Matches 1 - 50 out of 122 1 2 3 >


Match Document Document Title
US20130173915 SYSTEM AND METHOD FOR SECURE NEWORK LOGIN  
Systems and methods for providing an expedited login process that is relatively fast and that still provides a reasonable level of security and a reasonable method for mitigating compromised login...
US20140223175 SYSTEM, DESIGN AND PROCESS FOR EASY TO USE CREDENTIALS MANAGEMENT FOR ONLINE ACCOUNTS USING OUT-OF-BAND AUTHENTICATION  
The invention provides an easy to use credential management mechanism for multi-factor out-of-band multi-channel authentication process to protect a large number of documents without the need to...
US20140281506 SOFT TOKEN SYSTEM  
Systems and methods for a secure soft token solution applicable to multiple platforms and usage scenarios are provided. According to one embodiment a method is provided for soft token management....
US20150200780 IDENTIFICATION AND/OR AUTHENTICATION METHOD  
A computer-implemented authentication method allows a user having a personal electronic device (PED) to login to a recipient system. The user establishes an account on an authentication server,...
US20150046697 OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM  
Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller....
US20100122082 USER IDENTITY VALIDATION SYSTEM AND METHOD  
An identity validation system and method for the Internet provides user accountability while supporting user privacy to counter SPAM, Internet vandalizers, and predators, as well as cyber bullies...
US20110126002 TOKEN RENEWAL  
A method and system for renewing certificates stored on tokens is described.
US20120278614 USER AUTHENTICATION SYSTEM, USER AUTHENTICATION APPARATUS, SMART CARD, AND USER AUTHENTICATION METHOD FOR UBIQUITOUS AUTHENTICATION MANAGEMENT  
A user authorization system, a user authorization apparatus, a smart card, and a user authorization method for ubiquitous authorization management are disclosed. The user authorization system for...
US20140149741 ACCESS MANAGEMENT SYSTEM USING TRUSTED PARTNER TOKENS  
A method of using an access manager server to establish a communication session between a resource and a user device may include receiving a request from the user device to access the resource,...
US20140032898 AUTHENTICATION SYSTEM AND METHOD FOR DIGITAL TELEVISIONS  
The invention relates to digital television authentication system and method. The system includes a digital television having a digital television master chip; an SIM card module with a built-in...
US20110022835 Secure Communication Using Asymmetric Cryptography and Light-Weight Certificates  
Encrypted communications between servers and client devices over an unsecured channel, such as the Internet, without using a public key infrastructure are disclosed. Messages to a client device...
US20110145570 Certified Abstracted and Anonymous User Profiles For Restricted Network Site Access and Statistical Social Surveys  
An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other...
US20150242609 Universal Authenticator Across Web and Mobile  
Applications that rely on user authentication information execute within an application container on the computing device. The application container comprises a plug receiver module and a delegate...
US20140351583 METHOD OF IMPLEMENTING A RIGHT OVER A CONTENT  
Disclosed are methods and systems of implementing a right over a content or contents. Various implementations may include means and operations for receiving, for example in an execution...
US20130332727 ACCESS TOKEN EVENT VIRTUALIZATION  
Systems, devices, and methods are disclosed for access token event virtualization. An access token may be received at a central server computer system from a terminal device. The access token...
US20080313457 SECURE PHYSICAL DISTRIBUTION OF A SECURITY TOKEN THROUGH A MOBILE TELEPHONY PROVIDER'S INFRASTRUCTURE  
The present invention discloses a system and method of leveraging mobile telephone provider assets and distribution network to securely deliver security tokens, such as PKI certificates. The...
US20100161973 REQUEST AUTHENTICATION TOKEN  
An authentication mechanism for use in network-based services generates an authentication token. The authentication token is provided to a client device as part of the code comprising a content...
US20150058621 PROOF OF POSSESSION FOR WEB BROWSER COOKIE BASED SECURITY TOKENS  
In one embodiment, a user device 110 may access a network service 122 using a secure cookie 300. A high trust process may create an authentication proof 360 using a secure key. The high trust...
US20070186099 TOKEN BASED TWO FACTOR AUTHENTICATION AND VIRTUAL PRIVATE NETWORKING SYSTEM FOR NETWORK MANAGEMENT AND SECURITY AND ONLINE THIRD PARTY MULTIPLE NETWORK MANAGEMENT METHOD  
A two-factor network authentication system uses “something you know” in the form of a password/Pin and “something you have” in the form of a key token. The password is encrypted in a secure area...
US20100205432 METHOD, SYSTEM, TRUSTED SERVICE MANAGER, SERVICE PROVIDER AND MEMORY ELEMENT FOR MANAGING ACCESS RIGHTS FOR TRUSTED APPLICATIONS  
A method for granting trusted applications (SP1_WL) of a Service Provider (SP1, SP2) access to applications (appSP1.1, appSP1.2; appSP2.1) of that Service Provider (SP1, SP2) that have been stored...
US20150249679 METHOD AND DEVICE FOR PROTECTING AN ELECTRONIC DEVICE AGAINST FAULT ATTACK(S)  
A protection device equips an electronic device comprising hardware and software capable of executing a sensitive process. This protection device comprises i) a detection means arranged for...
US20110302412 PSEUDONYMOUS PUBLIC KEYS BASED AUTHENTICATION  
Systems and methods for pseudonymous public keys based authentication are described that enable an authentication to achieve pseudonymity and non-repudiation, for example, at the same time....
US20150172284 SMARTCARD FORMATION WITH AUTHENTICATION  
A method includes detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key, and...
US20090282243 PUZZLE-BASED AUTHENTICATION BETWEEN A TOKEN AND VERIFIERS  
A puzzle-based protocol is provided that allows a token and verifier to agree on a secure symmetric key for authentication between the token and verifier. A token stores a secret key and one or...
US20140149742 METHOD AND SYSTEM OF PROVIDING AUTHENTICATION OF USER ACCESS TO A COMPUTER RESOURCE VIA A MOBILE DEVICE USING MULTIPLE SEPARATE SECURITY FACTORS  
A method and system of authenticating a computer resource such as an application or data on a mobile device uses a contactless token to provide multi-factor user authentication. User credentials...
US20110225421 METHOD OF OBTAINING CONTENT FOR MOBILE TERMINAL, MOBILE TERMINAL USING THE METHOD, AND NEAR FIELD COMMUNICATION SYSTEM HAVING THE MOBILE TERMINAL  
A method of operating a near field communication system includes receiving an electronic tag having information signed by using a private key, verifying the signed information of the electronic...
US20060064592 SYSTEM FOR CONTROLLING SMART CARD SLOTS AND METHOD FOR CONTROLLING SMART CARD SLOTS  
A system for controlling smart card slots (121, 122, 123) of a device comprising smart card slots (121, 122, 123) providing access to smart card (111, 112, 113) resources via slot interfaces (103)...
US20140181507 LINKING TOKEN DETECTION AT A SINGLE COMPUTING PLATFORM WITH A USER IDENTIFICATION TO EFFECTUATE MODIFICATIONS IN VIRTUAL SPACE INSTANCES PRESENTED VIA MULTIPLE COMPUTING PLATFORMS  
Token detection at a single computing platform may be linked with a user identification to unlock content and/or effectuate modifications in virtual space instances presented via multiple...
US20070061567 Digital information protection system  
A system by which documents and other network resources may be kept secure and private. Using public key encryption technology, an integrated set of elements serve to provide security, encryption,...
US20070266239 Method for providing a cryptographically signed command  
The invention provides a method for providing a cryptographically signed command, the command comprising a command name and at least one command argument with generating a cryptographic signature...
US20050257047 Network equipment with embedded movable secure devices  
A system for improving security of management and control functions at a network element in a communications network is described. The control card of the network element is configured to function...
US20080046723 Multi-factor authentication  
Methods and devices are provided for two-way authentication. In one example, a method prompts a user for an account number and a PIN. Upon authentication of the account number and the PIN, an...
US20090150667 MOBILE SMARTCARD BASED AUTHENTICATION  
In an authentication server, information representing a first part of a response to a challenge is received during the authentication preparation phase. The challenge and the first part of the...
US20070234048 Session Handover Between Terminals  
Methods, apparatus, systems and devices for facilitating transfer of a remote session from a first user terminal to a second user terminal are disclosed herein. According to one example, the...
US20100031032 Method, apparatus, and system for network security via network wall plate  
A wall plate assembly has a first port adapted to be coupled to a device and a second port adapted to be coupled to a communications network. The wall plate assembly is operable to obtain...
US20100185851 EFFICIENT AND SECURE CRYPTOGRAPHIC COUPON RELOADING  
A system and a method for cryptographic coupon reloading are provided for, wherein a coupon comprises, on one hand, a pseudo-random number ri=PRFK(i), where i is an index for labeling the coupon,...
US20070180233 METHOD FOR GENERATING DECRYPTION KEY, APPARATUS AND METHOD USING DECRYPTION KEY  
A decryption key unique to each user system is a value obtained by (a)assigning different individual key generation polynomials to a root, a plurality of nodes, and a plurality of leaves of a tree...
US20070118741 Object delivery authentication  
Provided is a method and system for authenticating object delivery including the steps of receiving by an object receiver an object delivery information package from an object deliverer over a...
US20070154014 Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel  
A system and method for establishing a trusted connection on a mobile computing device. A shared secret is generated on a trusted platform of the mobile computing device. The shared secret is...
US20070150736 Token-enabled authentication for securing mobile devices  
A system and method to protect mobile devices, such as laptops, PDAs, and mobile telephones with a wearable token is presented. The method performs token-enabled authentication to enable operation...
US20100115270 Authentication of a Consumable  
A method authenticating a consumable is disclosed. The consumable includes a first integrated circuit operative to receive data and return the data encrypted. The method receives a random number...
US20090282240 Secure Decentralized Storage System  
A secure decentralized storage system provides scalable security by addressing the performance bottleneck of the security manager and the complexity issue of security administration in large-scale...
US20070055633 Secure NFC apparatus and method supporting various security modules in plug-in fashion  
A secure NFC apparatus includes a plug-in socket, an NFC unit, and a protocol matching unit. A security module is inserted in the plug-in socket. The NFC unit communicates with the outside via...
US20140298011 SECURE AND EFFICIENT AUTHENTICATION USING PLUG-IN HARDWARE COMPATIBLE WITH DESKTOPS, LAPTOPS AND/OR SMART MOBILE COMMUNICATION DEVICES SUCH AS IPHONES™  
A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into...
US20090006846 Bluetooth device as security access key  
This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example...
US20090164777 METHOD AND SYSTEM FOR SECURELY COMMUNICATING BETWEEN A PRIMARY SERVICE PROVIDER AND A PARTNER SERVICE PROVIDER  
A method and system for authenticating a partner service provider and a primary service provider includes a network and, a partner service provider generating a request for a first encrypted token...
US20070250706 CHANNEL BINDING MECHANISM BASED ON PARAMETER BINDING IN KEY DERIVATION  
This document describes a channel binding mechanism based on parameter binding in the key derivation procedure. The method cryptographically binds access network parameters to a key without need...
US20090235069 Arrangement of and method for secure data transmission  
A method of and system for secure data transmission between a client and a third party computer arrangement. The method includes authenticating a user of the client by a security server via a...
US20100235900 EFFICIENT TWO-FACTOR AUTHENTICATION  
Methods, devices, and systems are provided for an efficient two-factor authentication process. In particular, a card challenge is combined with a user-provided password or similar user-based...
US20080005558 Methods and apparatuses for authentication and validation of computer-processable communications  
Computer-processable communication authentication and validation methods and apparatuses are described according to various embodiments. In one embodiment, an authentication and validation method...

Matches 1 - 50 out of 122 1 2 3 >