Matches 1 - 50 out of 274 1 2 3 4 5 6 >


Match Document Document Title
US20140173289 MOBILE IDENTITY PROVIDER WITH TWO FACTOR AUTHENTICATION  
An approach is provided for generating and decoding secure machine readable codes with a processor where the machine readable codes have multiple layers of security.
US20130086389 Security Token and Authentication System  
Techniques are provided for entering a secret into a security token using an embedded tactile sensing user interface with the purpose of verifying the secret against a stored representation of the...
US20120265997 PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
US20100325441 PRIVACY-PRESERVING FLEXIBLE ANONYMOUS-PSEUDONYMOUS ACCESS  
Systems and methods are disclosed for privacy-preserving flexible user-selected anonymous and pseudonymous access at a relying party (RP), mediated by an identity provider (IdP). Anonymous access...
US20130097429 Method and System for Secure Authentication of a User by a Host System  
A method and system for securely logging onto a banking system authentication server so that a user credential never appears in the clear during interaction with the system in which a user's...
US20140359301 UNIFORM MODULAR FRAMEWORK FOR A HOST COMPUTER SYSTEM  
A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a...
US20130145173 TOKEN MANAGEMENT  
Systems and methods for generating replacement tokens are described herein.
US20110131418 METHOD OF PASSWORD MANAGEMENT AND AUTHENTICATION SUITABLE FOR TRUSTED PLATFORM MODULE  
A password management and authentication method suitable for an electronic device with a trusted platform module (TPM) is provided. An authentication code is automatically generated according to a...
US20130145172 TOKEN ACTIVATION  
Systems and methods for activating a token to enable a user to enter a transaction based on information received from a recovery key and a passcode are described herein.
US20150121085 Cookie Information Sharing Method and System  
This invention discloses a cookie information sharing method that comprises the following steps: reading cookie information in a parent browser, said parent browser being a browser which stores...
US20130007465 Apparatus, Systems and Method for Virtual Desktop Access and Management  
Systems and methods are provided for accessing and managing a virtual desktop. In some examples a desktop access manager may be provided to enable and communicatively link a virtual desktop key...
US20130297944 INTEGRITY PROTECTED SMART CARD TRANSACTION  
Systems, methods, and technologies for configuring a conventional smart card and client machine, and for performing a smart card authorization using the configured smart card and client. Further,...
US20110179283 INTEGRITY PROTECTED SMART CARD TRANSACTION  
Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client....
US20150207791 PASSWORD ENCODE CARD SYSTEM AND METHOD  
A system and method is presented for use of a password encode card to create multiple random passwords at a variety of computerized service providers. The encode card contains a plurality of...
US20110197073 METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF DIGITAL CONTENT  
A method and apparatus for secure distribution of digital content is provided. In accordance with at least one embodiment, an intermediate device maintains an authorized content sink list which it...
US20070022472 Method and system for ordering, loading and using admission tickets  
Method and system for ordering, loading and using admission tickets for access to access-controlled service devices, in which admission tickets are ordered from a reservation center through...
US20140331060 User and Device Authentication in Enterprise Systems  
Methods and systems for authenticating users of client devices to allow access of resources and services in enterprise systems are described herein. An authentication device may validate a user...
US20110213985 TWO FACTOR AUTHENTICATION SCHEME  
An improved method is provided for generating an authentication factor for authenticating a user. The method includes: assigning a unique identifier to a user of the computing resource;...
US20080137861 Security Code Production Method and Methods of Using the Same, and Programmable Device Thereof  
A method of producing a security code by means of a programmable user device is described. The security code produced represents in itself both the user and the user device. In one embodiment, a...
US20110145589 OBLIVIOUS TRANSFER WITH ACCESS CONTROL  
A protocol for anonymous access to a database where the different records have different access control permissions is described. The permissions can be attributes, roles or rights that an...
US20090287937 IDENTITY VERIFICATION  
The invention provides a method for verifying the identity of an entity to a computerised system. The entity is in possession of a personal identification device (PID) having a PID ID and storing...
US20140281565 CONFIGURABLE PERSONAL DIGITAL IDENTITY DEVICE RESPONSIVE TO USER INTERACTION  
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal...
US20110087891 METHOD FOR PRODUCING, ALLOCATING AND CHECKING AUTHORIZATION APPROVALS  
In a method for producing, allocating and checking authorization approvals that are required in order to fulfill tasks specified by an action plan through performance, by a service technician, of...
US20100169721 SYSTEM AND METHOD FOR UPDATING A COMPENSATION VALUE OF A MEASUREMENT MACHINE  
A system and method for updating a compensation value of a measurement machine provides a host computer to generate an authorization code document according to an ID input by a user and encrypts...
US20080162943 Biometric security system and method  
A biometric security system comprises a token generator executable by a processor and configured to combine biometric information with a security payload to form a security token, the security...
US20130103952 User Authentication System and Method for Encryption and Decryption  
A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to communicate with the user authentication...
US20140281566 PERSONAL DIGITAL IDENTITY DEVICE WITH MOTION SENSOR  
A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal...
US20130019102 System and method for encrypted smart card pin entry  
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for...
US20140365781 Receiving a Delegated Token, Issuing a Delegated Token, Authenticating a Delegated User, and Issuing a User-Specific Token for a Resource  
Some embodiments relate to a computer readable medium including a program code, which is configured, when running on a programmable hardware component, to receive a delegated token from a user's...
US20060236118 Computer access security  
A method is provided for improved computer access security, the method including protecting an access record to prevent password access to a computer via the access record, creating an alternate...
US20050138386 Trusted and unsupervised digital certificate generation using a security token  
A method, system and computer program product for ensuring PKI key pairs are operatively installed within a secure domain of a security token prior to generating a digital certificate. The public...
US20070028118 System and method for encrypted smart card pin entry  
A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for...
US20120210137 SECURE ID CHECKING  
A cost-effective system that provides for the efficient protection of transmitted non-public attribute information may be used, for example, to control access to a secure area. Encryption of the...
US20130305054 TRULY ANONYMOUS CLOUD KEY BROKER  
Embodiments of systems and methods for providing anonymous cloud encryption are provided. One embodiment of a method for providing anonymous cloud encryption includes communicating an anonymizing...
US20130268768 USER AUTHENTICATION  
A method includes receiving user input including a user password while an authentication token is retained at a first position in an authentication token receiver of an authentication token reader...
US20100241865 One-Time Password System Capable of Defending Against Phishing Attacks  
A one-time password system capable of defending against on-line phishing attacks. The one-time password system is composed mainly of a Java smart card, a pre-end password calculation module, a...
US20100250796 Establishing a Secure Channel between a Server and a Portable Device  
Systems and method for forming a secure channel between a server and a portable storage device coupled to a host computer are presented. A message sequence is exchanged between the server and the...
US20130151859 KEY AND METHOD FOR ENTERING COMPUTER RELATED PASSWORDS VIA A MNEMONIC COMBINATION  
A key for entering computer related passwords via a mnemonic combination includes an electronic key with a communication means, a computer program, a storage unit, and a user interface. The...
US20130339747 Secure Identification Card (SID-C) System  
In accordance with one embodiment of the present invention a secure electronic identification device is presented. The secure electronic identification device includes a display mode for...
US20130054975 ELECTRONIC PASSWORD LOCK SYSTEM AND METHOD FOR ITS USE  
A lock system includes a locker device and a USB key. The locker device includes a first USB connector, a password input unit and a control unit. The USB key includes a second USB connector for...
US20060259776 Extensible account authentication system  
Systems and methods directed at enhancing the capability of a federated authentication system by configuring the system with extensibility points for adding new account stores and customizing...
US20130318359 SYSTEMS AND METHODS FOR VERIFYING UNIQUENESS IN ANONYMOUS AUTHENTICATION  
A method for anonymous authentication by an electronic device is described. The method includes obtaining biometric data. The method also includes generating a token. The method also includes...
US20070283424 Identity validation  
Techniques for validating identities are provided. A sign-on request is authenticated for a given principal. Attributes associated with that principal are acquired from an identity service and...
US20060195700 Token signature  
Token signature techniques are described. In an implementation, a method includes obtaining a token that represents an offer and associating the token with a signature value which is calculated...
US20120132704 VISUAL ACCESS TOKEN  
A method of creating a visual access token is described. The method comprises: receiving an input referencing private information without revealing the private information; retrieving the...
US20050229005 Security badge arrangement  
A method and computer program product which comprises storing at least one data file inside a portable device such as security token or flash memory drive associated with a security badge. The...
US20080301463 Method for Documenting Property or Possession and Transfer of Property or Possession of a Merchandise  
In order to provide a method wherein, by using a storage medium arranged on goods, it is possible to distinctly register a conveyance of ownership or title on this storage medium, and wherein only...
US20090172812 TWO FACTOR TOKEN IDENTIFICATION  
An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide...
US20120110340 SYSTEM, PORTABLE DEVICE AND METHOD FOR DIGITAL AUTHENTICATING, CRYPTING AND SIGNING BY GENERATING SHORT-LIVED CRYPTOKEYS  
A system for authentication, encryption and/or signing, as well as corresponding devices and methods, that use temporary but repeatable encryption keys uniquely connected to the user and generated...
US20100228991 Using Hidden Secrets and Token Devices to Control Access to Secure Systems  
A system for using an encrypted version of a password or access code which is stored in the open on a computer or other device, which utilizes a hardware token to decrypt the password or access...

Matches 1 - 50 out of 274 1 2 3 4 5 6 >