Matches 1 - 50 out of 129 1 2 3 >


Match Document Document Title
US20050060554 Method and device for customized picture-based user identification and authentication  
A method and device for authorizing the use of an electronic device by picture identification, comprising: retrieving a number of pictures from a picture passkey library, displaying a subset of...
US20150195276 System and Method For Securely Provisioning and Generating One-Time-Passwords In A Remote Device  
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and...
US20060230286 System and method for authenticating a user of an image processing system  
A method and system for multi-factor user authentication on an image processing device. The system includes a server used to authenticate a user, and to retrieve user information corresponding to...
US20090265559 USER AUTHENTICATION BY LINKING RANDOMLY-GENERATED AUTHENTICATION SECRET WITH PERSONALIZED SECRET  
This patent application discloses techniques, devices and systems for user authentication based on linking between a randomly generated authentication secret and a personalized secret.
US20080184035 System and Method of Storage Device Data Encryption and Data Access  
Systems and methods of storage device data encryption and data access are described herein. Some embodiments of the present invention are summarized in this section. One embodiment includes...
US20070061889 SYSTEM AND METHOD FOR CONTROLLING DISTRIBUTION OF ELECTRONIC INFORMATION  
A method for managing access to electronic documents, wherein the documents include code scripts executable by, the documents being viewable by recipients only when viewed in a the document viewer...
US20060218407 Method of confirming the identity of a person  
Methods and systems for confirming the identity of a person include receiving identifying information of the person, receiving an electronic device identifier, checking a database for a recorded...
US20060112275 Facilitating and authenticating transactions  
A device or “dongle” (30) is provided for controlling communications between a Subscriber Identity Module (for SIM) (12), such as of the type used in a GSM cellular telephone system, and a...
US20060236116 Provisioning root keys  
The present invention provides a method of key material generation for authenticating communication with at least one network application function. The method includes determining first key...
US20050188211 IP for switch based ACL's  
A system that facilitates protecting an internal network from internal attacks comprises an entity that requests access to the internal network, wherein the internal network includes a plurality...
US20090327741 SYSTEM AND METHOD TO SECURE BOOT UEFI FIRMWARE AND UEFI-AWARE OPERATING SYSTEMS ON A MOBILE INTERNET DEVICE (MID)  
In some embodiments, the invention involves adding a capability for a platform owner or administrator to ensure that the firmware is only executed in an owner-authorized fashion, such as with...
US20070101152 Token authentication system  
An apparatus, method and program product for enabling token authentication by generating a secret key using manufacturer controlled information (57) present on a token (34). A computer (30)...
US20060149970 Authentication method and device  
[PROBLEM] Person authentication and authentication device of the present invention aims at providing a user with services of easy, inexpensive, highly secure, and reliable person authentication....
US20080034216 Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords  
A communication system and method are configured for mutual authentication and secure channel establishment between two parties. In one embodiment a first party generates a first one-time password...
US20070214365 Document repository  
A method and system for gathering, storing, and accessing documents used to grant authority for one person to perform on behalf of another person the actions specified in such documents in an...
US20150244522 METHOD AND SYSTEM FOR PROVIDING DATA SECURITY  
Embodiments herein provide a method for data security. A data passcode used for data encryption in electronic devices is encrypted and secret shares of the encrypted passcode are distributed to...
US20100186074 Authentication Using Graphical Passwords  
An authenticator may include graphical passwords. An authenticator may include a password image, which may include one or more clickable areas, and/or a key image, which may include click point...
US20100042847 METHOD FOR AUTHENTICATION USING ONE-TIME IDENTIFICATION INFORMATION AND SYSTEM  
The present invention relates to a method and system that can safely and conveniently perform user authentication by a service provider server and at a public terminal using one-time...
US20080072071 Hard disc streaming cryptographic operations with embedded authentication  
A data storage system comprises a storage element, and an encryption and decryption unit connected between a host and the storage element, and using a key that is generated in the data storage system.
US20070234064 Identification information output device  
An identification information output device comprises a storage unit configured to store items of seed information for generating identification information, a selection unit configured to select...
US20070016804 PASSWORD MANAGEMENT SYSTEM  
A password management system is based on a complex password format having two portions, a first portion which stays the same and a second portion which can be regularly updated. The first portion...
US20110202765 SECURELY MOVE VIRTUAL MACHINES BETWEEN HOST SERVERS  
A virtual hard drive is moved as an at least partially encrypted file to a different computing device. A key is provided to the different computing device in a protected form and a user on the...
US20070150744 Dual authentications utilizing secure token chains  
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code...
US20070174630 System and Method of Mobile Anti-Pharming and Improving Two Factor Usage  
A variant of phishing involves subverting an Internet access point, often used for mobile computing. Malware can route user requests for bank websites into a phisher's private network, with fake...
US20070157292 SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR JUST IN TIME ACCESS THROUGH DYNAMIC GROUP MEMBERSHIPS  
A system, method, and computer-readable medium for enabling a user account in a network system are provided.
US20060129824 Systems, methods, and media for accessing TPM keys  
Systems, methods and media for accessing and protecting TPM keys for signing and for decryption are disclosed. More particularly, hardware and software are disclosed for enabling a user knowing a...
US20100058066 METHOD AND SYSTEM FOR PROTECTING DATA  
A method and a system for protecting data are provided. When a computer system is powered on, a verification code is compared with a predetermined verification code. If the verification code...
US20070289012 Remotely controllable security system  
A remotely controllable security system has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detector, etc. Control and monitoring software...
US20070079135 User authentication system and user authentication method  
A user authentication system capable of maintaining high-level security and of reducing a user's load of operations necessary for login is provided. The user authentication system includes a user...
US20070079133 Portable storage device having a subject identification information and a configuration method thereof  
A portable storage device having a subject identification information utilizes a user authentication module to update the subject identification information and displays the subject identification...
US20070022467 Method and system for limiting access to a shared network device  
A system and method for limiting access to shared network devices only to authorized users is disclosed. First, access information associated with authorized users is stored in a memory of a...
US20110004769 PASSWORD INPUT SYSTEM USING AN ALPHANUMERIC MATRIX AND PASSWORD INPUT METHOD USING THE SAME  
The present invention relates to a password input algorithm, more particularly to a password input system and method using an alphanumeric matrix. An aspect of the invention can provide a password...
US20160373933 WIRELESS NETWORK HAVING MULTIPLE COMMUNICATION ALLOWANCES  
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of...
US20140324708 RAW SENSOR INPUT ENCRYPTION FOR PASSCODE ENTRY SECURITY  
A method of encrypting sensor input entries for passcode entry security is disclosed. The method in one embodiment includes presenting a passcode entry interface on an electronic device for a user...
US20120011370 PERSONAL IDENTIFICATION CODE ENTRY DEVICE AND METHOD THEREFOR  
A data entry device for entering characters of a personal identification code comprising a pattern of chambers containing a character of a personal identification code which is required to be...
US20080155267 IDENTITY MANAGEMENT SYSTEM WITH AN UNTRUSTED IDENTITY PROVIDER  
An Identity Management system in which a User may use a single set of credentials to log into multiple Web Service Providers differs from traditional systems in that none of the WSPs have to rely...
US20080082832 Configurable Data Access Application For Highly Secure Systems  
In a method embodiment, a method for providing access to data includes intercepting a user request for access to data. In response to intercepting the user request, the method includes validating...
US20070079383 System and Method for Providing Digital Content on Mobile Devices  
A system and methods for providing digital content on mobile devices is described. User interfaces and methods for requesting, presentation, communication and storage of digital content are also...
US20070011461 Personal data security system and method for handheld devices  
A personal data security system and method for hand held devices are resolved for only locking all the applications or the personal data at a time, or to not lock a single application/function or...
US20160232363 CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES  
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a...
US20100077223 AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, PROGRAM AND RECORDING MEDIUM  
To prevent an input password from being stolen by an invalid authentication device. An authentication device 10 for authenticating an inputter based on an input password accepted from the inputter...
US20060294392 Protection of a password-based user authentication in presence of a foe  
A user authentication method includes receiving a transformed password, determining a password based on the transformed password, making a comparison between the transformed password and a record...
US20060005039 Authentication control system and method thereof  
A system and method thereof for authentication control are provided. A display device displays a password input screen. The password input screen comprises multiple display characters being...
US20080104411 Methods and apparatus for changing passwords in a distributed communication system  
Methods and apparatus are provided for changing passwords in a distributed communication system. The disclosed password management system includes an event server for receiving one or more...
US20080137861 Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof  
A method of producing a security code by means of a programmable user device is described. The security code produced represents in itself both the user and the user device. In one embodiment, a...
US20070130473 System and method for access control  
A system and method for authenticating a user based on multiple factors is provided. The system and method also control access by the user and monitor the user's activity.
US20130117573 METHOD FOR VERIFYING A PASSWORD  
A method for verifying a password in a computing device, wherein the computing device comprises: a user input interface; a trusted hardware module having a trusted application stored therein, the...
US20100169958 Method for generating and using composite scene passcodes  
One disclosed embodiment for creating a composite scene passcode comprises presenting a system-generated composite scene passcode to a user, allowing the user to generate a composite-scene...
US20050114678 Method and apparatus for verifying security of authentication information extracted from a user  
A method and apparatus are provided for evaluating the security of authentication information that is extracted from a user. The disclosed authentication information security analysis techniques...
US20090144554 Two-way authentication with non-disclosing password entry  
A method of two-way authentication between a user and a known host using a non-disclosing password entry system generates a matrix of characters having a random characteristic with random...

Matches 1 - 50 out of 129 1 2 3 >