Matches 1 - 50 out of 218 1 2 3 4 5 >

AcclaimIP-ad

Match Document Document Title
US20050097440 Method and system for collaboration  
A scalable and reliable collaborative software application that provides an information hub that serves as a single portal to using applications in an aggregated, collaborative manner, thereby...
US20050050317 A SYSTEM AND METHOD OF EXPLOITING THE SECURITY OF A SECURE COMMUNICATION CHANNEL TO SECURE A NON-SECURE COMMUNICATION CHANNEL  
The present invention features a system and method for establishing a secure communication channel between a client and an application server. In one embodiment, a ticket service generates a...
US20090113205 METHOD AND APPARATUS FOR THE SECURE IDENTIFICATION OF THE OWNER OF A PORTABLE DEVICE  
An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a...
US20060291657 Trusted monitoring system and method  
Methods and apparatus for monitoring remotely located objects with a system comprised of at least one master data collection unit, any number of remote sensor units, and a central data collection...
US20090282241 METHOD AND APPARATUS TO PROVIDE A USER PROFILE FOR USE WITH A SECURE CONTENT SERVICE  
A secure content service available through a network comprising a user profile stored in a user profile store and a profile access controller to enforce access rights to the user profile, wherein...
US20110154023 Protected device management  
A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in...
US20100313013 SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20080301437 Method of Controlling Access to a Scrambled Content  
A method for access control to a digital scrambled content distributed to a set of installed reception terminals including one master terminal and at least one slave terminal dependent on the...
US20050091539 Supporting auto-logon for multiple devices  
Enables multiple devices of a same user to logon automatically. An example of a method includes: registering the user and the user's multiple user devices with a Multiple Device Authentication...
US20140244997 EMERGENCY MODE FOR IOT DEVICES  
Methods and apparatuses for implementing an emergency instruction based on an emergency message from a trusted authority source. The method includes receiving, at an Internet of Things (IoT)...
US20050138355 System, method and devices for authentication in a wireless local area network (WLAN)  
A system (100) for authentication in a wireless local area network (WLAN) includes a CDMA2000 authentication center (190) for authenticating CDMA2000 credentials (110), a WLAN authentication...
US20060136717 System and method for authentication via a proximate device  
Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the...
US20050071636 Home network device, home network system and method for automating take ownership process  
A network device for automating a TakeOwnership process includes a public key generation unit for generating a public key and a private key by employing public key cryptography, a storage medium...
US20160255069 CONTEXT SENSITIVE DYNAMIC AUTHENTICATION IN A CRYPTOGRAPHIC SYSTEM  
A system for performing authentication of a first user to a second user includes the ability for the first user to submit multiple instances of authentication data which are evaluated and then...
US20140068247 SECURITY DEVICE ACCESS  
Technology is described to control a security device providing access to a restricted resource. The method can include generating a plurality of security access codes at a security locking device...
US20100153709 Trust Establishment From Forward Link Only To Non-Forward Link Only Devices  
In the present system three methods are provided for establishing trust between an accessory device and a host device, without placing trust in the device/host owner, so that content protection...
US20100146263 METHOD AND SYSTEM FOR SECURE AUTHENTICATION  
The invention relates to a method of authentication for a provider comprising requesting a verification system for authentication of a transaction initiated by a user by transmitting to the...
US20090249443 METHOD FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
US20050102501 Shared secret usage for bootstrapping  
A communication system including at least one user equipment and at least one network application functional entity is disclosed. The system further includes a bootstrapping functional entity. The...
US20050050363 Secure data management apparatus  
A secure data management apparatus capable of improving reliability and certainty of synchronization processing with the server, security of data, and reliability of time, and performing data...
US20070118735 Systems and methods for trusted information exchange  
Systems and methods are provided which allow for the secure exchange of information between a sender and a receiver. The systems and methods utilize a mutually trusted credential creator to...
US20050050318 Profiled access to wireless LANs  
A user PC reads security information regarding itself, and acquires a profile including security information in a profile acquisition/output unit, the profile being created in an administrator's...
US20100082972 Method to allow targeted advertising on mobile phones while maintaining subscriber privacy  
An apparatus in one example has: a trusted advertising server operatively coupled to at least one terminal of a subscriber; and a trusted database having respectively at least one profile for the...
US20060015716 Program product for maintaining certificate on client network devices1  
Disclosed herein are several digital certificate discovery and management systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description...
US20140019753 CLOUD KEY MANAGEMENT  
A system for managing encryption keys within a domain includes: a client computer coupled to a cloud key management server over a network, the client computer being configured to supply a request...
US20120185692 Secure cloud computing system  
The present invention provides a method and apparatus for securing electronic systems, including computers, information appliances and communication devices. The invention in question addresses...
US20090129597 REMOTE PROVISIONING UTILIZING DEVICE IDENTIFIER  
Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server...
US20080215878 Service Management System and Method  
The delivery of services is managed by a system that includes a portable device and a management apparatus which receives and decrypts a first identifier generated and encrypted by the portable...
US20070136573 System and method of using two or more multi-factor authentication mechanisms to authenticate online parties  
A system and method for authentication that comprises the use of at least one multiple multi-factor authentication with the optional addition of, mutual (site) authentication, transaction/behavior...
US20140317398 SECURING INFORMATION WITHIN A CLOUD COMPUTING ENVIRONMENT  
Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle...
US20140281491 IDENTITY ESCROW MANAGEMENT FOR MINIMAL DISCLOSURE CREDENTIALS  
The subject disclosure is directed towards identity escrow management where anonymous online users can be de-anonymized if certain conditions are met. An auditor is configured to control a user's...
US20130205133 STRONGLY AUTHENTICATED, THIRD-PARTY, OUT-OF-BAND TRANSACTIONAL AUTHORIZATION SYSTEM  
A system and method to perform an out-of-band authenticated authorization of an activity. A requesting system initiates an authorization request for an activity which is signed using a key pair...
US20120179904 Remote Pre-Boot Authentication  
A host computer cloud has a processor and supports a virtual machine. An agent under control of a user is in communication with the cloud over a network. A key management server is in...
US20100306530 WORKGROUP KEY WRAPPING FOR COMMUNITY OF INTEREST MEMBERSHIP AUTHENTICATION  
Methods and systems for managing a community of interest are disclosed. One method includes creating a workgroup key associated with a community of interest, and protecting one or more resources...
US20060274695 System and method for effectuating a connection to a network  
A system for connecting a mobile node includes a target network, and may include an anchor network. The anchor network can generate token information based upon a trust relationship between the...
US20050021940 Authentication mechanism for wireless communication devices  
One or more systems and methods are disclosed to securely authenticate one or more wireless communication devices using a subscriber identification mechanism provided by a wireless communication...
US20160261413 METHODS AND SYSTEMS FOR DEVICE AUTHENTICATION  
A method for authenticating communications may include registering the first device by receiving a device public key and a repository public key that are specific to the second device. The method...
US20110225421 METHOD OF OBTAINING CONTENT FOR MOBILE TERMINAL, MOBILE TERMINAL USING THE METHOD, AND NEAR FIELD COMMUNICATION SYSTEM HAVING THE MOBILE TERMINAL  
A method of operating a near field communication system includes receiving an electronic tag having information signed by using a private key, verifying the signed information of the electronic...
US20100325424 System and Method for Secured Communications  
A system for secured communications includes a control center, a network transceiver, an authentication server communicatively coupled between the control center and the network transceiver, and...
US20100106963 System and method for secure remote computer task automation  
A system includes a third party authority in communication with a client computer and a target computer. The third party authority is configured to receive a request including authentication...
US20100100465 TRUSTED THIRD PARTY AUTHENTICATION AND NOTARIZATION FOR EMAIL  
A system and method for providing trustworthy processing of electronic messages applies the digital signature of a trusted third party to a message en route from the sender to a recipient. The...
US20150271172 Secure cloud computing system  
The present invention provides a method and apparatus for securing electronic systems, including computers, information appliances and communication devices. The invention in question addresses...
US20080307220 VIRTUAL CLOSED-CIRCUIT COMMUNICATIONS  
A virtual closed circuit supports transactions between businesses and consumers. More generally, techniques are disclosed for supporting a secure, non-public, business-to-consumer communication...
US20050144439 System and method of managing encryption key management system for mobile terminals  
An encryption key management method for mobile terminals for providing at least one mobile terminal which is connected to a network to use services with an encryption key required for issuing a...
US20050055547 Remote processor  
A remote processor for executing processing requested from a client via a network, wherein an access right is authenticated using authenticating information generated by combining...
US20110302412 PSEUDONYMOUS PUBLIC KEYS BASED AUTHENTICATION  
Systems and methods for pseudonymous public keys based authentication are described that enable an authentication to achieve pseudonymity and non-repudiation, for example, at the same time....
US20150220709 SECURITY-ENHANCED DEVICE BASED ON VIRTUALIZATION AND THE METHOD THEREOF  
Disclosed is an electronic device for supporting enhanced security including: a processor; a memory; a virtual machine monitor; a first virtual machine in which a host operating system is...
US20100146262 Method, device and system for negotiating authentication mode  
The present disclosure discloses a method, device and system for negotiating authentication mode. A first negotiation request carrying an authentication mode supported by a terminal is sent to an...
US20090228704 PROVIDING DEVELOPER ACCESS IN SECURE OPERATING ENVIRONMENTS  
In some embodiments, software developers may obtain development access to a computing device. A software developer may request development access from one or more trusted authorities, such as a...
US20160234197 LAWFUL INTERCEPTION OF ENCRYPTED COMMUNICATIONS  
A method and apparatus for providing access to an encrypted communication between a sending node and a receiving node to a Law Enforcement Agency (LEA). A Key Management Server (KMS) function...
Matches 1 - 50 out of 218 1 2 3 4 5 >