Matches 1 - 50 out of 197 1 2 3 4 >


Match Document Document Title
US20110099377 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to...
US20130013927 Automated Entity Verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
US20130013553 Automated Entity Verification  
Some embodiments provide a verification system for automated verification of entities. The verification system automatedly verifies entities using a two part verification campaign. One part...
US20110213981 REVOCATION OF A BIOMETRIC REFERENCE TEMPLATE  
A system, method and program product for generating a biometric reference template revocation message on demand. The method includes generating, using a biometric reference template revocation...
US20130262869 CONTROL WORD PROTECTION  
The invention enables a chip set of a receiver of a conditional access system to receive control words securely from a head-end system in the content delivery network. Hereto the chip set...
US20140215218 SECURITY TOKEN AND SERVICE ACCESS SYSTEM  
According to an aspect of the invention, a security token for facilitating access to a remote computing service via a mobile device is conceived, said security token comprising an NFC interface, a...
US20110119155 VERIFICATION OF PORTABLE CONSUMER DEVICES FOR 3-D SECURE SERVICES  
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a...
US20120084565 CRYPTOGRAPHIC DEVICE THAT BINDS AN ADDITIONAL AUTHENTICATION FACTOR TO MULTIPLE IDENTITIES  
Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider...
US20150149782 INTEGRITY PROTECTED SMART CARD TRANSACTION  
Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further,...
US20130290724 INTEGRITY PROTECTED SMART CARD TRANSACTION  
Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further,...
US20120096271 Remote Access to Hosted Virtual Machines By Enterprise Users  
An end user of an enterprise is enabled to receive secure remote presentation access to the assigned virtual machines in a hosted public cloud through the cloud provider's virtualization hosts and...
US20150180836 CLOUD-BASED TRANSACTIONS METHODS AND SYSTEMS  
Techniques for enhancing the security of a communication device when conducting a transaction using the communication device may include using a limited-use key (LUK) to generate a transaction...
US20110258453 METHOD AND APPARATUS FOR AUTHENTICATION TOKEN-BASED SERVICE REDIRECTION  
A method, apparatus, and computer readable medium is provided. According to an embodiment, a method includes, receiving a message from a client. The method further includes, forwarding the message...
US20120324227 System For Generating Fingerprints Based On Information Extracted By A Content Delivery Network Server  
A dynamic multimedia fingerprinting system is provided. A user requests multimedia content from a Web cache server that verifies that the user is authorized to download the content. A custom...
US20100325428 System and Method for Authentication of a Hardware Token  
A method for authentication. A computer obtains a random number R generated by a hardware token. The computer forms and returns to the hardware token a signature Ck′(R) formed using the random...
US20120185695 Methods and Systems for Scalable Distribution of Protected Content  
A computerized device can implement a content player to access a content stream using a network interface, the content stream comprising encrypted content and an embedded license comprising a...
US20140189359 REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES  
Authentication devices and methods for generating dynamic credentials are disclosed. The authentication devices include a communication interface for communicating with a security device such as a...
US20130019100 INTELLIGENT REMOTE DEVICE  
An intelligent remote device equipped with a security token operatively coupled thereto is processing communications with a security token enabled computer system over a wireless private network....
US20150134965 Enhanced Secure Virtual Machine Provisioning  
In a method of provisioning a virtual machine (VM) to a computing network (401), a VM manager or provisioner (403, 408) encrypts a virtual machine using a key bound to at least one security...
US20110246777 System and Method for Managing Security Key Architecture in Multiple Security Contexts of a Network Environment  
A scheme for managing security key architecture in a network environment where a user equipment (UE) device can engage in multiple security contexts depending on the access technology. In one...
US20140195810 SECURED METHOD FOR CONTROLLING THE OPENING OF LOCK DEVICES FROM MESSAGES IMPLEMENTING A SYMMETRICAL ENCRYPTION  
A management site (10) generates an encrypted message by a public-key symmetrical encryption algorithm, the algorithm and the key being selected by the management site among a memorized list. The...
US20110113251 METHOD FOR IMPROVING NETWORK APPLICATION SECURITY AND SYSTEM THEREOF  
The invention, related to information security field, discloses a method for improving network application security and a system thereof. The method comprises that client terminal application...
US20110131416 MULTIFACTOR VALIDATION OF REQUESTS TO THW ART DYNAMIC CROSS-SITE ATTACKS  
An apparatus and a method for validating requests to thwart cross-site attacks is described. A user identifier token, a request identifier token, and a timestamp, are generated at a web...
US20090199003 SMART CARD AND METHOD FOR USING A SMART CARD  
The invention provides as smart card, a secured client with a smart card and a method for use in a smart card. The smart card is configured for counting ECMs associated to a particular portion of...
US20080168273 CONFIGURATION MECHANISM FOR FLEXIBLE MESSAGING SECURITY PROTOCOLS  
Methods and arrangements to handle network messages containing security information are disclosed. Embodiments include transformations, code, state machines or other logic to handle network...
US20130046987 Apparatus and Method for Performing End-to-End Encryption  
According to one embodiment, an apparatus may store a plurality of token-based rules. A token-based rule facilitates access to a resource. The apparatus may receive a first token indicating that a...
US20100058063 FUZZY BIOMETRICS BASED SIGNATURES  
The present invention relates to a method and a device of verifying the validity a digital signature based on biometric data. A basic idea of the invention is that a verifier attains a first...
US20100250796 Establishing a Secure Channel between a Server and a Portable Device  
Systems and method for forming a secure channel between a server and a portable storage device coupled to a host computer are presented. A message sequence is exchanged between the server and the...
US20140237250 Registration and Network Access Control  
In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client...
US20090199004 SYSTEM AND METHOD FOR SELF-AUTHENTICATING TOKEN  
A secure token, possibly in the form of a smartcard, has a smart window with smart materials such as an electrophoretic or an electrochromic layer or assembly. When authenticated, such as by using...
US20120144201 SECURE ELEMENT AUTHENTICATION  
Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents....
US20110185178 COMMUNICATION METHOD OF AN ELECTRONIC HEALTH INSURANCE CARD WITH A READING DEVICE  
The invention relates to a communication method of an electronic health insurance card (122) with a reading device. A communication link is established between the electronic health insurance card...
US20110010552 Authentication token with incremental key establishment capacity  
The present invention relates to the field of strong authentication tokens and more specifically to methods and apparatus employing cryptographic key establishment protocols for such strong...
US20080005786 E-Mail Stamping With From-Header Validation  
Effective aspects of stamping outbound e-mail are combined with a registration system for e-mail senders. A mail sender participates by registering From: line information with a trusted...
US20090031131 Token-Based Management System for PKI Personalization Process  
A system for token-based management of a PKI personalization process includes a token request and management system (TRMS) configured to gather request information from a requestor; and a token...
US20120124378 METHOD FOR PERSONAL IDENTITY AUTHENTICATION UTILIZING A PERSONAL CRYPTOGRAPHIC DEVICE  
A method for personal identity authentication utilizing a personal cryptographic device initially provides a personal cryptographic device storing a client key from a host system and a device...
US20070283145 Multi-Factor Security System With Portable Devices And Security Kernels  
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them...
US20130159716 METHOD FOR PERSONALIZING AN AUTHENTICATION TOKEN  
An authentication token using a smart card that an organisation would issue to its customer, the smart card having a processor for executing a software application that is responsive to a user...
US20080086766 CLIENT-BASED PSEUDONYMS  
Obtaining tokens with alternate personally identifying information. A method may be practiced, for example, in a networked computing environment including a client and a token issuer. The token...
US20090327732 Long-term secure digital signatures  
The present invention relates to digitally signing of electronic documents which are to be kept secure for a very long time, thereby taking into account future cryptographic developments which...
US20110055574 LOCALIZED NETWORK AUTHENTICATION AND SECURITY USING TAMPER-RESISTANT KEYS  
The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device...
US20150201027 Connection Leasing for Hosted Services  
Aspects herein describe techniques for brokering hosted resources in a virtual desktop infrastructure (VDI) using connection leases to reduce demand on connection brokers and to allow hosted...
US20150172920 SYSTEM FOR PROXIMITY BASED ENCRYPTION AND DECRYPTION  
A method for securing data on a mobile device by combining multi-factor, auto-login, encryption and proximity. The method uses a wireless device to store encryption keys, provides a first stage...
US20070043947 Providing multimedia system security to removable user identity modules  
The present invention provides a method of authenticating a user identity module to an entry node of a wireless communication system. The method may include receiving a first challenge formed...
US20120210135 CLIENT-BASED AUTHENTICATION  
Apparatus, systems, and methods may operate to invoke multiple authentication mechanisms, by a client node, to encrypt N split-keys using credentials associated with corresponding ones of the...
US20110225421 METHOD OF OBTAINING CONTENT FOR MOBILE TERMINAL, MOBILE TERMINAL USING THE METHOD, AND NEAR FIELD COMMUNICATION SYSTEM HAVING THE MOBILE TERMINAL  
A method of operating a near field communication system includes receiving an electronic tag having information signed by using a private key, verifying the signed information of the electronic...
US20050050330 Security token  
A security token, a security system and a method for authenticating a client are disclosed. The security token including a one-time password mechanism, for rendering one-time password...
US20060064592 SYSTEM FOR CONTROLLING SMART CARD SLOTS AND METHOD FOR CONTROLLING SMART CARD SLOTS  
A system for controlling smart card slots (121, 122, 123) of a device comprising smart card slots (121, 122, 123) providing access to smart card (111, 112, 113) resources via slot interfaces (103)...
US20070028107 Prescription Authentication  
The invention relates to a system 100 for verifying the authenticity of medicament entitlement tokens, such as prescriptions 102, used to control the dispensing of medicaments. The system...
US20070226503 Music information providing apparatus and electronic music apparatus  
A music information providing apparatus comprises a connecting device that connects to a network, a memory that stores a plurality of information used on an electronic music apparatus, each...

Matches 1 - 50 out of 197 1 2 3 4 >