Match
|
Document |
Document Title |
|
US20050039014 |
Electronic security system for monitoring and recording activity and data relating to persons
An apparatus for providing secure and unique identification of individuals includes a device for electromagnetically recording and storing data indicative of a specific individual. The device... |
|
US20090217046 |
METHOD AND APPARATUS FOR THE SECURE IDENTIFICATION OF THE OWNER OF A PORTABLE DEVICE
An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a... |
|
US20090083541 |
METHOD AND APPARATUS FOR DISTRIBUTING DIGITAL CONTENT
The present invention provides a system in which audio files are distributed that include watermarks, digital signatures and/or encryption. The file may offer content owners some amount of... |
|
US20070028108 |
Access
A data access system can be provided. The system can comprise a data record associated with a stored access token signature and a signature generator, operable to scan an access token to create a... |
|
US20070028107 |
Prescription Authentication
The invention relates to a system 100 for verifying the authenticity of medicament entitlement tokens, such as prescriptions 102, used to control the dispensing of medicaments. The system... |
|
US20100017859 |
Authentication system for networked computer applications
A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the... |
|
US20090199004 |
SYSTEM AND METHOD FOR SELF-AUTHENTICATING TOKEN
A secure token, possibly in the form of a smartcard, has a smart window with smart materials such as an electrophoretic or an electrochromic layer or assembly. When authenticated, such as by using... |
|
US20050138380 |
Entry control system
An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard... |
|
US20110119155 |
VERIFICATION OF PORTABLE CONSUMER DEVICES FOR 3-D SECURE SERVICES
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a... |
|
US20080005567 |
METHOD AND SYSTEM FOR PERSONALIZING SMART CARDS USING ASYMMETRIC KEY CRYPTOGRAPHY
Systems and methods are described that permit a smart card to be personalized in a secure manner using asymmetric cryptography. Systems and methods are described whereby personalization... |
|
US20050050330 |
Security token
A security token, a security system and a method for authenticating a client are disclosed. The security token including a one-time password mechanism, for rendering one-time password... |
|
US20090282254 |
TRUSTED MOBILE PLATFORM ARCHITECTURE
In an embodiment, an apparatus includes one or more cryptographic units. The apparatus also includes a memory to store one or more data encryption keys and an associated header for the one or more... |
|
US20100211791 |
HARDWARE MULTIMEDIA ENDPOINT AND PERSONAL COMPUTER
A hardware multimedia endpoint is located on an adapter card of a personal computer system and comprises an interface for interfacing to the computer system and a processor for receiving... |
|
US20060155999 |
System and method for establishing and managing relationships between pseudonymous identifications and memberships in organizations
A system and method for bonding a pseudonymous identity to an organization to provide assurance that a user claiming to be a member or representative of the organization may anonymously post... |
|
US20050164678 |
Method and system for communicating with a wireless device
A method, system, transmitter, receiver and protocol are disclosed for communicating with wireless receivers. The invention includes providing a controller having a discovery mode and an operating... |
|
US20120324227 |
System For Generating Fingerprints Based On Information Extracted By A Content Delivery Network Server
A dynamic multimedia fingerprinting system is provided. A user requests multimedia content from a Web cache server that verifies that the user is authorized to download the content. A custom... |
|
US20070043947 |
Providing multimedia system security to removable user identity modules
The present invention provides a method of authenticating a user identity module to an entry node of a wireless communication system. The method may include receiving a first challenge formed... |
|
US20050044367 |
Enabling and disabling software features
This application relates to a method of enabling and disabling software features in a software-implemented feature set, to the software itself and to a device with the software thereon. In... |
|
US20150365404 |
System and Method for Binding a Smartcard and a Smartcard Reader
Systems and methods for binding a smartcard and a smartcard reader are provided. A smartcard is provision to store a first set of credentials for use in traditional transactions such as at a brick... |
|
US20150304851 |
PORTABLE AUTHORIZATION DEVICE
A portable authorization device may include memory and at least one circuit. The memory may be configured to store an identifier and keys corresponding to services associated with the identifier.... |
|
US20130262869 |
CONTROL WORD PROTECTION
The invention enables a chip set of a receiver of a conditional access system to receive control words securely from a head-end system in the content delivery network. Hereto the chip set... |
|
US20130019100 |
INTELLIGENT REMOTE DEVICE
An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network.... |
|
US20100153729 |
METHOD OF AUTHENTICATING PRINTER CONSUMABLE
A method for authenticating a printer consumable in which an encrypted random number and its first signature are passed from a printer authentication chip to a consumable authentication chip, in... |
|
US20100146608 |
Multi-Level Secure Collaborative Computing Environment
In some embodiments, a collaborative computing environment includes a federated identity manager coupled to a multi-level secure computing network and a client having a biometric reading device.... |
|
US20160191508 |
Methods and Systems for Block Sharding of Objects Stored in Distributed Storage System
The present disclosure provides systems and methods for sharding objects stored in a distributed storage system. In accordance with one embodiment disclosed herein, a block sharding technique is... |
|
US20070079139 |
SIGNATURE AUTHENTICATION
Presented are systems and methods of signature authentication. A signer employs a bio-pen to electronically sign a file. Signature data corresponding to the bodily movements associated with... |
|
US20110225421 |
METHOD OF OBTAINING CONTENT FOR MOBILE TERMINAL, MOBILE TERMINAL USING THE METHOD, AND NEAR FIELD COMMUNICATION SYSTEM HAVING THE MOBILE TERMINAL
A method of operating a near field communication system includes receiving an electronic tag having information signed by using a private key, verifying the signed information of the electronic... |
|
US20110113235 |
PC Security Lock Device Using Permanent ID and Hidden Keys
The invention is a method, system, and apparatus providing user control and security of a PC system. Using the hardware and associated installation software, the system is capable of uniquely... |
|
US20070150736 |
Token-enabled authentication for securing mobile devices
A system and method to protect mobile devices, such as laptops, PDAs, and mobile telephones with a wearable token is presented. The method performs token-enabled authentication to enable operation... |
|
US20060294380 |
Mechanism to evaluate a token enabled computer system
According to one embodiment, computer system is disclosed. The computer system includes a central processing unit (CPU) to operate a trusted environment, a chipset having protected registers that... |
|
US20060253702 |
Secure gaming server
A method and apparatus for authenticating equipment and software in a distributed gaming environment through the use of embedded, digital keys and digital certificates in a private key... |
|
US20070143601 |
System and method for authorizing information flows
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information... |
|
US20070283145 |
Multi-Factor Security System With Portable Devices And Security Kernels
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them... |
|
US20140223183 |
Apparatus and Method for Securing Digital Data with a Security Token
A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts messages to the secured device, decrypts... |
|
US20050108534 |
Providing services to an open platform implementing subscriber identity module (SIM) capabilities
An approach for providing services to an open platform implementing Subscriber Identity Module (SIM) capabilities without the need for a discrete, physical SIM device. For one aspect, a protected... |
|
US20070150744 |
Dual authentications utilizing secure token chains
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code... |
|
US20130061055 |
Apparatus and Methods for Providing Scalable, Dynamic, Individualized Credential Services Using Mobile Telephones
A virtual smartcard and methods for creating the same are provided. A virtual smartcard is a set of computer-implemented processes, associated with an individual, which simulate the behavior of a... |
|
US20070220269 |
Image forming apparatus, image forming apparatus controlling method, computer program product
With personal information and confidential information being output through a direct operation from an output device, the operator can reliably obtain such information in person. Also, such... |
|
US20070168674 |
Authentication system, authentication apparatus, and recording medium
An authentication system that verifies various types of authenticity in regards with a visit by a forwarding agent. An identity authentication system is composed of an authentication card, a user... |
|
US20060059368 |
System and method for processing by distinct entities securely configurable circuit chips
A system and method are provided in which a third party chip vendor is enabled to securely program an electronic circuit chip supplied from a chip manufacturer. The chip vendor supplies a vendor's... |
|
US20130191640 |
INFORMATION SYSTEM AND METHOD INCORPORATING A PORTABLE DIGITAL MEDIA DEVICE
A method of reading a readable element, such as a two dimensional bar code or an RFID chip, that has encrypted information with a portable device, such as a digital media device or RFID reader,... |
|
US20110314288 |
CIRCUIT, SYSTEM, DEVICE AND METHOD OF AUTHENTICATING A COMMUNICATION SESSION AND ENCRYPTING DATA THEREOF
Disclosed is a circuit, system, device and method for authentication and/or encryption, which is based on the characteristics and/or management of One Time Programming (OTP) Non Volatile Memory... |
|
US20100332837 |
WEB APPLICATION SECURITY FILTERING
User inputs and/or Uniform Resource Identifier (URI), historically and popularly referred to as Universal Resource Locator (URL), requests in a content description language are passed through a... |
|
US20090217045 |
PHYSICAL SECRET SHARING AND PROOFS OF VICINITY USING PUFS
The present invention relates to a method of creating challenge-response pairs, a method of authenticating a plurality of physical tokens, a system for creating challenge-response pairs and a... |
|
US20080168273 |
CONFIGURATION MECHANISM FOR FLEXIBLE MESSAGING SECURITY PROTOCOLS
Methods and arrangements to handle network messages containing security information are disclosed. Embodiments include transformations, code, state machines or other logic to handle network... |
|
US20100250944 |
INFORMATION PROCESSING APPARATUS, AUTHENTICATION DEVICE, AND RECORDING MEDIUM
An information processing apparatus includes a first signing unit which digitally signs device information and environment information, a first generator which generates a first digital envelope... |
|
US20080222417 |
Method, System, And Apparatus For Nested Security Access/Authentication With Media Initiation
The disclosure details a nested security access system that manages access points/verification requests to create a series of layered security applications for securing access/user identification... |
|
US20090319793 |
PORTABLE DEVICE FOR USE IN ESTABLISHING TRUST
A portable device for use in establishing trust including a communications module for communicating with a host machine; embedded trusted data; a virtual machine module for instantiating a virtual... |
|
US20080016355 |
Remote Control Method Enabling a User to Control the Operation of a Receiving Unit
The invention relates to a method for an operator to have remote control over the use of reception equipment in a digital data broadcasting network. This method comprises the following steps:... |
|
US20070136593 |
Secure information storage apparatus
The Invention is a secure data storage and retrieval apparatus. The device features a microprocessor, a long term memory, a temporary memory, a display and a plurality of buttons. A user gains... |