Matches 1 - 50 out of 299 1 2 3 4 5 6 >


Match Document Document Title
US20110083170 User Enrollment via Biometric Device  
A web-enabled application identifies a biometric device installed in a client device. The system identifies biometric information associated with a user and creates a biometric template associated...
US20070180266 Digital content cryptograph and process  
A digital cryptograph and encryption process encrypts and transmits in a digital format specific items of information requested by a user of a digital content transmission system by using key...
US20050086492 System, method, apparatus and computer program product for facilitating digital communications  
A computer-implemented method and apparatus provides secured access to a computer. In one aspect of the present invention, credentials are received from a user, the credentials including a user...
US20050081045 System, method, apparatus and computer program product for facilitating digital communications  
A computer-implemented method and apparatus authenticates a user of a remote computer over a network. In one aspect of the present invention, an authentication challenge is received at said remote...
US20050044382 System and method for user authentication  
A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an...
US20050050333 System and method for secure broadcast  
A novel system and method for secure communication is provided. In an embodiment, a satellite pay-tv system is provided that includes a head end office that broadcasts programming to one or more...
US20080313469 STATELESS METHODS FOR RESOURCE HIDING AND ACCESS CONTROL SUPPORT BASED ON URI ENCRYPTION  
An apparatus and method are disclosed for enabling controlled access to resources at a resource provider server. The invention may encrypt or decrypt a portion of a uniform resource identifier...
US20070174628 USER AUTHENTICATION  
There are methods and apparatus, including computer program products, for user authentication. For example, there is a method that includes generating a dynamic mapping between assigned...
US20120110340 SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS  
A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated...
US20050283617 Motor vehicle documents  
A variety of technologies are detailed that can be employed by state departments of motor vehicles (DMVs), and other agencies, e.g., to reduce customer wait time and otherwise improve customer...
US20070118762 Apparatus, method and system for generating a unique hardware adaptation inseparable from correspondingly unique content  
The present invention includes an apparatus, method and system for generating a configuration of an adaptive circuit which is inseparable from selected content. Either the adaptive circuit or...
US20050273621 Multistate collaboration between departments of motor vehicles  
A variety of technologies are detailed that can be employed by state departments of motor vehicles (DMVs), and other agencies, e.g., to reduce customer wait time and otherwise improve customer...
US20050044381 System & method of table building for a process-based security system using intrusion detection  
A method to build a resource access table in a system for controlling access to resources is disclosed. The protocol identifies a resource call in a process. Each of the resources accessed by...
US20100332841 Authentication Method and System  
Disclosed are methods related to controlling user access to a first computer device, using a second computer device. One method comprises generating authentication data in accordance with a first...
US20050193208 User authentication  
There are methods and apparatus, including computer program products, for user authentication. For example, there is a method that includes generating a dynamic mapping between assigned...
US20050154896 Data communication security arrangement and method  
A novel and efficient encryption and decryption method and arrangement is presented for synchronization of a communication session for encrypted transmission or authentication between at least two...
US20080115191 Method and apparatus to transmit personal information using trustable device  
A method and apparatus to transmit personal information, the method including: receiving an information request message requesting the personal information; receiving the personal information from...
US20050283618 Managing access permission to and authentication between devices in a network  
An accessing method for providing access to a device connected to a network comprises, in a first application, authenticating a second application. The method also comprises, in the second...
US20050021980 Access control decision system, access control enforcing system, and security policy  
In an access control decision system, first information indicated by an access decision request is converted into second information being higher abstract when the access decision request is...
US20140068247 SECURITY DEVICE ACCESS  
Technology is described to control a security device providing access to a restricted resource. The method can include generating a plurality of security access codes at a security locking device...
US20100064354 MAIDSAFE.NET  
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating...
US20060075250 Touch panel lock and unlock function and hand-held device  
A lock and unlock function triggered by a touch panel of a hand-held device. The hand-held device detects a pattern input from the touch panel, and execute the lock/unlock function to enable or...
US20050251686 Methods and apparatus for secure distribution of software  
Software is securely distributed with limited usage rights. The software may be an executable program and/or one or more data files such as image or multimedia data files. The software includes an...
US20060048236 Licensing the use of software to a particular user  
The use of software is licensed to a particular user, regardless of the computing device on which the software has been launched. A computing device is logged onto a central service. The central...
US20100191602 Mobile banking and payment platform  
To eliminate, or at least substantially eliminate, the security concerns of conventional Internet-enabled mobile banking operations, and mobile banking operations in general, the present invention...
US20090327131 DYNAMIC ACCOUNT AUTHENTICATION USING A MOBILE DEVICE  
Providing dynamic authentication of a user requesting access to a system via a mobile device is disclosed. An account holder tailors a set of customized security challenges and responses. When a...
US20090204820 Method and apparatus for Account Management  
A method and apparatus for on-line account management controls access to a computer such as a web server. The method and apparatus reduces interference from Internet bots while minimizing the...
US20070174627 Secure compartmented mode knowledge management portal  
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level...
US20060218407 Method of confirming the identity of a person  
Methods and systems for confirming the identity of a person include receiving identifying information of the person, receiving an electronic device identifier, checking a database for a recorded...
US20140331057 METHOD AND SYSTEM FOR PROCESSOR OR WEB LOGON  
A system is for a proof of knowledge enrollment or authentication. The system includes a processor having an input, an output and a routine; and a display having an image from the output of the...
US20060294390 Method and apparatus for sequential authentication using one or more error rates characterizing each security challenge  
Methods and apparatus are provided for sequential authentication of a user that employ one or more error rates characterizing each security challenge. According to one aspect of the invention, a...
US20060176149 Tracking and monitoring apparatus and system  
A programmable mobile unit for a portable host, such as a person, comprising a microcontroller in communication with each of a detachable freespace communication module for communication with a...
US20050283619 Managing access permission to and authentication between devices in a network  
An accessing method for providing access to a device connected to a network comprises, in a first application, assigning access permission to at least one of a plurality of second applications,...
US20050246549 Methods and apparatus for secure distribution of software  
Software is securely distributed with limited usage rights. The software may be an executable program and/or one or more data files such as image or multimedia data files. The software includes an...
US20120216044 METHOD FOR AUTHENTICATING MOBILE DEVICE AND DISPLAY APPARATUS USING THE SAME, AND MOBILE DEVICE AUTHENTICATION SYSTEM  
A method for authenticating a mobile device and a display apparatus using the same, and a mobile device authentication system are provided. In the method for authenticating the mobile device by...
US20120137137 METHOD AND APPARATUS FOR KEY PROVISIONING OF HARDWARE DEVICES  
Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is...
US20110119494 METHOD AND APPARATUS FOR SHARING LICENSES BETWEEN SECURE REMOVABLE MEDIA  
A method and an apparatus for sharing a license between SRMs are disclosed. The method includes: a DRM agent obtains the license from a first SRM, and sets the license to a forwarding state...
US20100011220 AUTHENTICATION AND KEY AGREEMENT METHOD, AUTHENTICATION METHOD, SYSTEM AND DEVICE  
An AKA method, and authentication method and related devices are disclosed so that a user card not supporting storing of a SQN can resist replay attacks during an AKA procedure. In an AKA method,...
US20060059346 Authentication with expiring binding digital certificates  
In various embodiments of the present invention systems and methods for authenticating a client for access to a business service of a firm and methods of creating a binding between a client's...
US20060053296 Method for authenticating a user to a service of a service provider  
Methods, devices, and computer programs for an authentication of a user to a service of a service provider (SP) are disclosed. Access for the user to the service of the service provider (SP) is...
US20050134896 Data processing system, data processing method and apparatus, document printing system, client device, printing device, document printing method, and computer program  
In a network-based printing system having a communication network, such as the Internet or an intranet, printing control information is added to document data or image data, and the document or...
US20070162759 PROTECTED PORT FOR ELECTRONIC ACCESS TO AN EMBEDDED DEVICE  
A system and method for controlling access by a user to an embedded device. A protected access port, integral with the embedded device, includes an access manager and a level controller. The...
US20060224897 Access control service and control server  
To provide an access control service and control server for protecting a computer from an Illegal access such as a password cracking, in a terminal service and other related services. An access...
US20060101277 Detecting and remedying unauthorized computer programs  
To protect a client system from unauthorized programs, a scanner application for detecting particular unauthorized programs is maintained on a host system and periodically provided to a client...
US20100042846 TRUSTED CARD SYSTEM USING SECURE EXCHANGE  
A system for secure, role-based exchange of information between a client and providers of services is described. The system includes a client device having a memory that includes a portion of the...
US20090254481 METHOD AND APPARATUS FOR PROVIDING PERSONALIZED SERVICE IN BROADCASTING SYSTEM AND SYSTEM THEREOF  
A method and apparatus for providing a personalized service in a broadcasting system, and a system thereof. A BCAST Subscription Management (BSM) sends a service creation request message to a...
US20090183254 Computer Session Management Device and System  
A portable session management device configured for insertion into an input on a host computer, the portable session management device comprising: an authentication unit configured to obtain...
US20070162761 Methods and Systems to Help Detect Identity Fraud  
The disclosed technology generally relates to methods and systems to aid in verifying a person's identity, e.g., in connection with applying for an identity document (such as a passport or...
US20060064598 Illegal access preventing program, apparatus, and method  
An unauthorized or illegal access preventing system implementing security procedures to an application layer without having to rely on business applications of an application server having a web...
US20050278544 Removable data storage medium and associated marketing interface  
The present invention is a portable storage device containing proprietary software that protects personal identifiable information by redirecting cached data generated from Internet browsing and...

Matches 1 - 50 out of 299 1 2 3 4 5 6 >