Match Document Document Title
9043890 Distributed authentication against stored user identifiers and user templates via pseudonym association  
An authentication system including a first server configured to store identifiers of respective users in association with respective pseudonyms, and a second server configured to store templates...
9043887 Adaptive secondary authentication criteria based on account data  
An authentication challenge system for performing secondary authentication for an account associated with an online store is described. In one embodiment, the authentication challenge system...
9043898 Access management system  
An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is...
9042377 System and method for web telephone services  
A web telephone service system comprises a client web page adapted to be displayed on a screen of a computer, the client web page including an element associated with the web telephone service and...
9043889 Method and apparatus for secure and reliable computing  
In one embodiment, the invention is a method and apparatus for secure and reliable computing. One embodiment of an end-to-end security system for protecting a computing system includes a processor...
9043867 Information sharing  
Systems and methods for the sharing of information between organizations are disclosed. Policies that govern the permissions for the sharing of information are represented as Boolean functions...
9043888 Detecting automated identities in computer user communities  
A computer-implemented method of detecting automated identities, including. The method includes, using one or more computing devices, providing for display to a user a first representation of a...
9038149 Cloud based password management  
The present invention extends to methods, systems, and computer program products for providing a cloud based password manager that automatically logs in users from any computer. The cloud based...
9038153 System for secure enrollment and secure verification of network users by a centralized identification service  
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of...
9038152 Access to resources  
A method performed by one or more processing devices, comprising: receiving a request for a quick response code associated with the hosted resource; generating a reference code that references...
9038166 Method and apparatus for authenticating password of user terminal  
Provided are method and apparatus for authenticating a password of a user terminal. The method includes: pre-setting, by a user, a password and an identification image for identifying the...
9038129 Enforcing policies in wireless communication using exchanged identities  
Techniques for facilitating the exchange of information and transactions between two entities associated with two wireless devices when the devices are in close proximity to each other. A first...
9037865 Method and system to securely send secrets to users  
Securely providing secret information, such as PINs, to users via an encrypted electronic document is disclosed. The user might receive the encrypted electronic document as an attachment to an...
9038146 Delegation as a mechanism to manage business activity by taking on a shared identity  
A system, method and computer program product for using delegation as a mechanism to manage business activity by taking on a shared identity. In some implementations, the system includes a user...
9032493 Connecting mobile devices, internet-connected vehicles, and cloud services  
A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle...
9032481 Information processing apparatus and control method thereof  
An application to be installed is acquired. Security policy geographic information, which is geographic information of an application's target distribution area where a user permits installation,...
9032495 Online user account login method and a server system implementing the method  
The present invention provides a webpage login method involving two client devices and a server. The server receives an information access request from a first client device. In response to the...
9032487 Method and system for providing service access to a user  
A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local...
9032494 Network-based revocation, compliance and keying of copy protection systems  
A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target...
9027085 Method, system and program product for secure authentication  
A method, system and program product comprises establishing a communication with a computing system using a first device for communicating with the computing system over a first communication...
9027100 Client-side ad caching for lower ad serving latency  
Advertisements are served over the Internet to clients on demand. A client module executing on a client device fetches advertisements over the Internet from an advertisement server. The client...
9026456 Business-responsibility-centric identity management  
One embodiment of the present invention provides a system for managing business responsibilities. During operation, the system receives a user request for a business responsibility and forwards...
9026796 Virtual world embedded security watermarking  
A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar...
9027105 Social network interaction using validated representations of user credentials  
A representation for a credential is received by a first client device. The credential is rendered on a second client device where the credential is associated with a user identity within a social...
9027086 Securing organizational computing assets over a network using virtual domains  
A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the...
9027119 Authentication frequency and challenge type based on application usage  
An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g.,...
9027103 Method and system for securely accessing to protected resource  
The invention provides a method for securely accessing to protected resource and a system thereof, which belongs to information security field. A first terminal sends a request for accessing to...
9027102 Web server bypass of backend process on near field communications and secure element chips  
A mobile access terminal providing access to data in a secure element of the mobile access terminal is provided. The mobile access terminal comprises the secure element; a web browser; a near...
9027104 Instructions processors, methods, and systems to process secure hash algorithms  
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements ai, bi, ei, and fi for a current round (i) of...
9027106 Organizational attribution of user devices  
A login request to access information associated with a website may be received from a user device accessing the website via a browser. A determination may be made as to whether a browser...
9027101 Providing subscriber consent in an operator exchange  
A method and system for providing a record of consent in scenarios in which the user and a device may have to perform a function that involves two entities that don't trust each other or are not...
9021569 Wireless guest access  
Methods, systems and computer readable media for providing and managing wireless guest access are described. In some implementations, the method can include a method comprising mining event...
9021568 Verification method for verifying validity of program, and verification system  
A verification method pertaining to the present invention is executed by a terminal device and is used for determining the validity of a control program used for remotely controlling an appliance...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9021565 Authentication techniques utilizing a computing device  
A pre-registration procedure is utilized to create a user profile for a user of a multi-factor authentication (“MFA”) service. A client application installation procedure is utilized to install a...
9021610 Computer recovery or return  
A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the...
9021566 Apparatus and method to securely connect to and manage X11 applications on a remote system through an HTTP client  
A web server authenticates a user with a web client using a database user table and provides a list of new applications, suspended application sessions, and running application sessions. In...
9021567 Printing system and method to register card ID  
A printing system includes an image forming apparatus and a management server connected via a network. The image forming apparatus reads a card ID of a user of the image forming apparatus from the...
9015818 Software application operational transfer  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, enable software application transfer among connected computing devices. In one aspect, a method...
9015813 Systems and methods for authentication, verification, and payments  
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes providing a...
9015819 Method and system for single sign-on  
A method and a system for single sign-on are provided by the present invention, wherein the method comprises: a terminal sending an authentication request carrying a user identity identification...
9015856 Mobile-device user authentication  
In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second...
9015482 System and method for efficiently enrolling, registering, and authenticating with multiple authentication devices  
A system, apparatus, method, and machine readable medium are described for multi-device operations within an authentication framework. For example, one embodiment of a method comprises: detecting...
9015030 Translating prompt and user input  
A method for intercepting an application prompt before it reaches the user interface, wherein the application prompt has been transmitted from the computer application and intended to reach the...
9015809 Establishing connectivity between an enterprise security perimeter of a device and an enterprise  
A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security...
9009805 Method and system for provisioning an electronic device  
This application discloses a method of provisioning an electronic device. The electronic device proactively broadcasts an advertising packet that includes a device identifier associated with the...
9009817 Virtual smart card to perform security-critical operations  
A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more...
9009470 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
 
A system is disclosed comprising multiple sets of client computers each client computer having installed thereon an application program The application program comprising client computer specific...
9009808 Delivery of multiple third-party services to networked devices  
Systems and methods for authenticating a media device or other information handling system so as to be able to receive content from one or more media content providers. Authenticating the device...
9009804 Method and system for hybrid software as a service user interfaces  
A hybrid software as a service (SaaS) delivery model allows an enterprise to control sensitive data while application code and non-sensitive data are downloaded from a software provider. A client...