Match Document Document Title
9043891 Preserving privacy with digital identities  
A privacy-preserving identity system is described herein that combines low disclosure tokens with an identity metasystem to allow proof of a user's identity and other claims about the user in a...
9043892 Secure data exchange  
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the...
9043886 Relying party platform/framework for access management infrastructures  
A framework is provided for integrating Internet identities in enterprise identity and access management (IAM) infrastructures. A framework is provided for open authorization. A framework is also...
9038157 Method and apparatus for integrating a dynamic token generator into a mobile device  
A method for integrating a dynamic token generator into a mobile device is provided. The method may include displaying a display. The method may also include transmitting a serial number to a...
9038140 Integrated collaboration environment  
Described herein is a technology for facilitating the integration of a collaboration environment. In some implementations, an activity associated with a business object is accessed via a work...
9037656 Method and system for facilitating interaction with multiple content provider websites  
A method and system for facilitating interaction between an electronic device and a plurality of content provider websites are disclosed. In one embodiment, the method includes receiving at a...
9038152 Access to resources  
A method performed by one or more processing devices, comprising: receiving a request for a quick response code associated with the hosted resource; generating a reference code that references...
9038155 Auditable multiclaim security token  
The current invention provides a paradigm for securely transmitting messages using an auditable message token and associated protocol for recording information pertaining to events occurring with...
9038156 Automatic sign in of a user at multiple endpoints  
The present disclosure is directed to methods and systems for user registration, where a user is logged in to a first device in communication with a server, including: receiving an anonymous...
9038154 Token Registration  
An embodiment relates generally to a method of binding a token to a user. The method includes receiving a token embedded with an address and inserting the token into a computer. The method also...
9032498 Method for changing authentication for a legacy access interface  
A method and apparatus for changing authentication for a legacy access interface using an access adapter and a token device. The method enables to change authentication factors based on context...
9032215 Management of access control in wireless networks  
Management of access control in wireless networks known as smart spaces includes a framework that presents non-expert users with a consistent and intuitive interaction mechanism to manage access...
9032481 Information processing apparatus and control method thereof  
An application to be installed is acquired. Security policy geographic information, which is geographic information of an application's target distribution area where a user permits installation,...
9032497 System and method for securing embedded media  
Set forth herein are systems, methods, and non-transitory computer-readable storage media for processing media requests in a secure way. A server configured to practice the method receives, from a...
9027110 System and method for communication between dynamic token and tool  
The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a...
9027109 Methods and systems for accessing account information electronically  
Methods and systems for accessing customer account information involve, for example, binding a computing device with a customer's profile via one or more attributes of the computing device and an...
9027108 Systems and methods for secure file portability between mobile applications on a mobile device  
Systems and methods for secure file portability between mobile applications in a cloud-based environment or cloud-based collaboration and file sharing environment. In one embodiment, a...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9021135 System and method for tokenization of data for storage in a cloud  
An intercepting proxy server processes traffic between an enterprise user and a cloud application. The intercepting proxy server provides interception of real data elements in communications from...
9021571 Method and system for processing a data transfer related to a data-storing card  
In a method for processing a data transfer, an electronic device accesses card-specific data and a card account number from a data-storing card. The electronic device generates a device-generated...
9021601 Strong authentication token usable with a plurality of independent application providers  
The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output...
9020854 Linked account system using personal digital key (PDK-LAS)  
One embodiment of the invention includes a system comprising: a personal digital key and a computer readable medium that is accessible when authenticated by the personal digital key.
9021586 Apparatus and methods for preventing cross-site request forgery  
Apparatus and methods are provided that prevent cross-site request forgery at one or more web servers. A proxy dynamically monitors web server responses to client requests for content having a...
9021562 Systems and methods for secure logon  
The present disclosure provides methods and systems for secure logon. One or more method includes: determining, via authentication information provided by a user of an electronic device, that the...
9015476 Cryptographic device operable in a challenge-response mode  
Methods, apparatus and articles of manufacture for implementing cryptographic devices operable in a challenge-response mode are provided herein. A method includes storing a set of authentication...
9015821 User authentication  
A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing...
9015820 Cross site request forgery mitigation in multi-domain integrations  
Systems and methods for authenticating a request submitted from a client device through a third party content provider to an electronic entity are described. In one embodiment, a method includes...
9015489 Securing passwords against dictionary attacks  
Described herein are various technologies pertaining to constructions of a password-based authentication protocol that are configured to allow a user to register with and authenticate to an online...
9015791 Method of managing web application policy using smart card, and web server and mobile terminal for implementing the same  
A method of managing policy information in a mobile terminal by requesting an external policy management server for information about whether a change has been made to policy information and...
9009805 Method and system for provisioning an electronic device  
This application discloses a method of provisioning an electronic device. The electronic device proactively broadcasts an advertising packet that includes a device identifier associated with the...
9009835 Smart card, anti-virus system and scanning method using the same  
A smart card installed in a device receives from the device data to be scanned and determines whether a virus exists in the data. Accordingly, security of the device may be enhanced without using...
9009808 Delivery of multiple third-party services to networked devices  
Systems and methods for authenticating a media device or other information handling system so as to be able to receive content from one or more media content providers. Authenticating the device...
9009807 Smart device lockout  
Methods and systems for operating a Smart Device 102 with a secure communication system. A SPARC Security Device (SSD) 104 is in communication with one or more Smart Devices 102. SSD 104 receives...
9009857 Temporally controlling access to software assets on user devices  
The availability of software assets on electronic devices, such as mobile devices of users, is restricted based on the time as determined by a managing server. An application that runs on the...
9009787 System and method of mapping and protecting communication services with OAuth  
In accordance with various embodiments, systems and methods which allow mapping and protecting communication services and granular access to subscriber information. Such a system can include a...
9003508 Methods and apparatus for enabling secure network-based transactions  
A security process involves log-in and data exchange between a server and a user operating a computerized appliance. The process requires a user-specific token, independent verification of the...
9003191 Token-based authentication using middle tier  
An intermediary system facilitates a connection request from a client to a server. The intermediary system may participate in either or both of a token creation phase and a server connection...
9003541 Method and apparatus for desktop product license portability with user identity subscription using durable tokens  
A method, apparatus and computer program product relating to software license tokens is presented. A client system requests launching of a software application and retrieves a first software...
9003361 Generating a restful web service software development kit client  
A computer system receives user input indicating uniform resource identifiers (URIs) for a RESTful web service. The computer system identifies a programming language for a RESTful web service...
9003055 Controlling third party access to network devices  
A device may receive a command from a source device, may receive information that identifies a destination device associated with the command, may receive information that identifies a user...
9003516 System and method for encrypted smart card pin entry  
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for...
9003506 Mobile out-of-band authentication service  
Certain embodiments enable authentication of an application session at a client machine by using authentication values and user-identification values that are received from a mobile communication...
8997194 Using windows authentication in a workgroup to manage application users  
An system for authenticating users of an application program executing at a front-end computer using the security features built into the operating system of a logon computer is provided....
8997214 Method and system for creating and accessing a secure storage area in a non-volatile memory card  
In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first...
8997196 Flexible end-point compliance and strong authentication for distributed hybrid enterprises  
Systems, methods and apparatus for accessing at least one resource hosted by at least one server of a cloud service provider. In some embodiments, a client computer sends authentication...
8996879 User identity attestation in mobile commerce  
A method, apparatus, system, and computer program product for user identity attestation in mobile commerce. The method may include obtaining a photograph of a user of a mobile device via a camera...
8996872 Contactless seed programming method and system thereof  
The invention discloses a contactless seed programming method, belonging to information security field. In the method, a seed programming device obtains a token ID of a dynamic token, obtains...
8997197 Encryption-based data access management  
Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage...
8997187 Delegating authorization to applications on a client device in a networked environment  
A computer-readable medium encoded with software for execution. When executed, the software may be operable to send to a remote server, from an agent application, a request for a first access...
8990914 Device, method, and system for augmented reality security  
Devices and methods for authenticating a user of a mobile computing device to a content server include establishing a communication session between a target computing device and the content server...