Match Document Document Title
US20160021108 RULE SETS FOR CLIENT-APPLIED ENCRYPTION IN COMMUNICATIONS NETWORKS  
A rule set for client-applied encryption is created and deployed to a client device by a network device over a communications network. Encryption applied by the client in accordance with the rule...
US20160021107 Multi-function Smart Communication Card  
Various embodiments are described that relate to a smart card. When not connected to an external system, such as a laptop computer, the smart card can be configured to power itself. Thus, various...
US20160021106 USER AUTHENTICATION VIA EVOKED POTENTIAL IN ELECTROENCEPHALOGRAPHIC SIGNALS  
Techniques are disclosed for authentication and identification of a user by use of an electroencephalographic (EEG) signal. For example, a method for authenticating a user includes the following...
US20160021105 Secure Voice Query Processing  
Techniques for securely processing voice queries are provided. In one embodiment, a computing device can receive speech data corresponding to a voice query uttered by a user and, in response to...
US20160021104 Streaming Music Using Authentication Information  
Techniques provided herein may facilitate registering audio content services with an audio system. An example technique involves a computing device receiving via a control interface for...
US20160021103 PROVIDING A SERVICE BASED ON TIME AND LOCATION BASED PASSWORDS  
A first device may receive a first password from a second device. The first password may be generated based on first time information and first location information identifying a geographic...
US20160021102 METHOD AND DEVICE FOR AUTHENTICATING PERSONS  
A method for authenticating a person with respect to a host. The host requests a temporary password from the person for accessing a service of the host. Random-based information is generated and...
US20160021101 METHOD FOR BACKING UP A USER SECRET AND METHOD FOR RECOVERING A USER SECRET  
A method for backing a user secret and recovering a user secret. A set of mandatory trustees possessing a public key and a set of non-mandatory trustees possessing a public key are determined. A...
US20160021100 METHOD, SYSTEM, AND DEVICE FOR GENERATING, STORING, USING, AND VALIDATING TAGS AND DATA  
A smart tag and methods of interacting with and authenticating interactions with the same are provided. The smart tag (308) is enabled to generate a Tag Authentication Cryptogram (TAC) and include...
US20160021099 DATA SECURITY  
In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a request to store input data in storage,...
US20160021098 SECURE COMMUNICATION DURING PROVISIONING OF A MOBILE DEVICE TO STREAM MEDIA CONTENT FROM A MEDIA CLIENT  
A device may be configured to communicate with a mobile device using a short range communication protocol. The device may open a port based on communicating with the mobile device using the short...
US20160021097 FACILITATING NETWORK AUTHENTICATION  
Embodiments provide single sign on to enterprise applications through a captive portal. Example embodiments include receiving from a captive portal sign-on user interface, a request for network...
US20160021096 AUTHENTICATION SYSTEM  
A device authentication system for use with an authenticatable device having a physically-unclonable function and constructed to, in response to input, of challenge C, internally generate an...
US20160021095 Protection from Unfamiliar Login Locations  
In one embodiment, a user authentication server may use geo-location tracking to determine whether to present an enhanced identity challenge. A communication interface 180 may receive a user login...
US20160021094 SYSTEMS AND METHODS FOR SECURE PASSWORD ENTRY  
Systems and methods for secure password entry are provided. A request to authenticate a user is received from a user device. A sequence of characters is generated. The sequence has a first subset...
US20160021093 SYSTEM AND A METHOD FOR VALIDATING AN IDENTIFICATION TOKEN  
An Identification Device (10) for providing validation information comprising: a Token (11) anda Validator (20);wherein the display (17) is adapted to display, during an Operational Phase, a first...
US20160021092 SYSTEM AND METHOD FOR MANAGING HETEROGENEOUS COMPUTING ENVIRONMENTS  
A system for transferring data, in the form of files, from a first location in the cloud to a second location in the cloud includes storage for credentials to allow the system to access the data...
US20160021091 PROOF OF PRESENCE VIA TAG INTERACTIONS  
A system and method for determining presence information for mobile devices (104) are disclosed. Specifically, the presence information for a mobile device (104) can be determined based on whether...
US20160021090 METHOD AND SYSTEM FOR PASSWORD SETTING AND AUTHENTICATION  
A method for password setting and authentication is provided. The method includes receiving a password setting request and acquiring a reference character string and reference input duration...
US20160021089 CONTENT DELIVERY SUBSCRIPTION  
Various embodiments of the present technology involve a synchronized content management system (CMS) automatically receiving and storing content items associated with a digital content...
US20160021088 CONTENT RESTRICTION COMPLIANCE USING REVERSE DNS LOOKUP  
A method for alerting Internet content providers of the age or other personal information of a computer user, which includes receiving a reverse DNS lookup query from an Internet content provider;...
US20160021087 DATA CUSTODIAN AND CURATION SYSTEM  
A data custodian and curation system may store data from a data supplier in encrypted form and may allow users to consume the data when the consumers obtain access to the data through an...
US20160021086 SYSTEM FOR SECURE ENROLLMENT AND SECURE VERIFICATION OF NETWORK USERS BY A CENTRALIZED IDENTIFICATION SERVICE  
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of...
US20160021085 Streaming Music Using Authentication Information  
Techniques provided herein may facilitate set-up of an audio system with audio content services that have been previously registered on a second system. An example technique involves a computing...
US20160021084 SYSTEMS AND METHODS OF SHARING INFORMATION THROUGH A TAG-BASED CONSORTIUM  
The invention provides one or more consortia of networks that identify and share information about users and/or user devices interacting with the consortia. User devices may be identified, at...
US20160021083 AUTOMATED IDENTITY ASSESSMENT METHOD AND SYSTEM  
A method, system and software for assessing an entity (15) at a first user terminal (13) connected to a data network (10). A control system (11) is used to receive an access request (101) from the...
US20160021082 METHOD AND APPARATUS FOR PREVENTING ILLEGITIMATE OUTFLOW OF ELECTRONIC DOCUMENT  
An apparatus and method for preventing illegitimate outflow of an electronic document. The apparatus includes a taking-out control unit, a taking-out management server unit, and a self-response...
US20160021081 MOBILE DEVICE USER AUTHENTICATION BASED ON USER BEHAVIOR INFORMATION  
Authentication involves collecting information relating to a user's behavior relative to a mobile device carried by the user, over a number of time periods that correspond to each other. An...
US20160021080 SYSTEM FOR INTERACTIVE MATRIX MANIPULATION CONTROL OF STREAMED DATA AND MEDIA  
An interactive streaming media and application service provider system can securely stream high resolution, multiple formats of video and data. Different data sets can be included in a single...
US20160021079 Sending Encrypted Data to a Service Provider  
Sending encrypted data to a service provider includes exchanging an encryption key between an entity and a service provider without retaining the encryption key and while hiding an identity of...
US20160021078 OPTIMIZING SECURE COMMUNICATIONS BETWEEN A CLIENT AUTHENTICATING SERVER AND A MOBILE CLIENT  
Systems and techniques are described for optimizing secure communications. Specifically, a first intermediary and a second intermediary can split-terminate a secure connection handshake or a...
US20160021077 SYSTEM AND METHOD EMPLOYING AN AGILE NETWORK PROTOCOL FOR SECURE COMMUNICATIONS USING SECURE DOMAIN NAMES  
A system for connecting a first network device and a second network device includes one or more servers. The servers are configured to: (a) receive, from the first network device, a request to...
US20160021076 ELECTRONIC COMMUNICATION SYSTEM AND METHOD FOR COMMUNICATION OF THE SAME IN AN OPEN ENVIRONMENT  
An electronic communication system and a method allowing communication to be performed in an open environment are provided for a server to authenticate a user that has no account with the server...
US20160021075 EFFICIENT KEY GENERATOR FOR DISTRIBUTION OF SENSITIVE MATERIAL FROM MULTIPLE APPLICATION SERVICE PROVIDERS TO A SECURE ELEMENT SUCH AS A UNIVERSAL INTEGRATED CIRCUIT CARD (UICC)  
A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes....
US20160021074 SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION  
A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset...
US20160021073 SECURE SPIN TORQUE TRANSFER MAGNETIC RANDOM ACCESS MEMORY (STTMRAM)  
A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the...
US20160021072 TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK  
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services to multiple customers are provided....
US20160021071 RAPID DATA ENCRYPTION AND DECRYPTION FOR SECURE COMMUNICATION OVER OPEN CHANNELS WITH PLAUSIBLE DENIABILITY  
Technologies are generally described for providing rapid data encryption and decryption for secure communication over an open channel with plausible deniability. In some examples, a single bit of...
US20160021070 SYSTEM AND METHOD FOR DATA-PROTECTION-COMPLIANT CAPTURE AND FORWARDING OF TELEMETRY DATA  
System for automated capture of telemetry data consisting of motion data and existing sensor data in transport means currently involved in the traffic for use to provide both services that benefit...
US20160021069 Geospatial Cryptagraphy  
The invention includes methods for authenticating access between devices when the devices are within a geospatial boundary comprising the first step of keeping track of the physical position of...
US20160021068 ENCRYPTION DEVICE WITH CONFIGURABLE SECURITY FUNCTIONALITY USING NETWORK AUTHORIZATION CODE  
A device and method for file encryption and decryption with a cryptographic processor reconstituting a file encryption key from a version of the key which has been shrouded with a network...
US20160021067 METHODS, DEVICES AND SYSTEMS FOR ANTI-COUNTERFEITING AUTHENTICATION  
An anti-counterfeiting authentication method is provided. The method includes: generating an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is...
US20160021066 ENCRYPTION KEY UPDATES IN WIRELESS COMMUNICATION SYSTEMS  
In an aspect, a wireless communication between a transmitter and a receiver involves determining updated keys according to a key management process for MAC layer encryption. Such key is propagated...
US20160021065 METHOD AND APPARATUS FOR MASKING NON-PUBLIC DATA ELEMENTS IN UNIFORM RESOURCE INDENTIFIERS ("URI")  
Methods may display a URI of a resource. Methods may determine the presence of a non-public data element in the URI. Methods may generate a random number in response to the determination of the...
US20160021064 SYSTEM AND METHOD TO SECURE SENSITIVE CONTENT IN A URI  
A system and method for transmitting data using a data transfer protocol, including receiving, at the first device, a request from the second device, the request containing a transformed...
US20160021063 System for Efficiently Handling Cryptographic Messages Containing Nonce Values in a Wireless Connectionless Environment  
A system for determining the validity of a received cryptographic message while ensuring for out-of-order messages is utilized to provide for secure communications among peers in a network. In...
US20160021062 Attack Defense Processing Method and Protection Device  
An attack defense processing method and a protection device. The attack defense processing method includes the protection device receives a first packet by a protection device, if it is determined...
US20160021061 DETECTING ADVERSE NETWORK CONDITIONS FOR A THIRD-PARTY NETWORK SITE  
A network protection service for providing protective assistance to a subscribing host is presented. The network protection service is configured determine a set of rules for filtering network...
US20160021060 Reverse NFA Generation And Processing  
In a processor of a security appliance, an input of a sequence of characters is walked through a finite automata graph generated for at least one given pattern. At a marked node of the finite...
US20160021059 METHOD AND SYSTEM FOR PACKET ACQUISTION, ANALYSIS AND INTRUSION DETECTION IN FIELD AREA NETWORKS  
A system for intrusion detection in a field area network where data is transmitted via packets, includes a processor for analyzing the packets to ascertain whether the packets conform to a sets of...