Matches 1 - 50 out of 126 1 2 3 >


Match Document Document Title
US20050235159 Wireless transceiver system for computer input devices  
A wireless interface device for a keyboard of a computer system is achieved. The device comprises a radio transmitter and receiver. A modem encodes data to be sent by the radio transmitter and...
US20100017859 Authentication system for networked computer applications  
A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the...
US20120110340 SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS  
A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated...
US20080162943 Biometric security system and method  
A biometric security system comprises a token generator executable by a processor and configured to combine biometric information with a security payload to form a security token, the security...
US20120042170 DEVICE AND METHOD FOR ESTABLISHING SECURE TRUST KEY  
The invention relates to an electronic device configured for encrypted data transfer with a smart card under a trust key. The electronic device comprises at least one secured portion, wherein the...
US20050091511 Useability features in on-line delivery of applications  
Systems, methods, and computer program products for enhancing useability of on-line delivered applications. Access control is provided by generating and delivering an activation key to a client...
US20110010470 USB Autorun Device  
A portable, application-specific USB autorun device, following connection to a computer terminal, automatically initialises or presents itself as a known type of device and then automatically...
US20070136603 Method and apparatus for providing secure access control for protected information  
There are provided methods and apparatuses for processing requests from requestors, methods and apparatuses for transmitting indicia representative of information from a first domain to a second...
US20050229004 Digital rights management system and method  
The present invention concerns application of digital rights management to industrial automation devices including programmable logic controllers (PLCs), I/O devices, and communication adapters....
US20050223233 Authentication method and system  
An authentication method to minimize a number of times a PIN of a smart card is input to solve a problem related to deterioration in security caused when storing a password on a memory of a...
US20100250955 Brokered information sharing system  
A brokered information sharing system including a primary broker configured with software to store cards of a principal, to transmit the cards when requested by the principal, to authenticate the...
US20070174627 Secure compartmented mode knowledge management portal  
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level...
US20050193211 Management of user authentication information together with authentication level  
An apparatus for providing an authentication service includes an authentication service providing unit. The authentication service providing unit includes an authentication level calculating unit...
US20050125678 Systems and methods for configuring digital storage media with multiple access privileges  
Disclosed is a system for accurately storing and reading digital identifications and permissions with an access rights management component that protects the privacy and integrity of the data...
US20100211797 SECURELY PROVIDING A CONTROL WORD FROM A SMARTCARD TO A CONDITIONAL ACCESS MODULE  
Various embodiments of the invention provide a method, a smartcard, a conditional access module (CAM) of a receiver and a receiver, such as e.g. a set-top box, for securely providing a control...
US20080209223 TRANSACTIONAL VISUAL CHALLENGE IMAGE FOR USER VERIFICATION  
A method and a system generate a transactional visual challenge image to be presented to a user thereby to verify that the user is human. For example, an image module generates a visual challenge...
US20070255960 System and method for validating a network session  
A system and method for preventing interception and decryption of information by an unauthorized party when that information is transmitted over a network is provided. A token is used to encrypt...
US20060226950 Authentication system, method of controlling the authentication system, and portable authentication apparatus  
A personal-identification-information transmitting unit transmits personal identification information. A portable authentication apparatus receives the personal identification information, and...
US20060059346 Authentication with expiring binding digital certificates  
In various embodiments of the present invention systems and methods for authenticating a client for access to a business service of a firm and methods of creating a binding between a client's...
US20140173289 MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION  
An approach is provided for generating and decoding secure machine readable codes with a processor where the machine readable codes have multiple layers of security.
US20070168677 Changing user authentication method by timer and the user context  
A computer system with authentication means including a storage device where first conditions, second conditions, and authentication information relating to authentication means are stored; means...
US20070162759 PROTECTED PORT FOR ELECTRONIC ACCESS TO AN EMBEDDED DEVICE  
A system and method for controlling access by a user to an embedded device. A protected access port, integral with the embedded device, includes an access manager and a level controller. The...
US20100205448 DEVICES, SYSTEMS AND METHODS FOR SECURE VERIFICATION OF USER IDENTITY  
In one embodiment, devices, systems, and methods provide authentication of a user using two-factor authentication to enhance security. In such embodiment, a user presents login information and a...
US20090228714 Secure mobile device with online vault  
Encrypted data is stored in an online vault. The data in the online vault requires one key from the user and one key from an administrator to decrypt the data. In an embodiment, the key from the...
US20070101152 Token authentication system  
An apparatus, method and program product for enabling token authentication by generating a secret key using manufacturer controlled information (57) present on a token (34). A computer (30)...
US20060171536 Method and mobile terminal for securely transmitting a mobile subscriber identifier  
Disclosed is a method for securely transmitting a mobile subscriber identifier in a mobile communications system. The method includes coding a mobile subscriber identifier with a public key,...
US20050154923 SINGLE USE SECURE TOKEN APPLIANCE  
Systems, methods, software and data structures that facilitate the trusted, secure data exchange of data over networks, including open networks such as the Internet.
US20090172812 TWO FACTOR TOKEN IDENTIFICATION  
An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide...
US20090049307 System and Method for Providing a Multifunction Computer Security USB Token Device  
The invention discloses a small token device, ideally about the size of a key, which can plug into the USB interface of a host computer, which need not be fully trusted, and handle a variety of...
US20050278778 Method and apparatus for credential management on a portable device  
A system and/or method that enables a user to manage credential information for approving communications with various network and/or server components. A portable device is provided that...
US20100287382 Two-factor graphical password for text password and encryption key generation  
This invention details systems, methods, and devices for providing a two-factor graphical password system to a user so that the user may obtain access to a restricted resource. A first previously...
US20090271633 Data Access and Identity Verification  
A user access interface for a processor device comprises a control program adapted to receive a first access data indicative of a first access key, so that upon receiving the first access data the...
US20070174631 System and Method for Controlling Usage of Software on Computing Devices  
Described is a method and system for controlling usage of software on a computing device. An authorization key is generated as a function of a device string and a software string. The device...
US20070005987 Wireless detection and/or containment of compromised electronic devices in multiple power states  
Architectures and techniques that allow an electronic platform having a Radio Frequency Identification (RFID) tag to transmit platform security status information regardless of the power state of...
US20050138387 System and method for authorizing software use  
A software vendor freely distributes software to users and issues smart cards to be used with the software. The smart card includes at least one software module missing from the software package...
US20050010787 Method and system for identifying data locations associated with real world observations  
A method and system for identifying data locations or uniform resource locators associated with physical observations in the real world. The method and system includes selecting certain physical...
US20070150744 Dual authentications utilizing secure token chains  
Embodiments include a method and a system of authenticating a client when the client logs in a servicing. According to one embodiment, a first authentication code and a second authentication code...
US20050114680 Method and system for providing SIM-based roaming over existing WLAN public access infrastructure  
A method and apparatus for performing SIM-based authentication and authorization in a WLAN Internet Service Provider (WISP) network supporting the universal access method (UAM) of authentication...
US20050044385 Systems and methods for secure authentication of electronic transactions  
An online transaction system configured to implement authentication methods that allow for strong multi-factor authentication in online environments. The authentication methods can be combined...
US20050027991 System and method for digital rights management  
The invention provides several embodiments of a system and method of securely distributing and using digital content that protects the content owner's copyrights as well as the content user's...
US20090282259 NOISY LOW-POWER PUF AUTHENTICATION WITHOUT DATABASE  
The present invention relates to a method of authenticating, at a verifier (210), a device (101, 201) comprising a physical token (102), a system for performing authentication and a device...
US20070220269 Image forming apparatus, image forming apparatus controlling method, computer program product  
With personal information and confidential information being output through a direct operation from an output device, the operator can reliably obtain such information in person. Also, such...
US20050138388 System and method for managing cross-certificates copyright notice  
The invention provides a method for managing cryptographically generated data tokens, the method comprising: decoding a data file to retrieve a first cryptographically generated data token,...
US20050125677 Generic token-based authentication system  
To integrate a target application with an authentication system, a system administrator uses a graphical user interface to select configuration options from a series pages to define a user login...
US20070168674 Authentication system, authentication apparatus, and recording medium  
An authentication system that verifies various types of authenticity in regards with a visit by a forwarding agent. An identity authentication system is composed of an authentication card, a user...
US20070130474 Creating multiple one-time passcodes  
In one embodiment of a method of and system for creating one-time-passcodes, a one-time-passcode is created using a value representing the time on a clock. Where a second or subsequent one-time...
US20060136741 Two factor token identification  
An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide...
US20050160276 System and method for a directory secured user account  
A system and method for providing network access includes identifying an available network resource, providing an access token to the available network resource, tracking the access token, and...
US20160048692 TOKEN FOR SECURING COMMUNICATION  
A token includes an interface for communicating with a host, a processor communicably coupled to the interface, and to a persistent storage unit. The processor receives, via the interface, a...
US20120210137 SECURE ID CHECKING  
A cost-effective system that provides for the efficient protection of transmitted non-public attribute information may be used, for example, to control access to a secure area. Encryption of the...

Matches 1 - 50 out of 126 1 2 3 >