Match
|
Document |
Document Title |
|
US20150256542 |
USER AUTHENTICATION
Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key... |
|
US20100306832 |
METHOD FOR FINGERPRINTING AND IDENTIFYING INTERNET USERS
Various aspects of the present system provide methods and systems for identifying an individual who operates a remote computer. One aspect provides a technique to generate fingerprint of computer... |
|
US20120084570 |
Remote Resources Single Sign On
Exemplary techniques for enabling single sign-on to an operating system configured to conduct a remote presentation session are disclosed. In an exemplary embodiment, a user credential can be... |
|
US20110154025 |
COMPUTER IMPLEMENTED METHOD FOR AUTHENTICATING A USER
The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a... |
|
US20070300074 |
Trusted evidence cameras and related methods and computer program products
Digital Cameras configured to verify authenticity of digital photos taken with the digital camera and related methods and computer program products are provided. GPS information associated with a... |
|
US20150205976 |
SECURE ACCESS TO HEALTHCARE INFORMATION
A system and method for providing or exchanging healthcare information (e.g., medical information) to authorized users in a secure manner. The method is implemented in a computer infrastructure... |
|
US20110083170 |
User Enrollment via Biometric Device
A web-enabled application identifies a biometric device installed in a client device. The system identifies biometric information associated with a user and creates a biometric template associated... |
|
US20130097427 |
Soft-Token Authentication System
A system for authenticating a user and his local device to a secured remote service with symmetrical keys, which utilizes a PIN from the user and a unique random value from the local device in... |
|
US20120017094 |
MANAGING USER ACCOUNTS
The present disclosure relates to managing user accounts in one or more computer systems. In general, one aspect of the subject matter described in this specification can be embodied in methods... |
|
US20060075250 |
Touch panel lock and unlock function and hand-held device
A lock and unlock function triggered by a touch panel of a hand-held device. The hand-held device detects a pattern input from the touch panel, and execute the lock/unlock function to enable or... |
|
US20130198522 |
SYSTEMS AND METHODS FOR FILE ACCESS AUDITING
Systems and methods for providing an auditing file system for theft-prone devices are disclosed. The auditing file system supports fine-grained file auditing: a user may obtain reliable, explicit... |
|
US20110239000 |
PASSWORD-PROTECTED PHYSICAL TRANSFER OF PASSWORD-PROTECTED DEVICES
A method for password-protected physical transfer of password-protected devices including at a receiving location, generating at least one security file including an encrypted element generated... |
|
US20110072274 |
DISTRIBUTED SYSTEM FOR MULTI-FUNCTION SECURE VERIFIABLE SIGNER AUTHENTICATION
A distributed multi-function secure system for verifiable signer authentication having a personal private key stored in a secure storage of a mobile device where the mobile device connects to a... |
|
US20110314294 |
PASSWORD CHECKING
A method is disclosed for password checking. After input is received, a proposed password included in the input is parsed into symbols. At least one of the symbols includes two or more characters.... |
|
US20130031371 |
Software Run-Time Provenance
An executing first computing module verifies the run-time provenance of an unverified second computing module. A signed certificate identifying an author of the second computing module is received... |
|
US20070022472 |
Method and system for ordering, loading and using admission tickets
Method and system for ordering, loading and using admission tickets for access to access-controlled service devices, in which admission tickets are ordered from a reservation center through... |
|
US20100325693 |
REMOTE AUTHORIZATION FOR OPERATIONS
Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service... |
|
US20140040628 |
USER-CONVENIENT AUTHENTICATION METHOD AND APPARATUS USING A MOBILE AUTHENTICATION APPLICATION
Methods, apparatus, and systems for securing application interactions are disclosed. Application interactions may be secured by, at a user authentication device, capturing a signal emitted by an... |
|
US20110213985 |
TWO FACTOR AUTHENTICATION SCHEME
An improved method is provided for generating an authentication factor for authenticating a user. The method includes: assigning a unique identifier to a user of the computing resource;... |
|
US20110119494 |
METHOD AND APPARATUS FOR SHARING LICENSES BETWEEN SECURE REMOVABLE MEDIA
A method and an apparatus for sharing a license between SRMs are disclosed. The method includes: a DRM agent obtains the license from a first SRM, and sets the license to a forwarding state... |
|
US20110087888 |
AUTHENTICATION USING A WEAK HASH OF USER CREDENTIALS
Methods and apparatus for logging into a computer. The computer receives a username and password. The computer determines whether a user with the username is authorized to access the computer. If... |
|
US20110283110 |
Secure Communications
Systems and methods are described for communicating between a client machine and a server. A security token message may be transmitted from the server to the client machine. The security token... |
|
US20110055553 |
Method for controlling user access in sensor networks
A method for implement an energy-efficient user access control to wireless sensor networks is disclosed. A user creates a secret key and sending it to a sensor. The sensor builds a first MAC value... |
|
US20120089847 |
METHOD OF OBTAINING AUTHORIZATION FOR ACCESSING A SERVICE
Methods and devices for obtaining authorization for a requestor to access a service are provided. In accordance with one embodiment, there is provided a method comprising receiving a requestor... |
|
US20050154894 |
Access protection
An access protection system for a computer, the invention taking which takes advantage of the fact that every transportable storage medium has an individual identifier. This individual identifier... |
|
US20060191013 |
Offering different product costs options based on privacy policy acceptance
A system for enabling configuration of an information handling system which includes a configurator, a support authorization module for enabling a user to authorize access to the information... |
|
US20140006794 |
PRIVATE/PUBLIC GESTURE SECURITY SYSTEM AND METHOD OF OPERATION THEREOF
A secure communication method including: obtaining sensor information of at least one user, the sensor information including one or more of image information or depth information; recognizing at... |
|
US20120272067 |
AUTHENTICATION METHOD
Method enabling a user to verify the operation of a personal cryptographic device, comprising the following steps: a) a user (2) enters an access request in a terminal (3) (100), d) a personal... |
|
US20100169721 |
SYSTEM AND METHOD FOR UPDATING A COMPENSATION VALUE OF A MEASUREMENT MACHINE
A system and method for updating a compensation value of a measurement machine provides a host computer to generate an authorization code document according to an ID input by a user and encrypts... |
|
US20110010556 |
System and Method of Secure Authentication Information Distribution
A system and method of distributing authentication information for remotely accessing a computer resource. A request for authentication information, including identity information, is received... |
|
US20140250304 |
User Authentication System and Method for Encryption and Decryption
A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication... |
|
US20120110337 |
METHOD AND SYSTEM FOR RESTRICTING EXECUTION OF VIRTUAL APPLICATIONS TO A MANAGED PROCESS ENVIRONMENT
Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches... |
|
US20100306548 |
SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS
In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object Encryption Key (REK) and encrypted... |
|
US20110191592 |
Secure Access by a User to a Resource
A method for allowing user access to a resource includes a large number of arrays of elements which are generated and stored for each user for use in a series of log-in sessions. A user input... |
|
US20150143129 |
Secure mobile identity
A “Secure Mobile Identity System” that enables the creation of secure digital credentials on mobile devices, prevents identity theft, prevents fraudulent financial transactions, protects privacy,... |
|
US20100318881 |
Flexible Node Identity for Telecom Nodes
Features of a node (800) is enabled/disabled under a license between a node vendor and a service provider. A license manager (810) enforces the license to appropriately enable and disable the node... |
|
US20120239939 |
Secure Resume for Encrypted Drives
Systems, methods and products are described that provide secure resume for encrypted drives. One aspect provides a method including: receiving an indication to resume from a suspended state at a... |
|
US20120265996 |
Permitting Access To A Network
Method and communication system for permitting access to a network via an access point, wherein the method comprises determining, at a first node of the communication system, at least one... |
|
US20130019102 |
System and method for encrypted smart card pin entry
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for... |
|
US20140068247 |
SECURITY DEVICE ACCESS
Technology is described to control a security device providing access to a restricted resource. The method can include generating a plurality of security access codes at a security locking device... |
|
US20070143624 |
Client-side captcha ceremony for user verification
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,... |
|
US20100064354 |
MAIDSAFE.NET
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating... |
|
US20050246548 |
Method for verifying a first identity and a second identity of an entity
A method for verifying a first identity and a second identity of an entity, said method comprising: receiving first identity information at a checking entity; sending second identity information... |
|
US20120239938 |
LOCAL STORAGE OF INFORMATION PEDIGREES
This disclosure describes techniques for dynamically assembling and utilizing a pedigree of a resource. A pedigree of a resource is a set of statements that describe a provenance of the resource.... |
|
US20140040627 |
PROCESS AND SYSTEM FOR STRENGTHENING PASSWORD SECURITY
A process and a system that create and encrypt rich formatted passwords that increase password strength and security in some embodiments are disclosed. The process increases password security by... |
|
US20060218407 |
Method of confirming the identity of a person
Methods and systems for confirming the identity of a person include receiving identifying information of the person, receiving an electronic device identifier, checking a database for a recorded... |
|
US20050105119 |
Easy scan kiosk for low volume document scanner
A method for storing scanned document on a media (80) includes coding a personal identification number (PIN) to the media, the media is then inserted into a scanner (70). The PIN is verified and... |
|
US20060117187 |
Internet method of protecting subscriber information
A method and apparatus for providing subscriber information by a first party to a second party in conjunction with a call placed through the Internet. The method includes the steps of the first... |
|
US20140089671 |
Multi-Tiered Authentication Methods For Facilitating Communications Amongst Smart Home Devices and Cloud-Based Servers
Apparatus, systems, methods, and related computer program products for synchronizing distributed states amongst a plurality of entities and authenticating devices to access information and/or... |
|
US20050005127 |
Method of verifying entitlement to participate in a gaming event from a remote location
In a first step (S1), a prospective gaming patron preferably enrolls to establish entitlement to participate in a gaming event. This step includes the patron providing a variety of information,... |