Match Document Document Title
9165121 Concept of efficiently distributing access authorization information  
A device for controlling a service access authorization for a user device with regard to an access-restricted service includes a service access authorization provider, the service access...
9077524 System and method for providing an indication of randomness quality of random number data generated by a random data service  
A system and method for providing an indication of randomness quality of random number data generated by a random data service. The random data service may provide random number data to one or...
9043881 Entitled data cache management  
Systems and methods are disclosed for managing an entitled data cache. A data server may generate and send entitled data to a data cache server. The data cache server, a server that may be located...
RE45532 Mobile host using a virtual single account client and server system for network access and management  
A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password,...
9043880 Directory service user exportation system  
Disclosed are various embodiments for exporting user accounts and associated information from a directory service for a local computing environment to the authentication service of a remote...
9043878 Method and system for multi-tiered distributed security authentication and filtering  
Multi-tiered distributed security authentication and filtering. One embodiment comprises managing user access to one or more computing resources, by centrally maintaining user subscription...
9043870 Automated sign up based on existing online identity  
An automated system for signing up users invited to join a site based on their existing identity includes an invitation generator, an invite processor, a federated authentication module, a user...
9043827 Method and system for providing conditional access to encrypted content  
A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network....
9043882 Integration of home security into existing infrastructure  
Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on...
9041812 Automated authorization to access surveillance video based on pre-specified events  
Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a...
9043879 Facilitating enforcement of PRL restrictions  
Systems, methods, and computer-readable media for facilitating enforcement of PRL restrictions are provided. The method includes receiving a registration request from a user device. The...
9043935 Techniques for personalizing content  
Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the...
9043877 Temporarily providing higher privileges for computing system to user identifier  
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to...
9038138 Device token protocol for authorization and persistent authentication shared across applications  
Various techniques for providing a device token protocol for authorization and persistent authentication shared across applications are disclosed. In some embodiments, a device token protocol for...
9038142 Authorization flow initiation using short-term wireless communication  
In general, aspects of the disclosure are directed towards techniques for initiating an authorization flow with a user to enable a user interface-limited client computing device to obtain access...
9038137 Subscriber authentication using a user device-generated security code  
A device receives an indication that a security code is to be generated; generates the security code based on the indication; generate a message that includes the security code and an identifier...
9038140 Integrated collaboration environment  
Described herein is a technology for facilitating the integration of a collaboration environment. In some implementations, an activity associated with a business object is accessed via a work...
9038143 Method and system for network access control  
A method and a system for network access control are provided, which are based on cipher code mechanism. After a visitor has raised an access request, an access controller in the destination...
9038169 Method and system for managing and controlling direct access of an administrator to a computer system  
A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the...
9038152 Access to resources  
A method performed by one or more processing devices, comprising: receiving a request for a quick response code associated with the hosted resource; generating a reference code that references...
9038145 Method and system for restricting access to user resources  
A user's set top box (STB), or other client, executes a shell and has an application program interface (API) by which certain features of the client can be controlled. The client is in...
9038158 Systems and methods for enforcing geolocation-based policies  
A computer-implemented method for enforcing geolocation-based policies may include (1) identifying a request from a computing system to access a computing resource, (2) identifying a public key...
9038167 Embedded authentication systems in an electronic device  
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors...
9038147 Progressive download or streaming of digital media securely through a localized container and communication protocol proxy  
Various embodiments are directed towards employing a container and communication protocol proxy component within a client device to receive securely real-time streamed, progressively downloaded,...
9038146 Delegation as a mechanism to manage business activity by taking on a shared identity  
A system, method and computer program product for using delegation as a mechanism to manage business activity by taking on a shared identity. In some implementations, the system includes a user...
9038144 Mobility protocol selection by an authorization system  
A wireless network authorization system receives an authorization request for a wireless communication device transmitted from a visited wireless network. A processing system selects one of a...
9038130 Sensor aware security policies with embedded controller hardened enforcement  
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The...
9038139 Multiple image reverse turing test  
In a Reverse Turing Test an applicant seeking access to a computer process is presented with an image containing human-readable data that is intended to be inaccessible to an automated process or...
9038141 Systems and methods for using active optical cable segments  
First and second active optical modules that terminate first and second active optical cable segments, each of which having a respective active end and a respective passive end, can be...
9032488 Cross instance user authentication architecture  
In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for implementing a cross instance user authentication architecture in an on-demand service...
9032509 Identity verification in virtual worlds using encoded data  
An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential...
9032536 System and method for incapacitating a hardware keylogger  
A system, device and method for incapacitating a keylogger. An inactivity of an input device may be detected. A flow of information from an input device to a computing device may be manipulated. A...
9032483 Authenticating a communication device and a user of the communication device in an IMS network  
IMS networks and methods are disclosed for authenticating a communication device and a user of the communication device. When a communication device attempts to register with an IMS network, the...
9030993 Communication device, connection method and storage medium  
In order that even a wireless terminal whose an unique ID is not registered in the filter list can use simply the access point without a prior setting task by user, a communication device includes...
9032484 Access control in a hybrid environment  
A heterogeneous computing system includes a first server module having a first operating system, a second server module communicatively coupled to the first server module, the second server module...
9032076 Role-based access control system, method and computer program product  
The invention relates to a role-based access control system, including a role definition system for defining roles to be sets of permissions on individual resources thus forming role instances,...
9032501 Cryptographic protocol for portable devices  
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a...
9030946 Method of securing network access radio systems  
A method of providing security for network access radio systems and associated access radio security systems used with the systems. The method includes connecting an access radio having a radio...
9032544 System and method for controlling communication of private information over a network  
A system and method for controlling access to private information over a network is provided including a privacy preference repository accessible by one or more subjects of the private information...
9032486 Breathalyzer system for social media  
A breathalyzer system for use with a computer consisting of a breathalyzer, computer software and hardware, an interface and method for delaying posts by persons who cannot prove sobriety upon...
9032546 Enforcing conditions of use associated with disparate data sets  
Techniques are described herein that are capable of enforcing conditions of use associated with disparate data sets. For example, content may be published. Conditions of use that are associated...
9032481 Information processing apparatus and control method thereof  
An application to be installed is acquired. Security policy geographic information, which is geographic information of an application's target distribution area where a user permits installation,...
9031536 Method for mitigating the unauthorized use of a device  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
9032485 Anchor authenticator relocation method and system  
The disclosure provides an anchor authenticator relocation method and system. The method includes: after an old authenticator accepts an anchor authenticator relocation request of a Mobile Station...
9030985 Handling mismatch of cryptographic keys and related battery drain and communication exchange failures  
A wireless communications device stores a first cryptographic key in connection with a profile, the profile indicating a security type requiring no credentials and a network name. An access point...
9032489 Method and device for proxy access of open platform  
Disclosed are a method and device for a proxy access of an open platform for solving technical problems that resource occupancy is excessive, a password security is low, and a local file cannot be...
9032487 Method and system for providing service access to a user  
A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local...
9027088 Systems and methods for protection of a SIP back-to-back user agent on modems  
Systems and methods are provided for authenticating Internet Protocol (IP) Multimedia Subsystem (IMS) applications in a User Equipment (UE). A method includes: receiving a first Session Initiation...
9027087 Method and system for identity-based authentication of virtual machines  
A cloud computing system configured to run virtual machine instances is disclosed. The cloud computing system assigns an identity to each virtual machine instance. When the virtual machine...
9027085 Method, system and program product for secure authentication  
A method, system and program product comprises establishing a communication with a computing system using a first device for communicating with the computing system over a first communication...