Match
|
Document |
Document Title |
|
US20150178510 |
METHOD AND SYSTEM FOR CHILD AUTHENTICATION
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic communications between a first child and a... |
|
US20110035799 |
METHOD AND SYSTEM FOR CHILD AUTHENTICATION
Methods and systems for child authentication are described. In one embodiment, a communication enablement request may be received to enable electronic communications between a first child and a... |
|
US20140215604 |
AUTOMATED ROLE ADJUSTMENT IN A COMPUTER SYSTEM
An embodiment of the invention is associated with a system having a role for controlling user access, the role comprising users, permissions, and a set of rules. The embodiment records each of a... |
|
US20140215603 |
AUTOMATED ROLE ADJUSTMENT IN A COMPUTER SYSTEM
An embodiment of the invention is associated with a system having a role for controlling user access, the role comprising users, permissions, and a set of rules. The embodiment records each of a... |
|
US20140150093 |
ELECTRONIC MODULE FOR MAKING A MESSAGE ACCESSIBLE TO A TARGETED OPERATING SYSTEM
An electronic module that includes means for determining an operating system targeted by a message received by a transmitter-receiver of an electronic device, from among at least a Rich-OS... |
|
US20130031624 |
APPLICANT SCREENING
A system of screening servers, screener client computers, and screening kiosks distribute an applicant screening process among multiple sites and multiple participants. To facilitate and secure... |
|
US20110055919 |
System and Method for the Designation of Items in a Virtual Universe
The present invention enables items in a Virtual Universe to be tagged as available for pickup by one or more designated users. The present invention permits a designated user to be alerted that... |
|
US20120240224 |
SECURITY SYSTEMS AND METHODS FOR DISTINGUISHING USER-INTENDED TRAFFIC FROM MALICIOUS TRAFFIC
Security systems and methods distinguish user-intended input hardware events from malicious input hardware events, thereby blocking resulting malicious output hardware events, such as, for... |
|
US20100031351 |
Security-activated production device
Methods and systems for a security-activated production device include but are not limited to obtaining access to an object data file configured to produce one or more objects on the production... |
|
US20110215921 |
SYSTEMS FOR WIRELESS AUTHENTICATION BASED ON BLUETOOTH PROXIMITY
A method and apparatus for wireless authentication, secure automatic access to application and to systems and for providing an alarm to users upon detecting that a monitored device is not within a... |
|
US20110138461 |
EXECUTION ENVIRONMENT FILE INVENTORY
A method is described to maintain (including generate) an inventory of a system of a plurality of containers accessible by a computer system. At least one container is considered to determine... |
|
US20120047575 |
SYSTEMS AND METHODS FOR PERFORMING ACCESS ENTITLEMENT REVIEWS
Embodiments of the invention relate to risk assessments and, more particularly to performing access risk assessments based on identified outliers. |
|
US20100319068 |
METHOD AND SYSTEM FOR PERFORMING DELEGATION OF RESOURCES
A method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated... |
|
US20120030756 |
User Permissions In Computing Systems
A system and method of verifying accuracy of permission and access levels in a mainframe system are presented. The system and method may include receiving a plurality of records including a user... |
|
US20110055918 |
ACCESS CONTROL MODEL OF FUNCTION PRIVILEGES FOR ENTERPRISE-WIDE APPLICATIONS
Techniques are provided for access control in a system. A request is received for checking whether a subject has a privilege for a resource. A security class that defines a plurality of privileges... |
|
US20110004934 |
Computer Access Educational Tools System
Computers are currently often used for entertainment when they have been primarily provided to the user—often a child—primarily for education or work use. This invention aims to build in a gateway... |
|
US20130007878 |
CENTRALIZED LICENSING SERVICES
Methods and devices are provided for central management of licenses, particularly those relating to wagering games. A license proxy deployed in and/or dedicated to a gaming establishment may... |
|
US20100325724 |
SCOPE MODEL FOR ROLE-BASED ACCESS CONTROL ADMINISTRATION
Architecture that provides centrally located role-based administration where role assignments that are used to calculate scopes for each operation and create a filtered request that only returns... |
|
US20120246718 |
Method and System for Implementing Collaboration and Crowd-Sourced Distribution on a Content Management System
Systems and methods are provided for delegating permissions of a content provider for a content item to a delegate. In a graphical interface, a content selection input is configured to receive a... |
|
US20130247177 |
APPARATUS AND METHOD OF CONTROLLING PERMISSION TO APPLICATIONS IN A PORTABLE TERMINAL
An apparatus and method of controlling permission to an application in a portable terminal, the apparatus including a controller for, when requested for an invocation of a specific function... |
|
US20100088760 |
DEBUG SECURITY LOGIC
A system comprises debug logic usable to debug the system. The system also comprises processing logic capable of accessing the debug module using electronic signals. The system further comprises... |
|
US20110138460 |
SYSTEM AND METHOD FOR LOADING APPLICATION CLASSES
In an application, variants of a class may be generated and associated with different security permissions for the application. When a class is to be loaded, a determination is made as to the... |
|
US20110072513 |
PROVISIONAL ADMINISTRATOR PRIVILEGES
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system... |
|
US20130152194 |
SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES
A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit... |
|
US20110258698 |
Tailored System Management Interface
Processes and techniques for tailoring operations management in a system are described. The processes and techniques allow a user to customize operations management based on the user's function... |
|
US20110061102 |
License management server, license management method, and computer program product
A license management server connected to an MFP includes an activating unit that, upon receiving an application activation request from the MFP, accesses a license management DB, and, when the... |
|
US20110296523 |
ACCESS CONTROL MANAGEMENT MAPPING RESOURCE/ACTION PAIRS TO PRINCIPALS
The access control management technique described herein manages access control to one or more resources. Rather than mapping individuals or groups to permissions, the technique maps each... |
|
US20150089637 |
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system... |
|
US20110126282 |
System, Method and Apparatus for Simultaneous Definition and Enforcement of Access-control and Integrity Policies
Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system... |
|
US20100030982 |
BACKING UP DIGITAL CONTENT THAT IS STORED IN A SECURED STORAGE DEVICE
A third party facilitates preparation of a backup SSD for backing up a source SSD. Digital data of the source SSD, which includes protected and sensitive data and information, is copied to the... |
|
US20110078046 |
ENHANCED SUPPLIER CATALOG COLLABORATION
One embodiment of the invention includes a computer-implemented method for supplier update of a procurement system. The method includes providing a customizable procurement entity to a supplier,... |
|
US20110016510 |
SECRET INFORMATION MANAGEMENT APPARATUS, INFORMATION PROCESSING APPARATUS, AND SECRET INFORMATION MANAGEMENT SYSTEM
Secret key backup is safely implemented even if a role base access structure in which the access structure is specified using roles is used. An all combination generating unit 107 obtains a backup... |
|
US20130014252 |
PORTABLE COMPUTER ACCOUNTS
User accounts, authentication information and user home directories are stored on an external storage media that can be transferred from one device to another. Measures are included for detecting... |
|
US20110072512 |
APPARATUS AND METHOD FOR PROVIDING COMMUNICATION SERVICE USING COMMON AUTHENTICATION
In an environment including a first service providing system and a second service providing system, the first service providing system forwards common authentication information received from a... |
|
US20140082723 |
ACCESS CONTROL TO OPERATING MODULES OF AN OPERATING UNIT
The invention relates to an operating unit (1) for a production plant (2). The operating unit (1) comprises an authorization receiving module (71) so as to receive authorization identifications... |
|
US20110276604 |
REPUTATION BASED ACCESS CONTROL
The reputation based access control system of the present invention allows or denies access to a requested controlled resource to a requesting subject based upon predetermined associations between... |
|
US20130247176 |
NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ACCESS RIGHTS UPDATE PROGRAM, ACCESS RIGHTS MANAGEMENT SYSTEM, AND ACCESS RIGHTS UPDATE METHOD
Provided is a non-transitory computer readable medium storing an access rights update program causing a computer to be executed as: an acquisition unit that acquires access rights update... |
|
US20070061881 |
Verifying identities
A sign is sent to a user of a system. Depending upon whether there is an indication received that the sign went to an address that is not associated with the user a level of authenticity is... |
|
US20120167158 |
SCOPED RESOURCE AUTHORIZATION POLICIES
Resource authorization policies and resource scopes may be defined separately, thereby decoupling a set of authorization rules from the scope of resources to which those rules apply. In one... |
|
US20140208419 |
User Authentication
Disclosed is a method for providing a user access to a computer system comprising a plurality of services and a plurality of authentication levels, the method comprising dynamically monitoring a... |
|
US20150101042 |
TAG BASED PERMISSION SYSTEM AND METHOD FOR VIRTUALIZED ENVIRONMENTS
A virtualized computing system includes a plurality of inventory objects and an access control subsystem that manages permissions to perform actions on the inventory objects using corresponding... |
|
US20140331316 |
Functionality Watermarking and Management
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes... |
|
US20140289846 |
FACILITATING REVIEW OF ACCESS RIGHTS IN A COMPUTING SYSTEM
Systems and methods for facilitating reviews of IAM information are described. A list of pending reviews of respective access rights of a computing system may be provided to a display device for... |
|
US20080178285 |
Provisional administrator privileges
A system grants “provisional privileges” to a user request for the purpose of provisionally performing a requested transaction. If the provisionally-performed transaction does not put the system... |
|
US20120066744 |
USER AUTHENTICATION AND ACCESS CONTROL SYSTEM AND METHOD
A system and method for permitting user access to a computer controlled device. A display device displays a group of items to the user. Some of the items are known to the user and some are unknown... |
|
US20120102567 |
Hybrid System Implementing Distinct and Co-existing Application Execution Environments and Methods for Implementing the Same
A hybrid system is provided. The system includes a computing device implementing a first application execution environment (AEE) and a second AEE. The first AEE is configured to be isolated from... |
|
US20110071811 |
USING EVENT CORRELATION AND SIMULATION IN AUTHORIZATION DECISIONS
Performance impacting operations (e.g., maintenance operations) performed on a system can, depending on a current state of the system, heavily impact the performance of the system, thus affecting... |
|
US20120254992 |
Providing greater access to one or more items in response to determining device transfer
A computationally implemented method includes, but is not limited to: determining that a computing device associated with a first user and that was in possession of a second user has been... |
|
US20140173720 |
SYSTEM AND METHOD FOR CONTROLLING THE ON AND OFF STATE OF FEATURES AT RUNTIME
Methods and systems are provided for turning on and off features at run time. The method includes providing a unique enabling predicate (e.g., an “if enabled” statement) for one or more executable... |
|
US20090150986 |
User Authorization Using An Automated Turing Test
Methods, apparatus, and products are disclosed for user authorization using an automated Turing Test that include: selecting, by an automated Turing Test module, a challenge token, the challenge... |