AcclaimIP-ad

Match Document Document Title
9043872 Selective management controller authenticated access control to host mapped resources  
An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes...
9043793 Verification of controls in information technology infrastructure via obligation assertion  
A processing device comprises a processor coupled to a memory and implements an obligation management system for information technology infrastructure, with the obligation management system being...
9037855 Method for reproducing content data and method for generating thumbnail image  
A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information;...
9032509 Identity verification in virtual worlds using encoded data  
An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential...
9032216 Techniques for dynamic generation and management of password dictionaries  
Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics...
9032508 Pattern password trajectory configuration system and method using the same  
A pattern password trajectory configuration system used in an electronic device with a graphics input interface and a method using the same are provided. The disclosed pattern password trajectory...
9032507 Access request authentication and authorization information generation  
An access request authentication method, an authorization information generation method, an access request authentication system, and a hardware device. The access request authentication method...
9027119 Authentication frequency and challenge type based on application usage  
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g.,...
9025765 Data security  
A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content...
9015802 Personally identifiable information detection  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for privacy protection. In one aspect, a method includes accessing personally identifiable...
9015826 Mobile platform security apparatus and method  
A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third...
9015809 Establishing connectivity between an enterprise security perimeter of a device and an enterprise  
A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security...
9009777 Automatic role activation  
A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set...
9009817 Virtual smart card to perform security-critical operations  
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more...
9009814 Systems and methods for generating secure passwords  
A computer-implemented method for generating secure passwords may include 1) displaying a user interface for entering a textual password, 2) receiving user input via the user interface to select a...
9009815 Increasing chosen password strength  
An approach is provided to increase password strength in a group of users. The approach detects a password event corresponding to one of the users. In response to the detected password event, the...
9007929 Correlating communication transactions across communication networks  
A system for correlating communication packets across different communication networks includes a first monitoring agent in a first network for collecting local identifying information of a...
9009486 Biometric authentication apparatus, biometric authentication method, and computer readable storage medium  
An authentication processing device receives biometric data to be checked from a biometric measuring device; transforms the biometric data that is input from the biometric measuring device by...
9003540 Mitigating forgery for active content  
Cross Site Request Forgery (CSRF) and other types of fraudulent submission can be mitigated using state information that typically is already maintained for various users. Each submission...
9003493 Automatic authorization of users and configuration of software development environment  
Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein...
9003494 Automatic authorization of users and configuration of software development environment  
Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein...
8996880 System and method for providing access to an information handling system  
An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a...
8997192 System and method for securely provisioning and generating one-time-passwords in a remote device  
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and...
8997191 Gradual template generation  
Embodiments of the invention relate to collecting keystroke timing data of samples of a phrase input by a user on an input device during different user sessions, and creating a biometric user...
8997209 Memory device comprising a plurality of memory chips, authentication system and authentication method thereof  
A memory device includes a plurality of memory chips, including one or more memory chips that store authentication information, and a controller including a first register that stores information...
8996859 Authentication system, authentication method and computer readable medium  
An authentication apparatus includes an accepting unit and an instructing unit. The accepting unit accepts a request, which requests to issue an authentication medium for a second user, from a...
8996605 Service providing system, and client, server, and computer program used for such system  
In a service providing system, a client includes a transmitting unit configured to transmit specification information associated with specifications of the client to the management server, a...
8990907 Managing security credentials for scaled-out services  
Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service instance credentials. In one scenario, a...
8990899 Using a local authorization extension to provide access authorization for a module to access a computing system  
Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a computing system. A memory stores...
8990926 Method and apparatus for protecting a password of a computer having a non-volatile memory  
A method for protecting a password of a computer having a non-volatile memory is disclosed. A password is stored in a non-volatile memory of a computer. The computer is then transitioned to a...
8984583 Healthcare privacy breach prevention through integrated audit and access control  
A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing...
8984602 Protected resource access control utilizing credentials based on message authentication codes and hash chain values  
A processing device comprises a processor coupled to a memory and is configured to receive authentication information from a user, to generate a message authentication code based at least in part...
8977844 Smartcard formation with authentication keys  
An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes...
8972741 Method of modification of authorization details for a biometrics authentication device, biometrics authentication method, and biometrics authentication device  
A biometrics authentication device utilizes biometrics information and performs individual authentication enables secure modification of authorization details for an authorized agent other than...
8959634 Method and system for protection against information stealing software  
Methods and systems reduce exposure to a dictionary attack while verifying whether data transmitted over a computer network is a password. In one aspect, a method includes performing a search of...
8959603 Authentication system  
An authentication system by which character strings in squares are selected by a rule determined by a user out of a table in which character strings are assigned to obtain a one-time password. The...
8959644 Use of popularity information to reduce risk posed by guessing attacks  
A popularity determination module (PDM) is described which reduces the effectiveness of statistical guessing attacks. The PDM operates by receiving a password (or other secret information item)...
8959620 System and method for composing an authentication password associated with an electronic device  
A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit....
8959618 Managing password expiry  
A method and apparatus for managing the expiration of a password. In one embodiment, the method comprises determining whether a behavior anomaly associated with an account has occurred. In...
8959653 Automatic license key injection  
A method, server and system for obtaining a licensed application is provided. In one example embodiment, the method comprises: receiving an application download request from a user of the...
8959619 Graphical image password authentication method  
A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images,...
8959360 Voice authentication and command  
Methods, systems, and apparatus for voice authentication and command. In an aspect, a method comprises: receiving, by a data processing apparatus that is operating in a locked mode, audio data...
8955070 Controlled password modification method and apparatus  
Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web...
8955101 Upper-order computer, lower-order computer, monitoring system and monitoring method  
The present disclosure discloses an upper-order computer, a lower-order computer, a monitoring system and a monitoring method, so as to eliminate the disadvantages of low standardization level and...
8955071 Controlled password modification method  
A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn....
8949617 Disrupting password attack using compression  
Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using...
8949949 Network element authentication in communication networks  
In an embodiment, a method enables authentication of devices connected to a network. The method also enables the devices to digitally sign communication on the network with private keys. When a...
8949972 Information recording device, recording medium, and information recording system  
An information recording system includes a recording medium capable of limiting a function by password and an information recording device for controlling the recording medium. The recording...
8949422 Method, apparatus and system for providing contents to multiple devices  
In some examples, a contents providing apparatus that provides contents to multiple devices may include a user information management unit, a contents management unit, a contents usage information...
8949971 System and method for storing a password recovery secret  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for storing a password recovery secret on a peripheral such as a power adapter by receiving a password...