Match
|
Document |
Document Title |
|
US20130173915 |
SYSTEM AND METHOD FOR SECURE NEWORK LOGIN
Systems and methods for providing an expedited login process that is relatively fast and that still provides a reasonable level of security and a reasonable method for mitigating compromised login... |
|
US20140115323 |
SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE
Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash... |
|
US20130275747 |
ENTERPRISE ENVIRONMENT DISK ENCRYPTION
A method for deploying a disk encryption password to a client computer includes installing a disk encryption agent on a client computer, where the agent communicates with an enterprise encryption... |
|
US20140082350 |
SECURITY CREDENTIAL DEPLOYMENT IN CLOUD ENVIRONMENT
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a... |
|
US20130238894 |
Managing Credentials
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and... |
|
US20130117557 |
CLOUD COMPUTING SYSTEM AND CLOUD SERVER MANAGING METHOD THEREOF
A cloud computing system is disclosed. The cloud computing system includes a management server that manages a plurality of servers and distributes service resources. Each of the servers... |
|
US20120060025 |
SERVICE PROVIDER INVOCATION
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and... |
|
US20150026457 |
CONTROLLING ACCESS BY CODE
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or... |
|
US20140136837 |
METHOD FOR IDENTIFYING AND AUTHENTICATING A USER VIA A PORTABLE DEVICE
The method comprises: a1) associating, a user server (US) in collaboration with an authoritative user server (AUS), a user's portable device (MT) with an email address; anda2) once associated,... |
|
US20120054486 |
Securing A Virtual Environment And Virtual Machines
A computer implemented method and system for securing a virtual environment and virtual machines in the virtual environment is provided. A credential authority server is provided for managing... |
|
US20130326213 |
METHOD AND SYSTEM FOR AUTOMATIC GENERATION OF CONTEXT-AWARE COVER MESSAGE
One embodiment provides a system that facilitates secure communication between a sending device and a receiving device. During operation, the system first transmits an encrypted message to a... |
|
US20110246764 |
USER AUTHENTICATION SYSTEM
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests... |
|
US20110107085 |
Authenticator relocation method for wimax system
A method is provided for Authenticator Relocation in a communication system applying an Extensible Authentication Protocol, or the like, which provides replay protection and mitigates the rogue... |
|
US20150100777 |
Secure Federated Identity Service
Federated identity is the means of linking a person's electronic identity and attributes, such that the user can be authenticated with a single sign-on, across multiple systems and organizations.... |
|
US20140317400 |
SYSTEM AND METHOD FOR VALIDATION AND ENFORCEMENT OF APPLICATION SECURITY
A system and method for validation and enforcement of application security, wherein the user credentials and the integrity of a target application are verified before the target application is... |
|
US20140164762 |
APPARATUS AND METHOD OF ONLINE AUTHENTICATION
In a method of online authentication, digital certificates of a client device and an application server are verified when the application server receives a login request to a network application... |
|
US20140082349 |
SECURITY CREDENTIAL DEPLOYMENT IN CLOUD ENVIRONMENT
Techniques are described for deploying a security credential for an application deployed in a cloud. An encrypted security credential is received from a remote system and is inserted into a... |
|
US20150134950 |
STORAGE ARRAY PASSWORD MANAGEMENT
A system and method for generating passwords for secure login to a storage array. A randomly generated root secret is utilized along with a compartment ID to generate a root password for logging... |
|
US20130311770 |
TRACING DEVICE AND METHOD
A tracing method performed by a traceability device for validating a process having a purity of steps. During at least one step of the process, there is a step of receiving a marking message sent... |
|
US20100325441 |
PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access... |
|
US20140359278 |
Secure Remote Subscription Management
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)... |
|
US20110035584 |
SECURE REMOTE SUBSCRIPTION MANAGEMENT
A method and apparatus are disclosed for performing secure remote subscription management. Secure remote subscription management may include providing the Wireless Transmit/Receive Unit (WTRU)... |
|
US20120198228 |
SYSTEM AND METHOD FOR DIGITAL USER AUTHENTICATION
A method according to preferred embodiment can include receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of the... |
|
US20140101438 |
STRUCTURE PRESERVING DATABASE ENCRYPTION METHOD AND SYSTEM
A database encryption system and method, the Structure Preserving Database Encryption (SPDE), is presented. In the SPDE method, each database cell is encrypted with its unique position. The SPDE... |
|
US20130238893 |
DIGITAL LOCKER FOR ESTATE PLANNING SYSTEM AND METHOD
A secure system and method is presented for an individual to gather, organize, store, and share personal and asset information. The system is offered through software-as-service platform to... |
|
US20130145148 |
PASSCODE RESTORATION
A system method that includes providing a passcode to a user based on presentation of both a recovery key and an active token is described herein. |
|
US20130067217 |
SYSTEM AND METHOD FOR PROTECTING ACCESS TO AUTHENTICATION SYSTEMS
A system and method for protecting access to authentication systems. A mediator may accept original authentication credentials from a client, may process the authentication credentials to provide... |
|
US20130031359 |
METHOD AND SYSTEM FOR MODULAR AUTHENTICATION AND SESSION MANAGEMENT
Modular authentication and session management involves the use of discrete modules to perform specific tasks in a networked computing environment. There may be a separate authentication server... |
|
US20120072714 |
Methods and Systems for Secure Authentication of a User by a Host System
A method and system for securely logging onto a banking system authentication server so that a user credential never appears in the clear during interaction with the system in which a user's... |
|
US20130232336 |
METHOD AND SYSTEM FOR USER AUTHENTICATION FOR COMPUTING DEVICES UTILIZING PKI AND OTHER USER CREDENTIALS
A system and method for user authentication utilizing PKI credentials and user credentials on an electronic device comprising a mobile communication device, smart phone, a computer or other... |
|
US20110035583 |
AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND COMPUTER READABLE MEDIUM
An authentication apparatus includes an accepting unit and an instructing unit. The accepting unit accepts a request, which requests to issue an authentication medium for a second user, from a... |
|
US20130019092 |
System to Embed Enhanced Security / Privacy Functions Into a User Client
A system and method for provisioning enhanced security/privacy functions into a user client to detect, warn, and avoid man in the middle attacks and to improve privacy and security of data... |
|
US20120331287 |
Provisioning a Shared Secret to a Portable Electronic Device and to a Service Entity
Systems and methods are provided for computing a secret shared with a portable electronic device and service entity. The service entity has a public key G and a private key g. A message comprising... |
|
US20150046697 |
OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM
Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller.... |
|
US20120131332 |
Method and Apparatus for Authenticating Online Transactions Using a Browser
A computer-implemented method for authenticating a user using a service provider server and an authentication server, the user communicating with at least one of the service provider server and... |
|
US20130145150 |
CODE SIGNING SYSTEM AND METHOD
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or... |
|
US20140244997 |
EMERGENCY MODE FOR IOT DEVICES
Methods and apparatuses for implementing an emergency instruction based on an emergency message from a trusted authority source. The method includes receiving, at an Internet of Things (IoT)... |
|
US20120297185 |
MAINTAINING PRIVACY FOR TRANSACTIONS PERFORMABLE BY A USER DEVICE HAVING A SECURITY MODULE
A method and system for maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority and a verifier are disclosed. The system... |
|
US20110016311 |
METHOD FOR PREVENTING LAUNDERING AND REPACKAGING OF MULTIMEDIA CONTENT IN CONTENT DISTRIBUTION SYSTEMS
A method for distributing content in a content distribution system is disclosed which comprises the steps of: encrypting at a Content Packager a content using a content encryption key to generate... |
|
US20130121489 |
System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition
Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured... |
|
US20110265172 |
METHOD AND SYSTEM FOR THIRD PARTY CLIENT AUTHENTICATION
Methods and systems for third party client authentication of a client. A method includes displaying a user interface on a display of the client, the user interface including an option to select a... |
|
US20140201517 |
METHOD AND SYSTEM FOR DISTRIBUTED OFF-LINE LOGON USING ONE-TIME PASSWORDS
A method and a system for extending distributed logon services to an off-line computing device includes encrypting, on the off-line computing device, a one-time password (OTP), a nonce, and a... |
|
US20150058619 |
SYSTEMS AND METHODS FOR IMPLEMENTING COMPUTER SECURITY
A security server transmits a specification of a first set of files and directories to a computing device for monitoring according to a security policy. Each of the files or directories in the... |
|
US20150149767 |
METHOD AND SYSTEM FOR AUTHENTICATING THE NODES OF A NETWORK
A system and a method are provided for authenticating the nodes of a communication network in order to access the services of a service provider, and includes a collective authentication of the... |
|
US20140289508 |
METHOD, CLIENT AND SYSTEM OF IDENTITY AUTHENTICATION
A method, client device and system of identity authentication are provided. The method may include detecting a login or registration operation, to a server, via a login interface on a user... |
|
US20150188913 |
METHOD AND APPARATUS FOR PROVIDING CLIENT-SIDE SCORE-BASED AUTHENTICATION
Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may comprise a client-side risk assessment.... |
|
US20130080769 |
SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a... |
|
US20150082024 |
TECHNOLOGIES FOR SYNCHRONIZING AND RESTORING REFERENCE TEMPLATES
Generally, this disclosure describes technologies for restoring and/or synchronizing templates such as biometric templates to/among one or more client devices. In some embodiments one or more... |
|
US20120297187 |
Trusted Mobile Device Based Security
A method for performing user security operations using a mobile communications device includes, storing at least one security credential for a user in the mobile communications device, receiving a... |
|
US20100313012 |
LIGHT ACCESS AUTHENTICATION METHOD AND SYSTEM
A light access authentication method and system, the method includes: the trustful third party writes the MSG cipher text formed by enciphering MSG into the first entity; the second entity attains... |