upon a key K and a counter value C, truncating the generated HMAC-SHA-1 value modulo 10^Digit, where Digit is the...
8079068 Management of multiple connections to a security token access device  
A system and method for automatically managing a connection between a user device and a security token access device. The access device is adapted to wirelessly communicate with a plurality of...
8079071 Methods for accessing content based on a session ticket  
A method for accessing content stored on a memory device is provided. In this method, a request to access the content is transmitted and a session ticket is received. The session ticket includes a...
8074274 User-level privilege management  
In one embodiment, the present invention includes a method for receiving a request from a user-level agent for programming of a user-level privilege for at least one architectural resource of an...
8068008 Emergency responder credentialing system and method  
A system for collecting, verifying, and managing identity data, skill data, qualification data, certification data, and licensure data of emergency responders. The system trusted verification of...
8068007 Emergency responder credentialing system and method  
A system for collecting, verifying, and managing identity data, skill data, qualification data, certification data, and licensure data of emergency responders. The system trusted verification of...
8063737 Emergency responder credentialing system and method  
A system for collecting, verifying, and managing identity data, skill data, qualification data, certification data, and licensure data of emergency responders. The system trusted verification of...
8065724 Computer method and apparatus for authenticating unattended machines  
An unattended computer-based machine is authenticated by the present invention method, system or apparatus. The subject machine may be an auto-restarted machine or similar machine configured to be...
8060745 Security for wireless transmission  
The present invention provides a method of securing transmission of content over a wireless network. The method may include initiating a relationship between a content source and a display system,...
8060919 Automated password tool and method of use  
A method of auto updating a password comprises opening a password file and a new password file and reading information from the password file including user ID type. The method applies the user ID...
8060751 Access-control method for software module and programmable electronic device therefor  
A programmable electronic device (10) stores a number of cipher-text software modules (14) to which access is granted after evaluating a user's token (55, 80, 82), a software-restriction class...
8056126 Authentication system for instruction processing apparatus, image forming apparatus, authentication control method, and authentication control program  
An authentication system for an instruction processing apparatus includes first and second authentication portions each for performing user authentication at the time of using the instruction...
8054978 Key management for content protection  
A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising:...
8051470 Consolidation of user directories  
A method for automatic user authentication is described. In response to a coupling of a separate hardware security device to a data processing system, credential information for each of a...
8051471 Information processing device, information processing system, computer data signal, computer readable medium, and information processing method  
An information processing device, comprising a reading unit that reads, from a recording medium that records information relevant to authentication, the information relevant to authentication, an...
8051491 Controlling use of computing-related resources by multiple independent parties  
Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such...
8046389 Automatic data determination  
In a computing system, a value that a user enters under guidance of a graphical user interface may be received for association with a field of a document. The received value is used to determine a...
8046587 Method off-line authentication on a limited-resource device  
One feature provides a method for granting authenticated access to off-line, limited-resource mobile devices. A public-private key pair is generated by a service provider and the public key is...
8046590 System and method for protection of creative works  
The inventive method for protection of creative works is accomplished by creating a creative work, securing the creative work using biometric information of an author of the creative work, and...
8042155 System and method for generating a single use password based on a challenge/response protocol  
A system and method which generates a single use password based on a challenge/response protocol. A box manager module executing within a security appliance identifies a public key (P) and salt...