Match
|
Document |
Document Title |
|
US20120042366 |
SECURE AND USABLE AUTHENTICATION FOR HEALTH CARE INFORMATION ACCESS
Embodiments of the invention relate to providing a health care provider access to an electronic record of a patient may be provided. A determination is made as to whether the health care provider... |
|
US20120004931 |
System and Method for Form Record Processing
A method and system for providing a form record and for processing the same. For example, a medical record form in a clinical or hospital environment is provided based on user input and is... |
|
US20130152193 |
METHOD FOR AUTHENTICATION WITH DYNAMIC AND RANDOM PASSWORDS
An approach is provided for a method for authentication with dynamic and random passwords, which comprises acts of obtaining a code equation initially from a person through an register page of a... |
|
US20150223891 |
MEDICAL CART ACCESS CONTROL
Technology for controlling access to a portable medical cart is disclosed. A method comprises controlling the portable medical cart using a computing device. Security information can be... |
|
US20120042378 |
Login system for a graphical user interface
A user sets a design and uses that to get access to a resource. The design can include lines, and distances of lines, directions and locations. The design can require a user to select a color and... |
|
US20130254875 |
System and Method for Risk Assessment of Login Transactions Through Password Analysis
A system and method is provided for determining a risk associated with a login transaction. A password received during the login attempt and determination is made regarding whether the received... |
|
US20140150090 |
CHALLENGE-RESPONSE METHODOLOGY FOR SECURING VEHICLE DIAGNOSTIC SERVICES
A method for locally authenticating a vehicle diagnostic tool with a vehicle using a challenge-response authentication scheme includes: receiving a pairing request from the vehicle diagnostic... |
|
US20150143510 |
SYSTEMS AND METHODS FOR NOTIFYING A USER OF A USER ENTRY THAT MATCHES SECURITY INFORMATION AND FOR HIDING DISPLAY OF A USER ENTRY THAT MATCHES SECURITY INFORMATION
Systems and methods for notifying a user of a user entry that matches security information and for hiding display of a user entry that matches security information are disclosed. According to an... |
|
US20120331549 |
SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS
A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be... |
|
US20140165169 |
METHOD AND SYSTEM FOR MANAGING USER LOGIN BEHAVIOR ON AN ELECTRONIC DEVICE FOR ENHANCED SECURITY
Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the... |
|
US20140283020 |
System For Binding An Accessory To A Smartphone Or Tablet PC Application
This disclosure relates to software applications particularly for smart phone which are used to control or access hardware, particularly headsets. The software is available at no cost to anyone,... |
|
US20140289842 |
SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM
A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user... |
|
US20130239206 |
AUTHENTICATION USING PHYSICAL INTERACTION CHARACTERISTICS
User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction... |
|
US20150220224 |
SYSTEM AND METHOD FOR CURSOR-BASED APPLICATION MANAGEMENT
A system and method of managing applications and event notifications using a cursor-based GUI, wherein the cursor-based GUI is located adjacent to the cursor and provides a user with the ability... |
|
US20130198051 |
SYSTEM AND METHOD FOR CURSOR-BASED APPLICATION MANAGEMENT
A system and method of managing applications and event notifications using a cursor-based. GUI, wherein the cursor-based GUI is located adjacent to the cursor and provides a user with the ability... |
|
US20100318806 |
MULTI-FACTOR AUTHENTICATION WITH RECOVERY MECHANISMS
A single sign on facility provides redundancy and recovery functions through the use of a plurality of identifiers. Users prove identity to relying parties by demonstrating control over each of... |
|
US20120110662 |
User Indentification with Capacitive Touchscreen
Disclosed herein are various embodiments of means and methods for verifying or authorizing one or more verified or authorized users to operate or use an electronic device containing a capacitive... |
|
US20130340073 |
Identification to Access Portable Computing Device
A portable computing device receives an identity card and restricts access to the portable computing device if the identity card is unassociated with the portable computing device. If access to... |
|
US20130318597 |
COMPUTER IMPLEMENTED SECURITY METHOD AND SYSTEM
A computer implemented security system (10) and method are disclosed. A user interface (20) is displayed on a display device (30), the user interface including a positioning guide (100) and a... |
|
US20110173693 |
Assessment and analysis of software security flaws
Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software... |
|
US20140068758 |
Method and System of Simulating a Pulse Generator on a Clinician Programmer
The present disclosure involves a method of simulating a pulse generator on a portable electronic device. A graphical user interface is provided via a touch-sensitive screen of the portable... |
|
US20130174251 |
METHODS AND SYSTEMS FOR SERVICE DELIVERY
A system for providing a service comprising: a service provisioning control means adapted for identifying a user, and for providing services to said user; the system further comprising: a location... |
|
US20120151575 |
APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL
Provided is an apparatus and method for certificating security in a portable terminal, which can enhance security in the portable terminal by multiple security certifications. An apparatus for... |
|
US20140373132 |
GESTURE-BASED AUTHENTICATION WITHOUT RETAINED CREDENTIALING GESTURES
This document describes techniques and apparatuses enabling gesture-based authentication without retained credentialing gestures. The techniques are capable of determining an identifier for a... |
|
US20130074180 |
USER CERTIFICATION IN A STRUCTURE DESIGN, ANALYSIS, AND IMPLEMENTATION SYSTEM
A computer-implemented subsystem and method is disclosed for receiving user qualification data, comparing that data to certification criteria, and providing user certification according thereto,... |
|
US20090007256 |
Using a trusted entity to drive security decisions
An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user... |
|
US20120054856 |
USER AND DEVICE AUTHENTICATION FOR MEDIA SERVICES
A user obtains access to particular services levels associated with media content. A user and devices associated with the user may be authenticated to access content at a particular service level... |
|
US20150067823 |
MOTION-BASED CREDENTIALS USING MAGNIFIED MOTION
Systems and methods are provided which allow for motion-based authentication of a user using magnified motion. Very small or imperceptible motions of a user may be captured and magnified to... |
|
US20120254956 |
Securely Managing Password Access to a Computer System
A method, system or computer usable program product for providing initial access Lo the computer system in response to a user providing a first password, and upon detecting a condition meeting a... |
|
US20150089635 |
SYSTEM FOR CORRELATION OF INDEPENDENT AUTHENTICATION MECHANISMS
Described are devices, methods and non-transitory computer readable media for implementing an enhanced multi-factor authentication system. The system uses three user identifiers, and after a first... |
|
US20130276100 |
METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD
Provided is a method and apparatus for authenticating a password, wherein the method includes: generating at least one input grid cell into which a password is input from among a plurality of grid... |
|
US20150113635 |
APPARATUS AND METHOD FOR CONFIGURING PASSWORD AND FOR RELEASING LOCK
Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels,... |
|
US20110088090 |
ENHANCEMENTS TO CLAIMS BASED DIGITAL IDENTITIES
A system and method of identifying a user to a digital system is disclosed. The method includes receiving a request for a value of an identification claim of a digital identity from a relying... |
|
US20110072511 |
SYSTEMS AND METHODS FOR SUPPORTING PRE-BOOT LOG IN
In one embodiment, a system and method for supporting pre-boot log in pertain to receiving a password selected by a user for use in a pre-boot log in, determining whether the password can be... |
|
US20110321157 |
SYSTEM AND METHOD FOR USER AUTHENTICATION
A system and a related method are disclosed for authenticating a user of an electronic system. The system, and related method access (a) data relating to a defined interaction with an input device... |
|
US20150213287 |
METHOD AND SYSTEM FOR MANAGING AND CONTROLLING DIRECT ACCESS OF AN ADMINISTRATOR TO A COMPUTER SYSTEM
A method, computer program product, and computer system for managing and controlling direct access of an administrator to a computer system. An interceptor application resides on the computer... |
|
US20150067828 |
INDUSTRIAL AUTOMATION AND CONTROL DEVICE USER ACCESS
Solutions are disclosed for simplified user access to IEDs in industrial or utility operating environments such as those compatible with IEC 62351-8, having an LHMI with a restricted IED key set.... |
|
US20110113487 |
ICON CARD VERIFICATION SYSTEM
An identity verification system uses a master key formed of first and second sets of symbols arranged in a one to one relationship. A distinct public key is assigned to each user of a plurality of... |
|
US20150067824 |
WEARABLE USER DEVICE AUTHENTICATION SYSTEM
Systems and methods for authenticating a user include a wearable user device receiving a first request to access a secure system. A plurality of authentication elements are then displayed on a... |
|
US20130036462 |
Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
Techniques for improving security on a device are disclosed. In an aspect, a multi-factor password comprising a plurality of factors may be used to improve security. Each factor may correspond to... |
|
US20140223547 |
ALTERNATE GAME-LIKE MULTI-LEVEL AUTHENTICATION
The disclosed embodiments provide a convenient way for users to access segregated work spaces on mobile devices. A game-like multi-level interactive approach is used to prompt users for input to... |
|
US20120240223 |
PROCESS AND APPARATUS FOR AUTOMATICALLY IDENTIFYING USER OF CONSUMER ELECTRONICS
A user of a device may be uniquely identified using a metric that is contingent upon the user using the device for its intended purpose without the user having to perform a separate step,... |
|
US20150254448 |
Verifying Human Use of Electronic Systems
Described herein are techniques related to verifying human use of electronic systems. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope and... |
|
US20140283012 |
METHOD OF LOCKING AN APPLICATION ON A COMPUTING DEVICE
A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the user input, locking a user within... |
|
US20140283013 |
METHOD AND APPARATUS FOR UNLOCKING A FEATURE USER PORTABLE WIRELESS ELECTRONIC COMMUNICATION DEVICE FEATURE UNLOCK
Embodiments provide a method and apparatus for unlocking a feature of a user portable wireless electronic communication device. The user portable wireless electronic communication device can... |
|
US20150220713 |
DYNAMIC ACCOUNT AUTHENTICATION USING A MOBILE DEVICE
Providing dynamic authentication of a user requesting access to a system via a mobile device is disclosed. An account holder tailors a set of customized security challenges and responses. When a... |
|
US20150205942 |
Password Authentication System And Password Authentication Method Using Consecutive Password Authentication
Disclosed is a password authentication system and a password authentication method using continuous password authentication. In the password authentication system, a password is set using an... |
|
US20120174215 |
CLIENT-SIDE CAPTCHA CEREMONY FOR USER VERIFICATION
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,... |
|
US20140033301 |
MOBILE DEVICE AND PUPIL RECOGNITION METHOD
A mobile device comprises a pupil information collecting module and a master control module, such that the pupil information collecting module may be used for collecting pupil characteristic... |
|
US20140259154 |
DISPLAYING AN ICON BASED UPON USER INPUT
Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a... |