Match Document Document Title
US20140129838 METHOD AND APPARATUS FOR RESILIENT END-TO-END MESSAGE PROTECTION FOR LARGE-SCALE CYBER-PHYSICAL SYSTEM COMMUNICATIONS  
To address the security requirements for cyber-physical systems, embodiments of the present invention include a resilient end-to-end message protection framework, termed Resilient End-to End...
US20120042166 METHOD AND DEVICE FOR AUTOMATICALLY DISTRIBUTING UPDATED KEY MATERIAL  
A method for handling an encrypted message received on an electronic device that has not been encrypted using a current public key. The portable electronic device automatically generates a reply...
US20150143124 SYSTEMS AND METHODS FOR FUEL DISPENSER SECURITY  
Systems and methods for fuel dispenser security are disclosed herein. In some embodiments, a user seeking access to a protected function of the fuel dispenser is presented with a challenge that is...
US20150143123 SYSTEMS AND METHODS FOR FUEL DISPENSER SECURITY  
Systems and methods for fuel dispenser security are disclosed herein. In some embodiments, a user seeking access to a protected function of the fuel dispenser is presented with a challenge that is...
US20110016320 METHOD FOR AUTHENTICATION AND SIGNATURE OF A USER IN AN APPLICATION SERVICE, USING A MOBILE TELEPHONE AS A SECOND FACTOR IN ADDITION TO AND INDEPENDENTLY OF A FIRST FACTOR  
The invention relates to a method for the two-factor authentication of a user in an application service running on an application server. The first authentication factor is a PIN authentication...
US20140089667 SECURE DEBUG TRACE MESSAGES FOR PRODUCTION AUTHENTICATED CODE MODULES  
Methods of extending capabilities of authenticated code modules (ACM) with minimal increase in code size comprises defining an authenticated code module (ACM) extension module using an entry of a...
US20140181521 PROVISIONING OF ELECTRONIC DEVICES  
Systems and methods for provisioning electronic devices. In some embodiments, a method may include receiving a first message at a provisioning server, the first message originated by a computing...
US20120204032 Encryption key exchange system and method  
The present invention is a computer-implemented key exchange system and methods for improving the usability of encryption technologies such as Public Key Infrastructure (PKI). One aspect of the...
US20140040622 SECURE UNLOCKING AND RECOVERY OF A LOCKED WRAPPED APP ON A MOBILE DEVICE  
A security-wrapped app that is locked and inaccessible is unlocked and recovered using a secure and user-friendly protocol. Apps that are security wrapped are passphrase protected. The app...
US20150033016 SYSTEMS AND METHODS FOR SECURING REAL-TIME MESSAGES  
A first aspect of the invention includes a method of securing messages using multiple cryptographic algorithms that distributes the burden of computing a session key using a strong cryptographic...
US20150245204 DEVICE AUTHENTICATION  
A method for authenticating a first device capable of operating according to a wireless communications protocol, the method comprising: at a second device, receiving a first message comprising an...
US20110225424 Inter Base Station Interface Establishment  
A method of establishing a peer-to-peer IPSec security association between a pair of base stations located within the same or different radio access networks. The base stations communicate with a...
US20120030468 SYSTEM AND METHOD FOR OPTIMAL VERIFICATION OF OPERATIONS ON DYNAMIC SETS  
A system and method for cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic collection of sets that are owned (and updated) by a...
US20110138184 Efficient Techniques for Achieving Security Against Cheating Tamper-Resistant Tokens  
An improved secure transaction system for facilitating secure transactions between devices in a network is set forth. The system includes a first device. A secure agent, adapted for encrypting and...
US20150235011 DRM PROTECTED VIDEO STREAMING ON GAME CONSOLE WITH SECRET-LESS APPLICATION  
Techniques are disclosed for secure playback of protected multimedia content on a game console using a secret-less application. An SSO model can be used for client authentication at a key server,...
US20130111209 Authenticating an Ephemeral Diffie-Hellman using a Trusted Third Party  
Authentication of parties through a trusted intermediary is described. The standard Ottway-Rees authentication protocol is modified to provide authentication between A and B using intermediary T...
US20150180931 CONTENT DELIVERY METHODS AND SYSTEMS  
The present invention relates generally to systems and methods for delivering content from content providers to end users using computer networks. Aspects of the invention enable content providers...
US20110131415 MULTIFACTOR USERNAME BASED AUTHENTICATION  
A hashed value is computed from an encrypted password value and a displayed code value from a hardware token at a client. The encrypted password value is based on a username, a context identifier,...
US20150089231 SYSTEMS AND METHODS FOR ESTABLISHING AND USING DISTRIBUTED KEY SERVERS  
Systems and methods in which multiple key servers operate cooperatively to securely provide authorization codes to requesting devices. In one embodiment, a server cloud receives a device...
US20140317410 NETWORK SERVICE INTERMEDIATION METHOD AND INTERMEDIATION SYSTEM  
An intermediation method used in an intermediation system that includes an intermediation device determining a permission for application services requiring user authentication on a network, where...
US20140173284 KEY MANAGEMENT USING QUASI OUT OF BAND AUTHENTICATION ARCHITECTURE  
To provide key management layered on a quasi-out-of-band authentication system, a security server receives a request for activation of a user interface window for a particular user from a network...
US20110029778 METHOD FOR DISTRIBUTED IDENTIFICATION, A STATION IN A NETWORK  
The present invention relates to a method for identifying and/or, authenticating, and/or authorizing a first radio station in a radio network, comprising the steps of (a) at the first radio...
US20120066501 MULTI-FACTOR AND MULTI-CHANNEL ID AUTHENTICATION AND TRANSACTION CONTROL  
The present disclosure provides a system and method for conducting multi-factor and multi-channel ID authentication and transaction control. The authentication and transaction control may be...
US20100241862 MULTIDIMENSIONAL IDENTIFICATION, AUTHENTICATION, AUTHORIZATION AND KEY DISTRIBUTION SYSTEM FOR PATIENT MONITORING  
A method, wireless system and a wireless device are described. The method, system and device provide multidimensional identification, authentication, authorization and key distribution providing...
US20150244723 WLAN user fixed network accessing method and system  
A method for a Wireless Local Area Network (WLAN) user to access a fixed network is disclosed, which includes: after the WLAN user is authenticated successfully, a Broadband Network Gateway (BNG)...
US20110154039 STATION-TO-STATION SECURITY ASSOCIATIONS IN PERSONAL BASIC SERVICE SETS  
A personal basic service set (PBSS) includes a first device configured to communicate in the PBSS and a second device configured to communicate in the PBSS. The first device is configured to...
US20150169876 RUNNING LOCAL VIRTUAL DISKS CONTAINING APPLICATIONS WITH LIMITED LICENSES  
Provided are techniques for receiving, from a client at a server, a request to access a software package for a specified duration of time, wherein the software package requires a license key;...
US20140201532 ENHANCED MOBILE SECURITY  
Systems and methods for utilizing a remote server for storing credentials associated with a mobile device. For example, a login credential and/or a token credential can be stored at the remote...
US20140201531 ENHANCED MOBILE SECURITY  
Systems and methods for utilizing a remote server for storing credentials associated with a mobile device. For example, a login credential and/or a token credential can be stored at the remote...
US20140095876 INTRODUCTION OF DISCRETE ROOTS OF TRUST  
Systems and methods may provide introducing a first root of trust on a platform to a second root of trust on the same platform. In one example, the method may include using an authenticated code...
US20150106624 Providing forward secrecy in a terminating TLS connection proxy  
An infrastructure delivery platform provides a RSA proxy service as an enhancement to the TLS/SSL protocol to off-load, from an edge server to an external cryptographic server, the decryption of...
US20130024693 Network Reputation System And Its Controlling Method Thereof  
A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons...
US20120017087 CONTENT DELIVERY NETWORK ENCRYPTION  
A system and method for delivering content to end users encrypted within a content delivery network (CDN) for content originators is disclosed. CDNs transport content for content originators to...
US20150244690 GENERALIZED ENTITY NETWORK TRANSLATION (GENT)  
Generalized Entity Network Translation provides new state of the art methodology for extending RKI techniques into a truly generalized framework capable of operating at exceptional levels of...
US20140245014 Remote control app for smart phones  
Methods and apparatus for a Remote Control App for Smart Phones are disclosed. One embodiment of the present invention is a software application or “App” which may be downloaded to a conventional...
US20110145583 Smart Card Security Feature Profile in Home Subscriber Server  
In accordance with the exemplary embodiments of the invention there is at least a method, an executable computer program, and an apparatus to determine at a network application function a list of...
US20150222517 UNIFORM COMMUNICATION PROTOCOLS FOR COMMUNICATION BETWEEN CONTROLLERS AND ACCESSORIES  
A uniform protocol can facilitate secure, authenticated communication between a controller device and an accessory device that is controlled by the controller. An accessory and a controller can...
US20150229471 SYSTEM AND METHOD FOR SECURING CONTENT KEYS DELIVERED IN MANIFEST FILES  
A method and a user device are disclosed for securing streaming content decryption. The method includes receiving at the user device a manifest for requested content, the manifest providing a...
US20150026474 MANAGED AUTHENTICATION ON A DISTRIBUTED NETWORK  
An authoritative computer network (10) comprising: at least one manager user (12); a plurality of subordinate users (14); and access control means adapted to allow the manager user to control...
US20120047367 METHOD AND APPARATUS FOR GENERATING SECURITY CONTEXT  
A method and an apparatus for generating a security context are provided. The implementation of the method includes: receiving a first message carrying a network capability of a User Equipment...
US20140365777 SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS  
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a...
US20120331289 METHOD AND SYSTEM FOR ENCRYPTION OF MESSAGES IN LAND MOBILE RADIO SYSTEMS  
A method and system for authentication of sites in a land mobile radio (LMR) system and encryption of messages exchanged by the sites. In some embodiments, the method includes transmitting a...
US20140173281 APPARATUS AND METHOD FOR ANONYMITY-BASED AUTHENTICATION AND KEY AGREEMENT CAPABLE OF PROVIDING COMMUNICATION MESSAGE BINDING PROPERTY  
Disclosed herein are an apparatus and method for anonymity-based authentication and key agreement capable of providing a communication message binding property. The apparatus includes a signature...
US20110119492 Apparatus and Method for Over-the-Air (OTA) Provisioning of Authentication and Key Agreement (AKA) Credentials Between Two Access Systems  
A method and apparatus for over-the-air provisioning of authentication credentials at an access device via a first access system, wherein the authentication credentials are for a second access...
US20100318784 CLIENT IDENTIFICATION FOR TRANSPORTATION LAYER SECURITY SESSIONS  
Systems, methods, and other embodiments associated with client identification for transportation layer security sessions are described. One example method includes monitoring a first...
US20150149780 MEDIATOR DEVICE MONITORING AND CONTROLLING ACCESS TO ELECTRONIC CONTENT  
Methods, systems and apparatuses for a mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a mediator device of a mediator, a second share SKG2...
US20100316037 METHOD OF SECURING NETWORK ACCESS RADIO SYSTEMS  
A method of providing security for network access radio systems and associated access radio security systems used with the systems. The method includes connecting an access radio having a radio...
US20150067336 New Cryptographic Systems Using Pairing with Errors  
Using the same mathematical principle of paring with errors, which can be viewed as an extension of the idea of the LWE problem, this invention gives constructions of a new key exchanges system, a...
US20140297333 USER-MEDIATOR MEDIATING TRANSFER OF ELECTRONIC CONTENT  
Methods, systems and apparatuses for a user-mediator mediating transfer of electronic content, are disclosed. One method includes receiving, by a mediator computing device of the user-mediator, a...
US20130019098 SYSTEMS AND METHODS FOR AUTHENTICATING AN ELECTRONIC TRANSACTION  
Systems and methods for authenticating a request between a client computer and a transaction server are provided. An application request, comprising an identity of a user originating the request,...