Match
|
Document |
Document Title |
|
US20100146300 |
HEALTH MONITORING SYSTEM
A health monitoring system includes a plurality of remote user sites, each remote user site comprising at least one health monitoring device for collection of user health monitoring data, an... |
|
US20130007878 |
CENTRALIZED LICENSING SERVICES
Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may... |
|
US20090210293 |
INFORMATION TRANSACTIONS OVER A NETWORK
In one example, a method for managing information in an environment that includes a client device includes accessing, at the client device, an electronic input interface. Next, the client device... |
|
US20080134323 |
Secure Authentication Systems and Methods
Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force... |
|
US20100287611 |
SYSTEM AND METHOD FOR MANAGING CAPTURED CONTENT
Provided are apparatuses and methods in a mobile communication and content capturing device for controlling ownership and use of captured content. A mobile device capturing content of a user of a... |
|
US20100186085 |
Method and System to Support Dynamic Rights and Resources Sharing
The invention relates to method for deriving a sub-right from a right, the right comprising a plurality of components, each of which specifies an aspect of the right. A component may be, for... |
|
US20080163365 |
CONTROLLING ACCESS TO CONTENT AND/OR SERVICES
The exemplary embodiments of the method and system according to the present invention provide a system and method for controlling access to audiovisual content such as television shows,... |
|
US20090254753 |
SYSTEM AND METHOD OF AUTHORIZING EXECUTION OF SOFTWARE CODE BASED ON ACCESSIBLE ENTITLEMENTS
Embodiments include systems and methods for authorizing software code to be executed or access capabilities in secure operating environments. Profiles may be issued by trusted entities to extend... |
|
US20090031419 |
MULTIMEDIA SYSTEM AND SERVER AND METHODS FOR USE THEREWITH
A multimedia server receives a plurality of programs of a multimedia source. The multimedia server includes a tuning module to receive the plurality of programs and to select a set of programs... |
|
US20080104696 |
METHOD OF PROCESSING REGISTRATION MESSAGE ACCORDING TO INITIAL FILTER CRITERIA IN IMS NETWORK
The invention provides a method of processing a registration message according to initial filter criteria in IMS network. The method is as follows: after a registration for a user is successful,... |
|
US20140208419 |
User Authentication
Disclosed is a method for providing a user access to a computer system comprising a plurality of services and a plurality of authentication levels, the method comprising dynamically monitoring a... |
|
US20080256628 |
Security Objects Controlling Access To Resources
Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising... |
|
US20130007877 |
System and Method of Owner Control of Electronic Devices
A system and method of owner control of an electronic device are provided. Owner identification information, such as data integrity and source authentication information, is stored on the... |
|
US20110138461 |
EXECUTION ENVIRONMENT FILE INVENTORY
A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine... |
|
US20110061103 |
Domain Isolation Through Virtual Network Machines
A method and device for communicating information resources between subscriber end stations and nodes belonging to different network domains is described. The device instantiates different virtual... |
|
US20080262901 |
Systems and Method of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision, Including Data Acquisition, Processing and Provision and/or Interoperability Features
According to some embodiments of the present invention, a system (100), apparatus and method of network operation and information processing, including data acquisition, data processing, data... |
|
US20090038006 |
User authentication with image password
A method and apparatus authenticates a user with an image password. In one implementation, a method is provided. According to the method, a plurality of icons are displayed. The plurality of icons... |
|
US20080091681 |
ARCHITECTURE FOR UNIFIED THREAT MANAGEMENT
A security architecture has an event analysis engine that acquires several tangible actions. The occur in an action space of an organization, and relate to unauthorized access to assets and... |
|
US20080047006 |
METHOD FOR REGISTERING RIGHTS ISSUER AND DOMAIN AUTHORITY IN DIGITAL RIGHTS MANAGEMENT AND METHOD FOR IMPLEMENTING SECURE CONTENT EXCHANGE FUNCTIONS USING THE SAME
A method for registering a Domain Authority (DA) and a Rights Issuer (RI) for Digital Rights Management includes exchanging information between the DA and the RI. The DA and RI are registered by... |
|
US20140115698 |
Method for Versatile Content Control with Partitioning
A mechanism or structure may be provided to divide a memory into partitions and so that at least some data in the partitions can be encrypted with a key, so that in addition to authentication that... |
|
US20100085152 |
AUTHENTICATION METHOD
A method of authenticating a user includes storing a reference biometric data of the user, performing initial authentication by obtaining biometric data of the user and comparing the obtained... |
|
US20150371031 |
METHOD, SYSTEM, AND AUTHENTICATION DEVICE
A method includes: receiving a request for processing, the processing having to be preceded by an authorization process for a source of the request, the authorization process being performed based... |
|
US20070136098 |
System and method for providing a secure feature set distribution infrastructure for medical device management
A system and method for providing a secure feature set distribution infrastructure for medical device management is presented. A unique association is mapped for data download between a medical... |
|
US20110173695 |
System and Methods for Secure Transaction Management and Electronic Rights Protection
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the... |
|
US20080244736 |
MODEL-BASED ACCESS CONTROL
Access control as it relates to policies or permissions is provided based on a created model. A security policy is abstracted and can be independent of a mechanism used to protect resources. An... |
|
US20070039045 |
Dual layered access control list
A layer of abstraction for use by access control lists is provided for the process of creation and maintenance of user permissions on computer resources. First, a set of permissions can be... |
|
US20090119500 |
Managing software configuration using mapping and repeatable processes
The embodiments described herein generally relate to a method and system of injecting automated repeatable processes, or workflows, into software configuration management sequences. The benefits... |
|
US20080077802 |
FUEL CARTRIDGE AUTHENTICATION
Described herein are systems and methods that test authentication information on a fuel cartridge. A controller on a device that interfaces with the cartridge tests and validates the... |
|
US20070061881 |
Verifying identities
A sign is sent to a user of a system. Depending upon whether there is an indication received that the sign went to an address that is not associated with the user a level of authenticity is... |
|
US20050257260 |
System for authentication between devices using group certificates
In whilelist-based authentication, a first device (102) in a system (100) authenticates itself to a second device (103) using a group certificate identifying a range of non-revoked device... |
|
US20160210446 |
System and Method for Providing Persistent Authentication in an Information Handling System
An information handling system includes a secure resource, an input device that receives an authentication credential from a user and generates authentication information based upon the... |
|
US20080066176 |
Personal digital rights management with user mobility
A method of providing authorization, access rights, is provided wherein authentification/authorization for provision of a service is established between the system intended to provide the service... |
|
US20060168657 |
Providing a user device with a set of a access codes
A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the... |
|
US20110088091 |
METHODS AND APPARATUS TO MAINTAIN VALIDITY OF SHARED INFORMATION
Example methods and apparatus to maintain validity of shared information are disclosed. A disclosed example method involves receiving a communication requesting an extensible markup language (XML)... |
|
US20100005526 |
INFORMATION PROCESSING APPARATUS AND METHOD
An information processing apparatus includes: a positional relation acquisition section that detects a person who is in a predetermined area around a display device and acquires a positional... |
|
US20060075487 |
Method for disabling a computing device based on the location of the computing device
The present invention provides a method for disabling a computing device based on the location of the computing device. The computing device, such as a computer or the like, determines if there is... |
|
US20120240224 |
SECURITY SYSTEMS AND METHODS FOR DISTINGUISHING USER-INTENDED TRAFFIC FROM MALICIOUS TRAFFIC
Security systems and methods distinguish user-intended input hardware events from malicious input hardware events, thereby blocking resulting malicious output hardware events, such as, for... |
|
US20080159529 |
Identification System Using Mechanical Vibrations on Identifier
The invention relates to an identification system, wherein the identifier is a body comprising an inhomogeneous material, which body is identified by subjecting it to mechanical vibrations, in... |
|
US20090089876 |
APPARATUS SYSTEM AND METHOD FOR VALIDATING USERS BASED ON FUZZY LOGIC
An apparatus, system, and method are disclosed for validating users based on fuzzy logic. An interface with security questions is presented to a user who requires authentication. A typical... |
|
US20100319068 |
METHOD AND SYSTEM FOR PERFORMING DELEGATION OF RESOURCES
A method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated... |
|
US20110231317 |
SECURITY SENSITIVE DATA FLOW ANALYSIS
A system and method for security-aware data flow analysis are described. In various embodiments, a system analyses relationships between users, roles, tasks, and data objects, and permissions set... |
|
US20100250988 |
VIDEO DISPLAY SYSTEM, DISPLAY DEVICE, PLUG-IN MODULE AND POWER CONTROL METHOD OF PLUG-IN MODULE
It provides a video display system capable of effective control of power consumption, safe power-off operation, and resetting from a hang-up state by properly setting power supply to a plug-in... |
|
US20080216172 |
SYSTEMS, METHODS, AND APPARATUS FOR SECURE TRANSACTIONS IN TRUSTED SYSTEMS
Systems, methods, and software for protecting the identities of individuals, groups, and organizations are provided. In one embodiment, the systems, methods, and software provided by the present... |
|
US20120246718 |
Method and System for Implementing Collaboration and Crowd-Sourced Distribution on a Content Management System
Systems and methods are provided for delegating permissions of a content provider for a content item to a delegate. In a graphical interface, a content selection input is configured to receive a... |
|
US20080134298 |
Integrated development environment with community integration
Various technologies and techniques are disclosed for providing an intergrated development environment with community integration. A user specifies access settings to indicate that one or more... |
|
US20060168658 |
Protection of data to be stored in the memory of a device
A method for defining the rights of access to user-specific data to be stored in the memory (MEM) of a communication device (1), which communication device comprises a user-specific authentication... |
|
US20130291098 |
DETERMINING TRUST BETWEEN PARTIES FOR CONDUCTING BUSINESS TRANSACTIONS
Trust is calculated between persons for purposes of a business transaction. A measure of relative trust is determined for a target user with respect to a source user based on common entities that... |
|
US20110239293 |
AUDITING ACCESS TO DATA BASED ON RESOURCE PROPERTIES
Described is a technology, such as implemented in an operating system security system, by which a resource's metadata (e.g., including data properties) is evaluated against an audit rule or audit... |
|
US20080115211 |
Methods for binding content to a separate memory device
A method for accessing content is provided. In this method, information from a first memory device is retrieved. A parameter is generated based on the information and an account on a second memory... |
|
US20130125234 |
IMAGE FORMING APPARATUS, IMAGE FORMING APPARATUS CONTROL METHOD, AND STORAGE MEDIUM STORING PROGRAM
The history of the output destination of a job is displayed, and selection of a send destination in the history by a user is accepted. It is determined whether the user has an authority to... |