Matches 1 - 50 out of 290 1 2 3 4 5 6 >


Match Document Document Title
US20150178508 CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES  
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a...
US20130339745 CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES  
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a...
US20110271118 PASSWORD GENERATION METHODS AND SYSTEMS  
Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of...
US20110185185 METHOD AND APPARATUS FOR PARENTAL CONTROL OF WIRELESS BROADCAST CONTENT  
A method comprises detecting zapping to or from one or more services; determining whether the zapping includes termination of a password-protected service; and sending a trigger message (248, 256,...
US20130166918 Methods for Single Signon (SSO) Using Decentralized Password and Credential Management  
A method for single sign-on (SSO) that provides decentralized credential management using end-to-end security. Credential (and other personal user information) management is decentralized in that...
US20110307709 MANAGING SECURITY OPERATING MODES  
A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by...
US20110004769 PASSWORD INPUT SYSTEM USING AN ALPHANUMERIC MATRIX AND PASSWORD INPUT METHOD USING THE SAME  
The present invention relates to a password input algorithm, more particularly to a password input system and method using an alphanumeric matrix. An aspect of the invention can provide a password...
US20140075202 METHOD AND SYSTEM FOR SECURELY ACCESSING DIFFERENT SERVICES BASED ON SINGLE SIGN ON  
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the computed hash of the first random...
US20120066504 METHODS, APPARATUS AND SYSTEMS FOR SECURING USER-ASSOCIATED PASSWORDS USED FOR IDENTITY AUTHENTICATION  
Methods, apparatus and systems for securing user-associated passwords used in transactions are disclosed. The methods include a user computing device receiving a user-associated password such as a...
US20120216046 System and Method for Decrypting Files  
In accordance with particular embodiments, a computer-implemented method for execution by one or more processors includes intercepting a communication comprising a message. The method also...
US20120324234 FLEXIBLE METHOD OF USER AUTHENTICATION  
A method of authorising a user in communication with a workstation is disclosed. According to the method, a system automatically determines a plurality of available user information entry devices...
US20130145170 CROSS SYSTEM SECURE LOGON  
A cross system secure logon in a target system by using a first authentication system and a second authentication system. A correct password may be valid on the first authentication system and the...
US20140195814 METHOD AND SYSTEM TO DECRYPT PRIVATE CONTENTS  
The invention discloses a method and a system to decrypt private contents stored in a device and the invention belongs to the field of computer security. The method may include: receiving a...
US20130124292 SYSTEM AND METHOD FOR GENERATING A STRONG MULTI FACTOR PERSONALIZED SERVER KEY FROM A SIMPLE USER PASSWORD  
The present invention relates to a method of generating a multi-factor encryption key using a simple password in order to access control over information stored at a second entity from a first...
US20150089238 SYSTEM AND METHOD FOR VERIFYING CHANGES TO UEFI AUTHENTICATED VARIABLES  
A mechanism for certifying that an operating system-based application has authorization to change a UEFI authenticated variable held in the system firmware is discussed. Embodiments of the present...
US20070289012 Remotely controllable security system  
A remotely controllable security system has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detector, etc. Control and monitoring software...
US20140324708 RAW SENSOR INPUT ENCRYPTION FOR PASSCODE ENTRY SECURITY  
A method of encrypting sensor input entries for passcode entry security is disclosed. The method in one embodiment includes presenting a passcode entry interface on an electronic device for a user...
US20110154048 Dynamically Mitigating A Noncompliant Password  
Techniques are disclosed for dynamically mitigating a noncompliant password. The method comprises obtaining a password; generating one or more quality scores for the password using a password...
US20050076224 Coding system  
The subject invention is an improved coding system for users to gain entry into a structured system, vehicle, or other entry means, such as an entry system being based on a process where in the...
US20140201536 One-Time Passcodes with Asymmetric Keys  
Protecting the security of an entity by using passcodes is disclosed. A user's passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user...
US20140298031 Method for Determining Debug Authorization for Motherboard Control Module and Associated Motherboard Control Module  
By comparing a chip unique password, certification for activating a debug function can be established on the chip unique password. Thus, even when the chip unique password is lost due to...
US20110029782 Handling Expired Passwords  
A method of operating a server comprises receiving an authorisation request comprising a password, accessing an expiry date for the password, transmitting a response comprising the expiry date,...
US20080137861 Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof  
A method of producing a security code by means of a programmable user device is described. The security code produced represents in itself both the user and the user device. In one embodiment, a...
US20130019103 SYSTEM AND METHOD FOR GENERATING AND MANAGING ADMINISTRATOR PASSWORDS  
A password management system and method for securing networked client terminals and mobile devices is provided. More specifically, the present invention provides a system and method for encrypting...
US20140317415 MULTI-TOUCH METHODS AND DEVICES  
The present disclosure relates to a multi-touch method, configured to a touch panel. The method comprises: applying a first object to touch a first image on the touch panel for inputting a first...
US20120191981 SECURITY METHOD AND APPARATUS  
A method and apparatus for providing password security to an electronic device. Access rights to an electronic device are determined by decrypting and decoding an encrypted password given to one...
US20060294392 Protection of a password-based user authentication in presence of a foe  
A user authentication method includes receiving a transformed password, determining a password based on the transformed password, making a comparison between the transformed password and a record...
US20110202773 Method of generating a password protocol using elliptic polynomial cryptography  
The method of generating password protocols based upon elliptic polynomial cryptography provides for the generation of password protocols based on the elliptic polynomial discrete logarithm...
US20120272067 AUTHENTICATION METHOD  
Method enabling a user to verify the operation of a personal cryptographic device, comprising the following steps: a) a user (2) enters an access request in a terminal (3) (100), d) a personal...
US20080065897 Enhanced Security for Display Device  
For securing a portable device, a first input is received to determine whether a security feature is enabled. A second input is received from a sensor to determine a presence of a physical lock...
US20050188211 IP for switch based ACL's  
A system that facilitates protecting an internal network from internal attacks comprises an entity that requests access to the internal network, wherein the internal network includes a plurality...
US20110202765 SECURELY MOVE VIRTUAL MACHINES BETWEEN HOST SERVERS  
A virtual hard drive is moved as an at least partially encrypted file to a different computing device. A key is provided to the different computing device in a protected form and a user on the...
US20100017616 WEB BASED SYSTEM THAT ALLOWS USERS TO LOG INTO WEBSITES WITHOUT ENTERING USERNAME AND PASSWORD INFORMATION  
Systems and methods for securely managing Internet user passwords are presented herein. A formation component can enable a user to create a master account on a web server, the master account...
US20070094150 Transaction authorization service  
System and method for authorizing transactions, such as payments or money transfers. A source entity may initiate a transaction with a target entity via a first communications channel. In...
US20130019102 System and method for encrypted smart card pin entry  
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for...
US20080040612 Glyphword-Based Security  
Methods, systems, and computer program products are provided for glyphword-based security. Embodiments include establishing a glyphword comprising a plurality of glyphs; and creating a plurality...
US20110060912 PASSWORD INPUTTING SYSTEM AND METHOD THEREOF  
A method for inputting password with a touch sensitive display is provided. The method includes displaying a password array comprising a plurality of characters on a touch sensitive display, the...
US20070143624 Client-side captcha ceremony for user verification  
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,...
US20100011221 Secured storage device with two-stage symmetric-key algorithm  
A secured storage device uses a user key set by user to encrypt a primary key that is for encryption or decryption of user data, to produce a first encrypted data. In the secured storage device,...
US20130117573 METHOD FOR VERIFYING A PASSWORD  
A method for verifying a password in a computing device, wherein the computing device comprises: a user input interface; a trusted hardware module having a trusted application stored therein, the...
US20140181529 VERIFICATION OF PASSWORD USING A KEYBOARD WITH A SECURE PASSWORD ENTRY MODE  
The present invention includes a device and method to authenticate a user to a computer prior to the user having access to the computer or network. As user name and password protocols are nearly...
US20070016804 PASSWORD MANAGEMENT SYSTEM  
A password management system is based on a complex password format having two portions, a first portion which stays the same and a second portion which can be regularly updated. The first portion...
US20080307235 METHOD OF PRESENTING FEEDBACK TO USER OF CHANCES OF PASSWORD CRACKING, AS THE PASSWORD IS BEING CREATED  
A method, system and computer program product for automatically displaying the potential risk associated with cracking a password. While creating or modifying a password, feedback is provided...
US20060085649 Method and apparatus for accommodating multiple verifier types with limited storage space  
One embodiment of the present invention provides a system that accommodates different types of verifiers in a computer system. During operation, the system receives a username and a password. The...
US20060218407 Method of confirming the identity of a person  
Methods and systems for confirming the identity of a person include receiving identifying information of the person, receiving an electronic device identifier, checking a database for a recorded...
US20060036872 Anti-burglary USB flash drive with press-button type electronic combination lock  
The objective of the present invention is to provide an anti-burglary USB flash drive with a press-button type electronic combination lock that adopts an IC password circuit without requiring a...
US20070101148 Secure prompting  
Techniques are described herein for securely prompting a user to confirm sensitive operations, input sensitive information or the like. The techniques include receiving or intercepting calls from...
US20130326228 Password Encryption Key  
A password-encrypted key (PEK) is generated from a user-supplied password or other identifying data and then used to encrypt the user's password. The encrypted password is stored in a user record...
US20080250248 Identity Management System with an Untrusted Identity Provider  
This invention describes an Identity Management system, in which the User uses the same set of credentials to log into multiple Web Service Providers (WSPs). However, unlike in traditional...
US20070214365 Document repository  
A method and system for gathering, storing, and accessing documents used to grant authority for one person to perform on behalf of another person the actions specified in such documents in an...

Matches 1 - 50 out of 290 1 2 3 4 5 6 >