Matches 1 - 50 out of 142 1 2 3 >


Match Document Document Title
US20100146300 HEALTH MONITORING SYSTEM  
A health monitoring system includes a plurality of remote user sites, each remote user site comprising at least one health monitoring device for collection of user health monitoring data, an...
US20130007878 CENTRALIZED LICENSING SERVICES  
Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may...
US20090210293 INFORMATION TRANSACTIONS OVER A NETWORK  
In one example, a method for managing information in an environment that includes a client device includes accessing, at the client device, an electronic input interface. Next, the client device...
US20080134323 Secure Authentication Systems and Methods  
Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force...
US20100287611 SYSTEM AND METHOD FOR MANAGING CAPTURED CONTENT  
Provided are apparatuses and methods in a mobile communication and content capturing device for controlling ownership and use of captured content. A mobile device capturing content of a user of a...
US20100186085 Method and System to Support Dynamic Rights and Resources Sharing  
The invention relates to method for deriving a sub-right from a right, the right comprising a plurality of components, each of which specifies an aspect of the right. A component may be, for...
US20080163365 CONTROLLING ACCESS TO CONTENT AND/OR SERVICES  
The exemplary embodiments of the method and system according to the present invention provide a system and method for controlling access to audiovisual content such as television shows,...
US20090254753 SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON ACCESSIBLE ENTITLEMENTS  
Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend...
US20090031419 MULTIMEDIA SYSTEM AND SERVER AND METHODS FOR USE THEREWITH  
A multimedia server receives a plurality of programs of a multimedia source. The multimedia server includes a tuning module to receive the plurality of programs and to select a set of programs...
US20080104696 METHOD OF PROCESSING REGISTRATION MESSAGE ACCORDING TO INITIAL FILTER CRITERIA IN IMS NETWORK  
The invention provides a method of processing a registration message according to initial filter criteria in IMS network. The method is as follows: after a registration for a user is successful,...
US20140208419 User Authentication  
Disclosed is a method for providing a user access to a computer system comprising a plurality of services and a plurality of authentication levels, the method comprising dynamically monitoring a...
US20080256628 Security Objects Controlling Access To Resources  
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising...
US20130007877 System and Method of Owner Control of Electronic Devices  
A system and method of owner control of an electronic device are provided. Owner identification information, such as data integrity and source authentication information, is stored on the...
US20110138461 EXECUTION ENVIRONMENT FILE INVENTORY  
A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine...
US20110061103 Domain Isolation Through Virtual Network Machines  
A method and device for communicating information resources between subscriber end stations and nodes belonging to different network domains is described. The device instantiates different virtual...
US20080262901 Systems and Method of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision, Including Data Acquisition, Processing and Provision and/or Interoperability Features  
According to some embodiments of the present invention, a system (100), apparatus and method of network operation and information processing, including data acquisition, data processing, data...
US20090038006 User authentication with image password  
A method and apparatus authenticates a user with an image password. In one implementation, a method is provided. According to the method, a plurality of icons are displayed. The plurality of icons...
US20080091681 ARCHITECTURE FOR UNIFIED THREAT MANAGEMENT  
A security architecture has an event analysis engine that acquires several tangible actions. The occur in an action space of an organization, and relate to unauthorized access to assets and...
US20080047006 METHOD FOR REGISTERING RIGHTS ISSUER AND DOMAIN AUTHORITY IN DIGITAL RIGHTS MANAGEMENT AND METHOD FOR IMPLEMENTING SECURE CONTENT EXCHANGE FUNCTIONS USING THE SAME  
A method for registering a Domain Authority (DA) and a Rights Issuer (RI) for Digital Rights Management includes exchanging information between the DA and the RI. The DA and RI are registered by...
US20140115698 Method for Versatile Content Control with Partitioning  
A mechanism or structure may be provided to divide a memory into partitions and so that at least some data in the partitions can be encrypted with a key, so that in addition to authentication that...
US20100085152 AUTHENTICATION METHOD  
A method of authenticating a user includes storing a reference biometric data of the user, performing initial authentication by obtaining biometric data of the user and comparing the obtained...
US20150371031 METHOD, SYSTEM, AND AUTHENTICATION DEVICE  
A method includes: receiving a request for processing, the processing having to be preceded by an authorization process for a source of the request, the authorization process being performed based...
US20070136098 System and method for providing a secure feature set distribution infrastructure for medical device management  
A system and method for providing a secure feature set distribution infrastructure for medical device management is presented. A unique association is mapped for data download between a medical...
US20110173695 System and Methods for Secure Transaction Management and Electronic Rights Protection  
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the...
US20080244736 MODEL-BASED ACCESS CONTROL  
Access control as it relates to policies or permissions is provided based on a created model. A security policy is abstracted and can be independent of a mechanism used to protect resources. An...
US20070039045 Dual layered access control list  
A layer of abstraction for use by access control lists is provided for the process of creation and maintenance of user permissions on computer resources. First, a set of permissions can be...
US20090119500 Managing software configuration using mapping and repeatable processes  
The embodiments described herein generally relate to a method and system of injecting automated repeatable processes, or workflows, into software configuration management sequences. The benefits...
US20080077802 FUEL CARTRIDGE AUTHENTICATION  
Described herein are systems and methods that test authentication information on a fuel cartridge. A controller on a device that interfaces with the cartridge tests and validates the...
US20070061881 Verifying identities  
A sign is sent to a user of a system. Depending upon whether there is an indication received that the sign went to an address that is not associated with the user a level of authenticity is...
US20050257260 System for authentication between devices using group certificates  
In whilelist-based authentication, a first device (102) in a system (100) authenticates itself to a second device (103) using a group certificate identifying a range of non-revoked device...
US20160210446 System and Method for Providing Persistent Authentication in an Information Handling System  
An information handling system includes a secure resource, an input device that receives an authentication credential from a user and generates authentication information based upon the...
US20080066176 Personal digital rights management with user mobility  
A method of providing authorization, access rights, is provided wherein authentification/authorization for provision of a service is established between the system intended to provide the service...
US20060168657 Providing a user device with a set of a access codes  
A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the...
US20110088091 METHODS AND APPARATUS TO MAINTAIN VALIDITY OF SHARED INFORMATION  
Example methods and apparatus to maintain validity of shared information are disclosed. A disclosed example method involves receiving a communication requesting an extensible markup language (XML)...
US20100005526 INFORMATION PROCESSING APPARATUS AND METHOD  
An information processing apparatus includes: a positional relation acquisition section that detects a person who is in a predetermined area around a display device and acquires a positional...
US20060075487 Method for disabling a computing device based on the location of the computing device  
The present invention provides a method for disabling a computing device based on the location of the computing device. The computing device, such as a computer or the like, determines if there is...
US20120240224 SECURITY SYSTEMS AND METHODS FOR DISTINGUISHING USER-INTENDED TRAFFIC FROM MALICIOUS TRAFFIC  
Security systems and methods distinguish user-intended input hardware events from malicious input hardware events, thereby blocking resulting malicious output hardware events, such as, for...
US20080159529 Identification System Using Mechanical Vibrations on Identifier  
The invention relates to an identification system, wherein the identifier is a body comprising an inhomogeneous material, which body is identified by subjecting it to mechanical vibrations, in...
US20090089876 APPARATUS SYSTEM AND METHOD FOR VALIDATING USERS BASED ON FUZZY LOGIC  
An apparatus, system, and method are disclosed for validating users based on fuzzy logic. An interface with security questions is presented to a user who requires authentication. A typical...
US20100319068 METHOD AND SYSTEM FOR PERFORMING DELEGATION OF RESOURCES  
A method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated...
US20110231317 SECURITY SENSITIVE DATA FLOW ANALYSIS  
A system and method for security-aware data flow analysis are described. In various embodiments, a system analyses relationships between users, roles, tasks, and data objects, and permissions set...
US20100250988 VIDEO DISPLAY SYSTEM, DISPLAY DEVICE, PLUG-IN MODULE AND POWER CONTROL METHOD OF PLUG-IN MODULE  
It provides a video display system capable of effective control of power consumption, safe power-off operation, and resetting from a hang-up state by properly setting power supply to a plug-in...
US20080216172 SYSTEMS, METHODS, AND APPARATUS FOR SECURE TRANSACTIONS IN TRUSTED SYSTEMS  
Systems, methods, and software for protecting the identities of individuals, groups, and organizations are provided. In one embodiment, the systems, methods, and software provided by the present...
US20120246718 Method and System for Implementing Collaboration and Crowd-Sourced Distribution on a Content Management System  
Systems and methods are provided for delegating permissions of a content provider for a content item to a delegate. In a graphical interface, a content selection input is configured to receive a...
US20080134298 Integrated development environment with community integration  
Various technologies and techniques are disclosed for providing an intergrated development environment with community integration. A user specifies access settings to indicate that one or more...
US20060168658 Protection of data to be stored in the memory of a device  
A method for defining the rights of access to user-specific data to be stored in the memory (MEM) of a communication device (1), which communication device comprises a user-specific authentication...
US20130291098 DETERMINING TRUST BETWEEN PARTIES FOR CONDUCTING BUSINESS TRANSACTIONS  
Trust is calculated between persons for purposes of a business transaction. A measure of relative trust is determined for a target user with respect to a source user based on common entities that...
US20110239293 AUDITING ACCESS TO DATA BASED ON RESOURCE PROPERTIES  
Described is a technology, such as implemented in an operating system security system, by which a resource's metadata (e.g., including data properties) is evaluated against an audit rule or audit...
US20080115211 Methods for binding content to a separate memory device  
A method for accessing content is provided. In this method, information from a first memory device is retrieved. A parameter is generated based on the information and an account on a second memory...
US20130125234 IMAGE FORMING APPARATUS, IMAGE FORMING APPARATUS CONTROL METHOD, AND STORAGE MEDIUM STORING PROGRAM  
The history of the output destination of a job is displayed, and selection of a send destination in the history by a user is accepted. It is determined whether the user has an authority to...

Matches 1 - 50 out of 142 1 2 3 >