Match
|
Document |
Document Title |
|
US20050060554 |
Method and device for customized picture-based user identification and authentication
A method and device for authorizing the use of an electronic device by picture identification, comprising: retrieving a number of pictures from a picture passkey library, displaying a subset of... |
|
US20150195276 |
System and Method For Securely Provisioning and Generating One-Time-Passwords In A Remote Device
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and... |
|
US20060230286 |
System and method for authenticating a user of an image processing system
A method and system for multi-factor user authentication on an image processing device. The system includes a server used to authenticate a user, and to retrieve user information corresponding to... |
|
US20090265559 |
USER AUTHENTICATION BY LINKING RANDOMLY-GENERATED AUTHENTICATION SECRET WITH PERSONALIZED SECRET
This patent application discloses techniques, devices and systems for user authentication based on linking between a randomly generated authentication secret and a personalized secret. |
|
US20080184035 |
System and Method of Storage Device Data Encryption and Data Access
Systems and methods of storage device data encryption and data access are described herein. Some embodiments of the present invention are summarized in this section. One embodiment includes... |
|
US20070061889 |
SYSTEM AND METHOD FOR CONTROLLING DISTRIBUTION OF ELECTRONIC INFORMATION
A method for managing access to electronic documents, wherein the documents include code scripts executable by, the documents being viewable by recipients only when viewed in a the document viewer... |
|
US20060218407 |
Method of confirming the identity of a person
Methods and systems for confirming the identity of a person include receiving identifying information of the person, receiving an electronic device identifier, checking a database for a recorded... |
|
US20060112275 |
Facilitating and authenticating transactions
A device or “dongle” (30) is provided for controlling communications between a Subscriber Identity Module (for SIM) (12), such as of the type used in a GSM cellular telephone system, and a... |
|
US20060236116 |
Provisioning root keys
The present invention provides a method of key material generation for authenticating communication with at least one network application function. The method includes determining first key... |
|
US20050188211 |
IP for switch based ACL's
A system that facilitates protecting an internal network from internal attacks comprises an entity that requests access to the internal network, wherein the internal network includes a plurality... |
|
US20090327741 |
SYSTEM AND METHOD TO SECURE BOOT UEFI FIRMWARE AND UEFI-AWARE OPERATING SYSTEMS ON A MOBILE INTERNET DEVICE (MID)
In some embodiments, the invention involves adding a capability for a platform owner or administrator to ensure that the firmware is only executed in an owner-authorized fashion, such as with... |
|
US20070101152 |
Token authentication system
An apparatus, method and program product for enabling token authentication by generating a secret key using manufacturer controlled information (57) present on a token (34). A computer (30)... |
|
US20060149970 |
Authentication method and device
[PROBLEM] Person authentication and authentication device of the present invention aims at providing a user with services of easy, inexpensive, highly secure, and reliable person authentication.... |
|
US20080034216 |
Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords
A communication system and method are configured for mutual authentication and secure channel establishment between two parties. In one embodiment a first party generates a first one-time password... |
|
US20070214365 |
Document repository
A method and system for gathering, storing, and accessing documents used to grant authority for one person to perform on behalf of another person the actions specified in such documents in an... |
|
US20150244522 |
METHOD AND SYSTEM FOR PROVIDING DATA SECURITY
Embodiments herein provide a method for data security. A data passcode used for data encryption in electronic devices is encrypted and secret shares of the encrypted passcode are distributed to... |
|
US20100186074 |
Authentication Using Graphical Passwords
An authenticator may include graphical passwords. An authenticator may include a password image, which may include one or more clickable areas, and/or a key image, which may include click point... |
|
US20100042847 |
METHOD FOR AUTHENTICATION USING ONE-TIME IDENTIFICATION INFORMATION AND SYSTEM
The present invention relates to a method and system that can safely and conveniently perform user authentication by a service provider server and at a public terminal using one-time... |
|
US20080072071 |
Hard disc streaming cryptographic operations with embedded authentication
A data storage system comprises a storage element, and an encryption and decryption unit connected between a host and the storage element, and using a key that is generated in the data storage system. |
|
US20070234064 |
Identification information output device
An identification information output device comprises a storage unit configured to store items of seed information for generating identification information, a selection unit configured to select... |
|
US20070016804 |
PASSWORD MANAGEMENT SYSTEM
A password management system is based on a complex password format having two portions, a first portion which stays the same and a second portion which can be regularly updated. The first portion... |
|
US20110202765 |
SECURELY MOVE VIRTUAL MACHINES BETWEEN HOST SERVERS
A virtual hard drive is moved as an at least partially encrypted file to a different computing device. A key is provided to the different computing device in a protected form and a user on the... |
|
US20070150744 |
Dual authentications utilizing secure token chains
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code... |
|
US20070174630 |
System and Method of Mobile Anti-Pharming and Improving Two Factor Usage
A variant of phishing involves subverting an Internet access point, often used for mobile computing. Malware can route user requests for bank websites into a phisher's private network, with fake... |
|
US20070157292 |
SYSTEM, METHOD, AND COMPUTER-READABLE MEDIUM FOR JUST IN TIME ACCESS THROUGH DYNAMIC GROUP MEMBERSHIPS
A system, method, and computer-readable medium for enabling a user account in a network system are provided. |
|
US20060129824 |
Systems, methods, and media for accessing TPM keys
Systems, methods and media for accessing and protecting TPM keys for signing and for decryption are disclosed. More particularly, hardware and software are disclosed for enabling a user knowing a... |
|
US20100058066 |
METHOD AND SYSTEM FOR PROTECTING DATA
A method and a system for protecting data are provided. When a computer system is powered on, a verification code is compared with a predetermined verification code. If the verification code... |
|
US20070289012 |
Remotely controllable security system
A remotely controllable security system has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detector, etc. Control and monitoring software... |
|
US20070079135 |
User authentication system and user authentication method
A user authentication system capable of maintaining high-level security and of reducing a user's load of operations necessary for login is provided. The user authentication system includes a user... |
|
US20070079133 |
Portable storage device having a subject identification information and a configuration method thereof
A portable storage device having a subject identification information utilizes a user authentication module to update the subject identification information and displays the subject identification... |
|
US20070022467 |
Method and system for limiting access to a shared network device
A system and method for limiting access to shared network devices only to authorized users is disclosed. First, access information associated with authorized users is stored in a memory of a... |
|
US20110004769 |
PASSWORD INPUT SYSTEM USING AN ALPHANUMERIC MATRIX AND PASSWORD INPUT METHOD USING THE SAME
The present invention relates to a password input algorithm, more particularly to a password input system and method using an alphanumeric matrix. An aspect of the invention can provide a password... |
|
US20160373933 |
WIRELESS NETWORK HAVING MULTIPLE COMMUNICATION ALLOWANCES
Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of... |
|
US20140324708 |
RAW SENSOR INPUT ENCRYPTION FOR PASSCODE ENTRY SECURITY
A method of encrypting sensor input entries for passcode entry security is disclosed. The method in one embodiment includes presenting a passcode entry interface on an electronic device for a user... |
|
US20120011370 |
PERSONAL IDENTIFICATION CODE ENTRY DEVICE AND METHOD THEREFOR
A data entry device for entering characters of a personal identification code comprising a pattern of chambers containing a character of a personal identification code which is required to be... |
|
US20080155267 |
IDENTITY MANAGEMENT SYSTEM WITH AN UNTRUSTED IDENTITY PROVIDER
An Identity Management system in which a User may use a single set of credentials to log into multiple Web Service Providers differs from traditional systems in that none of the WSPs have to rely... |
|
US20080082832 |
Configurable Data Access Application For Highly Secure Systems
In a method embodiment, a method for providing access to data includes intercepting a user request for access to data. In response to intercepting the user request, the method includes validating... |
|
US20070079383 |
System and Method for Providing Digital Content on Mobile Devices
A system and methods for providing digital content on mobile devices is described. User interfaces and methods for requesting, presentation, communication and storage of digital content are also... |
|
US20070011461 |
Personal data security system and method for handheld devices
A personal data security system and method for hand held devices are resolved for only locking all the applications or the personal data at a time, or to not lock a single application/function or... |
|
US20160232363 |
CONTROLLING AN ANALYSIS SYSTEM OF BIOLOGICAL SAMPLES
A method for controlling an analysis system is presented. The method comprises receiving, by an encryption unit, authentication data of a user. In the case of a successful authentication, a... |
|
US20100077223 |
AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, PROGRAM AND RECORDING MEDIUM
To prevent an input password from being stolen by an invalid authentication device. An authentication device 10 for authenticating an inputter based on an input password accepted from the inputter... |
|
US20060294392 |
Protection of a password-based user authentication in presence of a foe
A user authentication method includes receiving a transformed password, determining a password based on the transformed password, making a comparison between the transformed password and a record... |
|
US20060005039 |
Authentication control system and method thereof
A system and method thereof for authentication control are provided. A display device displays a password input screen. The password input screen comprises multiple display characters being... |
|
US20080104411 |
Methods and apparatus for changing passwords in a distributed communication system
Methods and apparatus are provided for changing passwords in a distributed communication system. The disclosed password management system includes an event server for receiving one or more... |
|
US20080137861 |
Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof
A method of producing a security code by means of a programmable user device is described. The security code produced represents in itself both the user and the user device. In one embodiment, a... |
|
US20070130473 |
System and method for access control
A system and method for authenticating a user based on multiple factors is provided. The system and method also control access by the user and monitor the user's activity. |
|
US20130117573 |
METHOD FOR VERIFYING A PASSWORD
A method for verifying a password in a computing device, wherein the computing device comprises: a user input interface; a trusted hardware module having a trusted application stored therein, the... |
|
US20100169958 |
Method for generating and using composite scene passcodes
One disclosed embodiment for creating a composite scene passcode comprises presenting a system-generated composite scene passcode to a user, allowing the user to generate a composite-scene... |
|
US20050114678 |
Method and apparatus for verifying security of authentication information extracted from a user
A method and apparatus are provided for evaluating the security of authentication information that is extracted from a user. The disclosed authentication information security analysis techniques... |
|
US20090144554 |
Two-way authentication with non-disclosing password entry
A method of two-way authentication between a user and a known host using a non-disclosing password entry system generates a matrix of characters having a random characteristic with random... |