Match Document Document Title
9043598 Systems and methods for providing secure multicast intra-cluster communication  
Systems and methods which facilitate secure multicast communications between any valid node of a cluster using authentication between a node joining the cluster and any single node which is...
9037656 Method and system for facilitating interaction with multiple content provider websites  
A method and system for facilitating interaction between an electronic device and a plurality of content provider websites are disclosed. In one embodiment, the method includes receiving at a...
9038150 Provisioning device for performing provisioning of a field device  
There is provided a provisioning device which provides, in advance, setting information necessary for joining in a wireless network to a first field device which is to newly join the wireless...
9038192 Cryptanalysis method and system  
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
9032205 Robust authentication and key agreement protocol for net-generation wireless networks  
Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known...
9032501 Cryptographic protocol for portable devices  
Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a...
9027110 System and method for communication between dynamic token and tool  
The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a...
9026792 Establishing secure communication between an implantable medical device and an external device  
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9021265 Anonymity authentication method for global mobility networks  
An anonymity authentication method for global mobility networks is provided. When a mobile user (MN) roams from an inner network to an outer network, a random number is introduced for...
9021605 Method and system for protecting sensitive data in a program  
To protect sensitive data in program code, a method includes providing a programming interface with a capability of allocating a protected region of memory which can only be accessed by authorized...
9021566 Apparatus and method to securely connect to and manage X11 applications on a remote system through an HTTP client  
A web server authenticates a user with a web client using a database user table and provides a list of new applications, suspended application sessions, and running application sessions. In...
9015856 Mobile-device user authentication  
In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second...
9008309 Circuit arrangement and a method for roaming between a visited network and a mobile station  
According to various aspects of this disclosure, a circuit arrangement is provided. The circuit arrangement may include: a memory configured to store a first encryption key for generating a first...
9009479 Cryptographic techniques for a communications network  
Techniques are described for enabling authentication and/or key agreement between communications network stations and service networks. The techniques described include the negotiation and use of...
9003476 Communications security systems  
A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client computer receives one or more security...
9002007 Efficient, remote, private tree-based classification using cryptographic techniques  
A method and apparatus are disclosed herein for classification. In one embodiment, the method comprises performing tree-based classification of a user input by a classifier with a classification...
8996873 Secure session capability using public-key cryptography without access to the private key  
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake...
8988187 Proximity based biometric identification systems and methods  
Systems and methods which provide identification of a user in combination with mutual authentication between a user and identification host are shown. Embodiments further provide mutual...
8990568 Mobile device enrollment for online banking transactions  
Embodiments of the invention are directed to systems, methods and computer program products for enrolling a user in a device identification program. In some embodiments, a system is configured to:...
8990554 Network optimization for secure connection establishment or secure messaging  
A first device is configured to receive an instruction to establish a secure connection with a second device or to send a secure message to the second device. The instruction may include a secure...
8990555 Centralized key management  
A first network device is configured to receive a first request for a first secret key, generate the first secret key, and send the first secret key to a second network device and a first user...
8990569 Secure communication session setup  
A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based...
8984205 Data filter  
A system includes an interface with a plurality of sub-addresses. The interface receives critical data and non-critical data. The critical data are received only at more specific sub-addresses of...
8978115 Home realm discovery in mixed-mode federated realms  
The authentication of identities within a realm in which some identities are authenticated using direct authentication, and some identities are authenticated using federated authentication....
8977844 Smartcard formation with authentication keys  
An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes...
8973122 Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method  
A two-factor network authentication system uses “something you know” in the form of a password/Pin and “something you have” in the form of a key token. The password is encrypted in a secure area...
8965342 Method and apparatus for verifying the authenticity of mobile device information  
Methods and apparatus for verifying authenticity of device information of an end-user device are provided herein. In some embodiments, a method for verifying authenticity of device information of...
8966254 Keyless challenge and response system  
A confidential information exchange between a sender and a receiver may be conducted without the use of encryption keys. The information is coded with a Challenge-Response Table that is shared...
8966262 Methods and apparatus for delivering electronic identification components over a wireless network  
Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated...
8966255 Communication apparatus and communication system  
A communication apparatus including: a reception portion that receives identification information for a first apparatus to identify a second apparatus, and authentication information for the first...
8966592 Authenticating access to a private account at a public computing device  
A computer-implemented technique is presented. The technique can include selectively initiating, at a mobile computing device including one or more processors, communication between the mobile...
8964989 Method for adding nodes to a quantum key distribution system  
An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can...
8959346 System and method for a single request—single response protocol with mutual replay attack protection  
Various embodiments of a system and method for a single request-single response protocol with mutual replay attack protection are described. Embodiments include a system that receives multiple...
8959356 Double authentication for controlling disruptive operations on storage resources  
A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first...
8959341 Methods and systems for sharing database content  
Mechanisms and methods for sharing database content stored by a first organization with a third party are provided. A network address is provided to the third party, which can enable control of...
8955044 Time managed challenge-response test  
A method of generating a time managed challenge-response test is presented. The method identifies a geometric shape having a volume and generates an entry object of the time managed...
8955061 Information processing apparatus, authentication system, authentication method, and program  
An information processing apparatus for executing authentication processing, characterized by comprises: storage means for storing, in association with each other, an image, region information...
8955039 Mobile platform with sensor data security  
Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide...
8955098 Establishing network security using internet protocol security policies  
Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on...
8954759 Secure spin torque transfer magnetic random access memory (STTMRAM)  
A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the...
8955047 Method client and system for authentication of a low-security client and a high-security client in a mobile radio network  
A method for authentication of a high-security client and a low-security client in a high-security mobile radio network includes: transmitting a request for authentication from a base station to...
8954735 Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware  
A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database...
8949607 Digital data authentication  
A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a...
8949941 Geothentication based on network ranging  
A system, method, and apparatus for the authentication of the physical location of a target node are disclosed herein. In one or more embodiments, the authentication of the target node's physical...
8948382 Secure protocol for peer-to-peer network  
A wireless computing device operating as a controller of a peer-to-peer group configured to generate unique master keys for each device joining the group. The wireless computing device may use the...
8949605 Communication system, communication apparatus, communication method, and computer program  
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time. A content using apparatus...
8949596 Encryption-based session establishment  
A first server is configured to receive a first token from a user device, determine whether the first token is valid, request the user device to provide a set of credentials to a second server,...
8943561 Text message authentication system  
Systems and method for authenticating users are presented. A system can send a passkey to a user interface of a known device. A user can then send a messaging service message with the passkey from...
8935749 Method for wireless communication and wireless transmit/receive unit  
A method for wireless communications and a wireless transmit/receive unit are disclosed. At least one first wireless communication link with a base station for transmitting/receiving data packets...