Matches 1 - 50 out of 375 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20080104669 Drug Delivery Management System  
The present invention relates to assisting patients in the taking of medication, and to assisting third parties in accumulating information regarding patient medication intake. The invention may...
US20080313706 Method of Verifying an Object  
A method of verifying an object using a computer system which receives a verification request indicative of an identity of the object and at least one signature fragment, the signature being a...
US20150242614 PROVISIONING OF SECURITY CREDENTIALS  
A security component for authenticating a device, within which it is incorporated, with another device, the security component comprising a root identity generator configured to generate a root...
US20100037294 METHOD AND APPARATUS FOR PROVIDING A HIERARCHICHAL SECURITY PROFILE OBJECT  
A hierarchical security policy that can be imposed by a policy maker upon a class of entities in an interactive television environment. A general policy is defined for a class of entities. A...
US20080301772 Authentication system and method, identification information inputting method and apparatus and portable terminal  
An authentication system in which unauthorized acquisition of the private information by a third party in the course of authentication of a user by a service provider is rendered difficult. In an...
US20100235643 AUTHENTICATION OF AN OBJECT  
A system for authenticating an object is disclosed. The system includes an optical sensing device and a processor. The optical sensing device senses coded data provided on a surface associated...
US20090064276 Analytical Instrument with Automatic Lockout against Unauthorized Use  
An analytical instrument includes a contactless memory reader, such as an RF-ID reader. Each person authorized to use the instrument carries a contactless memory, such as an RF-ID tag in an...
US20070277224 Methods and Systems for Graphical Image Authentication  
Systems and methods for providing authentication using an arrangement of dynamic graphical images. The graphical images can be arranged as a grid or matrix for presentation on a device display for...
US20160085965 EXECUTION OF A SECURED ENVIRONMENT INITIALIZATION INSTRUCTION ON A POINT-TO-POINT INTERCONNECT SYSTEM  
Methods and apparatus for initiating secure operations in a microprocessor system are described. In one embodiment, a system includes a processor to execute a secured enter instruction, and a...
US20080071577 Dual-access security system for medical records  
A secure system for accessing records uses a provider media device and a consumer media device to access records associated with the consumer. Both the consumer and provider media devices are...
US20060168644 RFID tag with embedded Internet address  
A radio frequency identification (RFID) transponder comprises a memory space having a predetermined data field for storing a destination address identifying a location on the Internet...
US20140109203 MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS)  
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The...
US20130263235 DATA PACKET GENERATOR FOR GENERATING PASSCODES  
A data packet generator periodically generates a data packet including a passcode comprising a plurality of characters. The data packet is sent to a server or a computing device for validation. If...
US20060123466 System and method of extending communications with the weigand protocol  
An extension of the industry standard Wiegand protocol for enabling two way extended communication, enhanced error detection, encryption, multiple reader capability, and enhanced information...
US20060059540 Network security through configuration servers in the fabric environment  
A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fibre Channel fabric. The network configuration...
US20100313013 SYSTEMS AND METHODS FOR SECURE TRANSACTION MANAGEMENT AND ELECTRONIC RIGHTS PROTECTION  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20100115283 SYSTEMS AND METHODS FOR USING CRYPTOGRAPHY TO PROTECT SECURE AND INSECURE COMPUTING ENVIRONMENTS  
Computation environments are protected from bogus or rogue load modules, executables, and other data elements through use of digital signatures, seals, and certificates issued by a verifying...
US20090254753 SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON ACCESSIBLE ENTITLEMENTS  
Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend...
US20080127304 Systems and methods for secure transaction management and electronic rights protection  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20070245403 Systems and methods for secure transaction management and electronic rights protection  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20120204223 SYSTEM FOR MANAGING DIGITAL INTERACTIONS  
A system for managing digital interactions comprising an identity module for creating an identity, wherein the identity includes a unique identifier associated with a first party and a plurality...
US20110185406 Systems and Methods to Authenticate Users  
Systems and methods are provided to facilitate online transactions via mobile communications. In one aspect, a system includes a data storage facility to store account information with a phone...
US20090094678 Mulimode device  
A mode indexing table is used for listing the available modes in a multimode device. From information in the mode indexing table, a host recognizes the modes as listed in the table. The host has a...
US20070226779 AUTHENTICATION RELAY APPARATUS, AUTHENTICATION RELAY SYSTEM, INTEGRATED CIRCUIT, AND AUTHENTICATION RELAY METHOD  
A representative registration apparatus 100 includes: a master and slave apparatus supporting control section 101 which generates, according to a registration message received from a master...
US20060253895 Video communication call authorization  
The disclosed systems and methods provide a centrally located call manger for authorizing calls from a caller to a recipient. In particular, the systems and methods relate to using a centralized...
US20050066167 Information recording medium manufacturing control system, information processing apparatus and method, and computer program thereof  
A system, apparatus and method for prevention of unauthorized manufacture and distribution of information recording media containing content, in which an information recording medium manufacturing...
US20100299674 METHOD, SYSTEM, GATEWAY DEVICE AND AUTHENTICATION SERVER FOR ALLOCATING MULTI-SERVICE RESOURCES  
In the field of network communications, a method, a system, a gateway device, and an authentication server for allocating multi-service resources while multiple services of a same user access to a...
US20080249938 SYSTEM AND METHOD FOR MERCHANT DISCOVERY AND TRANSFER OF PAYMENT DATA  
A method and system are provided for communicating with a merchant server and transferring payment data in a transaction between a mobile device and a merchant server. A user of the mobile device...
US20080115191 Method and apparatus to transmit personal information using trustable device  
A method and apparatus to transmit personal information, the method including: receiving an information request message requesting the personal information; receiving the personal information from...
US20060156386 Information storage medium storing management information of application executable from a plurality of storage media, and method and apparatus for executing the application  
An information storage medium storing management information of an application executable from a plurality of information storage media, and a method and apparatus for executing the application...
US20050055568 Method and system for providing physical security in an area of interest  
A system for detecting the presence of an intruder in a protected area utilizes a received signal strength indicator (RSSI) value of signals broadcast from transmitting stations deployed in the...
US20100146587 AUTHENTICATION OF CONTROLLED DOSING PROCESSES  
Authentication of products dispensed in an automated chemical dispensing system occurs via electronic communication of product information. The dispensing system includes a plurality of dispense...
US20080235516 Portable electronic door opener device and method for secure door opening  
A portable computing device for opening a door (an electronic door opener) and a method for its use is disclosed. The computing device has a shared secret key, a standard certificate, means for...
US20070033639 Phishing Detection, Prevention, and Notification  
Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication,...
US20140115662 Mechanism for Detecting Human Presence Using Authenticated Input Activity Timestamps  
When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the...
US20130159714 MEASUREMENT PROBE SYSTEMS FOR CO-ORDINATE POSITIONING APPARATUS  
A measurement probe, such as a touch trigger measurement probe, is described that comprises a measurement portion for measuring an object and a data transfer portion for receiving data from and/or...
US20110314515 INTEGRATED PHYSICAL AND LOGICAL SECURITY MANAGEMENT VIA A PORTABLE DEVICE  
Integrated physical and logical security management is extended to a mobile device, such as a portable wireless device or radio The Mobile-IMPACT solution extends the reach of authonzed users to...
US20090249443 METHOD FOR MONITORING THE UNAUTHORIZED USE OF A DEVICE  
The invention is directed to systems and methods for detecting the loss, theft or unauthorized use of a device and/or altering the functionality of the device in response. In one embodiment, a...
US20090172776 Method and System for Establishing and Managing Trust Metrics for Service Providers in a Federated Service Provider Network  
A system for issuing, validating, and managing trust between two or more entities authenticated to operate in a federated network includes one or more servers for issuing trust certificates based...
US20080115192 Customizable authentication for service provisioning  
Described are methods, systems, and apparatus, including computer program products for providing customizable authentication for service provisioning. A first user is enabled to customize an...
US20050151623 PDA security system  
Disclosed is a personalized security system for use with a PDA or other portable electronic device. An interrogator signal is transmitted from the portable electronic device, triggering a...
US20140123220 BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)  
A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that is provided to validate whether the parties involved are licensed to use the...
US20140094764 PROCESSING PROGRAM DATA FOR MEDICAL PUMPS  
An apparatus for maintaining a library of program data for medical pumps, the apparatus comprising: memory loaded with a database, the database including a plurality of program data records and a...
US20130179955 Identity Management System And Method Including Architecture For The Same  
A computer implemented method for an identity management system, having: on a computer device having one or more processors and a memory storing one or more programs for execution by the one or...
US20070283416 SYSTEM AND METHOD OF ENHANCING USER AUTHENTICATION USING RESPONSE PARAMETERS  
A software facility is disclosed that provides enhanced authentication of a user in a security system. During an initialization phase, the facility stores the responses of a user to a set of...
US20060259625 Method and system for centrally allocating addresses and port numbers  
An inside-realm node (A) attempting to connect to an outside-realm node (B) through an intermediate gateway (30) requests central configuration from a gateway resource manager (40). In response to...
US20060026438 Anonymous aliases for on-line communications  
Generation of anonymous aliases for on-line communications is described. In response to a user input to generate an anonymous alias, the anonymous alias is generated and associated with an...
US20050015611 Trusted peripheral mechanism  
According to one embodiment, computer system is disclosed. The computer system includes a central processing unit (CPU), and a chipset coupled to the CPU including protected registers and a host...
US20120011563 NETWORK INTELLIGENCE SYSTEM  
A network security system takes an active approach to network security. This is accomplished by providing intelligence about other networks. A master network intelligence database is established...
US20070011269 Method and apparatus for outputting data using RFID tag information  
A method and apparatus for outputting data by using information in a radio frequency identification (RFID) tag are provided. The data output method includes: receiving a response signal, including...

Matches 1 - 50 out of 375 1 2 3 4 5 6 7 8 >