Matches 1 - 50 out of 115 1 2 3 >


Match Document Document Title
US20160315776 System And Method For Obtaining And Sharing Media Content  
A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device....
US20120084566 METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS  
Methods and systems for providing secure access to network resources are disclosed. A method includes defining in a provisioning utility one or more communities of interest, each community of...
US20060230270 Method and apparatus for providing status information from a security and automation system to an emergency responder  
An access portal is provided for establishing communication between an environmental management system used on a premises and an authorized responder equipped with an external access device. In...
US20080115191 Method and apparatus to transmit personal information using trustable device  
A method and apparatus to transmit personal information, the method including: receiving an information request message requesting the personal information; receiving the personal information from...
US20090210702 SECURE APPLICATION SIGNING  
A system and method for facilitating approval of an application and for making the application available for download by mobile computing devices has a first module configured to receive a user...
US20090187764 ELECTRONIC CERTIFICATION, IDENTIFICATION AND COMMUNICATION UTILIZING ENCRYPTED GRAPHICAL IMAGES  
A system and method for electronic certification, identification and communication. According to an exemplary implementation, these processes are performed by using an electronic graphic image...
US20070174627 Secure compartmented mode knowledge management portal  
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level...
US20110113252 CONCIERGE REGISTRY AUTHENTICATION SERVICE  
In an example embodiment described herein is an apparatus comprising a transceiver configured to send and receive data, and logic coupled to the transceiver. The logic is configured to determine...
US20080244269 Data processing system, memory device, data processing unit, and data processing method and program  
To provide an improved management structure of memory devices storing service-use applications. A card for a memory device applied to use various services is provided as one child card or more...
US20080141033 Trusted and secure techniques, systems and methods for item delivery and execution  
Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted...
US20060059346 Authentication with expiring binding digital certificates  
In various embodiments of the present invention systems and methods for authenticating a client for access to a business service of a firm and methods of creating a binding between a client's...
US20090276629 METHOD FOR DERIVING TRAFFIC ENCRYPTION KEY  
A mobile station is provided. The mobile station includes one or more radio transceiver module and a processor. The processor generates an Authorization Key (AK) context including at least one...
US20070079139 SIGNATURE AUTHENTICATION  
Presented are systems and methods of signature authentication. A signer employs a bio-pen to electronically sign a file. Signature data corresponding to the bodily movements associated with...
US20050204140 Security and ticketing system control and management  
A security device of this invention includes a nonvolatile storage unit 22 for storing a validity check unit including a counter updated every time signature function means 30 is called up, a...
US20160241405 Method, Apparatus and Computer Program for Issuing User Certificate and Verifying User  
According to an embodiment of the present invention, a method for issuing a user certificate of a verification server comprises: receiving a user certificate issue request including a user ID from...
US20090210712 METHOD FOR SERVER-SIDE DETECTION OF MAN-IN-THE-MIDDLE ATTACKS  
Problem The combination of a tendency towards permissivity when verifying certificate authenticity and the use of in-band client authentication opens up an opportunity for attackers to mount...
US20060224895 System and methods for electronically notarizing scanned documents  
Systems and methods of electronically notarizing scanned documents may include an image capturing device that captures data from an original document provided by a user to obtain an electronic...
US20060195689 Authenticated and confidential communication between software components executing in un-trusted environments  
A method and system for implementing secure communication in an un-trusted execution environment. The method includes transmitting respective first and second certificates between a first...
US20150046715 Systems, Methods and Apparatuses for Prevention of Unauthorized Cloning of a Device  
A self-authenticating device and a method for authenticating the self-authenticating device may be provided. In one aspect, a device may comprise a sensing circuit, which may comprise a circuit to...
US20060253702 Secure gaming server  
A method and apparatus for authenticating equipment and software in a distributed gaming environment through the use of embedded, digital keys and digital certificates in a private key...
US20130339740 MULTI-FACTOR CERTIFICATE AUTHORITY  
Disclosed herein is a certificate authority server configured to provide multi-factor digital certificates. A processor readable medium may include a plurality of instructions configured to enable...
US20070143601 System and method for authorizing information flows  
A system, apparatus, computer program product and method for authorizing information flows between devices of a data processing system are provided. In one illustrative embodiment, an information...
US20100250946 AD HOC DISTRIBUTION  
Systems and methods for developing an application for a data processing device using a portal, such as a world wide web portal. In one exemplary method, an application signing certificate is...
US20050005161 Services and secure processing environments  
There is disclosed a secure processing environment comprising a processor, at least one memory containing operating code, and a communications interface. The processor when running the operating...
US20100299738 CLAIMS-BASED AUTHORIZATION AT AN IDENTITY PROVIDER  
Techniques are described herein for managing access to services (e.g., Web sites, applications, results of executable operations, etc.) that are provided by relying parties. A relying party is a...
US20050091496 Method and system for distributed key management in a secure boot environment  
A methods for preparing an authenticable and verifiable image of a software module by adding to the received software module image a size and location block, an authentication block including a...
US20070150744 Dual authentications utilizing secure token chains  
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code...
US20120005481 AUTHENTICATED PROGRAM EXECUTION METHOD  
According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such...
US20070226488 SYSTEM AND METHOD FOR PROTECTING DIGITAL FILES  
A system for protecting digital files is provided. The system includes at least one client computer and a server connected to the at lease one server. Each client computer includes: a file...
US20070168674 Authentication system, authentication apparatus, and recording medium  
An authentication system that verifies various types of authenticity in regards with a visit by a forwarding agent. An identity authentication system is composed of an authentication card, a user...
US20050038754 Methods for authenticating self-authenticating documents  
Methods of authenticating self-authenticating documents presented at a point of purchase or financial institution. Data contained on the value document may be signed with a first digital signature...
US20150312228 REMOTE STATION FOR DERIVING A DERIVATIVE KEY IN A SYSTEM-ON-A-CHIP DEVICE  
An integrated circuit may comprise a processor configured to: receive a delegate certificate, wherein the delegate certificate includes a first public key; validate a digital signature of the...
US20080034440 Content Control System Using Versatile Control Structure  
At least one software application is stored in a memory device, where a security data structure controls access to information obtainable from data stored in the device and to the at least one...
US20070055881 Method for securely exchanging public key certificates in an electronic device  
A method for securely exchanging public key certificates in an electronic device (400) using a single or dual level of public key includes obtaining a replacement public key certificate (401) to...
US20060265590 Digital signature/certificate for hard-copy documents  
A hard-copy authentication document is a physical manifestation of a digital signature or a physical manifestation of a public key affixed to a hard-copy document or physical object, respectively....
US20130219166 HARDWARE BASED IDENTITY MANAGER  
A method for providing authentication credentials to a server over a communications network includes initiating communication with a server over a communications network. The communication is to...
US20120254618 AUTHENTICATION CERTIFICATES  
An audio/video content delivery system having a network content source linked by an internet data connection to a content receiver that receives content from the network content source via the...
US20110040574 Health Monitoring System with Biometric Identification  
A health monitoring method and system is disclosed. A sensor for use in a health monitoring system includes a first transducer for collecting biometric data for biometrically identifying an...
US20100217987 Document Security Management System  
A document security management system for securely managing documents for users. The document management system comprises a document repository providing a facility for storing data files...
US20070288754 Data communication method and system  
An encrypted communication method, and a system for the method, can transfer a session control message designated by identification information inherent to an application to a connection...
US20060129804 Message based network configuration of server certificate purchase  
Systems and methodologies that facilitate obtaining a digital certificate from a Certificate Authority, by using a well defined protocol exchanged between a user machine and the Certificate...
US20100275024 METHOD AND SYSTEM FOR DISPLAYING VERIFICATION INFORMATION INDICATORS ON A NON-SECURE WEBSITE  
A method and system of displaying information indicators that help provide security assurances to consumers. The method works by having a plug-in or browser extension that determines the URL of a...
US20090319793 PORTABLE DEVICE FOR USE IN ESTABLISHING TRUST  
A portable device for use in establishing trust including a communications module for communicating with a host machine; embedded trusted data; a virtual machine module for instantiating a virtual...
US20070055877 Security in a communication network  
Disclosed is a method of establishing a secured peer-to-peer communication between two communications devices, each communications device having stored a respective set of previously established...
US20130318353 Method for Creating and Installing a Digital Certificate  
The invention comprises a method of creating a certificate based on the contents of another certificate. The certificate is then automatically installed and configured on the server where it will...
US20100217988 ELECTRONIC DOCUMENT MANAGEMENT AND DELIVERY  
In one embodiment, system to manage and deliver electronic documents is disclosed.
US20090164788 EFFICIENT GENERATION METHOD OF AUTHORIZATION KEY FOR MOBILE COMMUNICATION  
The present invention relates to a method of generating an authorization key for a wireless communication system. In the wireless communication system, when an authorization key is generated after...
US20060236100 System and method for enhanced layer of security to protect a file system from malicious programs  
A system and method for providing an enhanced layer of security to protect the file system from malicious programs are provided. An additional layer of security for protecting data and to minimize...
US20050114666 Blocked tree authorization and status systems  
A method is provided for communicating authenticated information concerning a digital public key certificate. A hash-tree data structure is created containing a pre-defined list of possible...
US20140013118 INFORMATION PROCESSING APPARATUS, TERMINAL DEVICE, INFORMATION PROCESSING SYSTEM, METHOD FOR INFORMATION PROCESSING, AND STORAGE MEDIUM  
There is provided an information processing apparatus, including a data generation section generating a specified data stream, and also generating a plurality of segment data sets by segmenting...

Matches 1 - 50 out of 115 1 2 3 >