Match Document Document Title
RE45532 Mobile host using a virtual single account client and server system for network access and management  
A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password,...
9043872 Selective management controller authenticated access control to host mapped resources  
An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes...
9043934 System, method, and device for delivering communications and storing and delivering data  
A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded...
9043632 Security enclave processor power control  
An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more...
9043870 Automated sign up based on existing online identity  
An automated system for signing up users invited to join a site based on their existing identity includes an invitation generator, an invite processor, a federated authentication module, a user...
9042608 Data security system  
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior to responding to the user request for...
9043882 Integration of home security into existing infrastructure  
Embodiments relate to administering access to a wireless network by detecting a connective proximity of a device to the network, determining that the device is an authorized device based on...
9041812 Automated authorization to access surveillance video based on pre-specified events  
Real-time access by a requestor to surveillance video is conditionally pre-authorized dependent on the existence of at least one pre-specified automatically detectable condition, and recorded in a...
9043891 Preserving privacy with digital identities  
A privacy-preserving identity system is described herein that combines low disclosure tokens with an identity metasystem to allow proof of a user's identity and other claims about the user in a...
9043935 Techniques for personalizing content  
Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the...
9043400 Instantaneous recommendation of social interactions in a social networking system  
As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is...
9043871 Method for operating invisible system services on android platform  
A method for operating an invisible system service on Android platform is disclosed. The method for operating system services on Android platform includes selectively registering a created system...
9043866 Security systems and methods for encoding and decoding digital content  
Systems and methods may be provided for masking data on public networks. At a publishing node, the system may monitor data input fields in a webpage, and intercept and encode content, such as...
9043884 Autonomic network protection based on neighbor discovery  
In one implementation, security configuration is automated based on information gathered using autonomic neighbor discovery. The neighbor discovery establishes a realm of trust between neighbors,...
9036172 Image forming apparatus, image forming method, and storage medium  
An image forming includes a predetermined-act acquisition unit, an output control unit, and an image forming unit. The predetermined-act acquisition unit is configured to obtain a predetermined...
9038140 Integrated collaboration environment  
Described herein is a technology for facilitating the integration of a collaboration environment. In some implementations, an activity associated with a business object is accessed via a work...
9038133 Self-authenticating of chip based on intrinsic features  
Embodiments of the present invention provide an authenticating service of a chip having an intrinsic identifier (ID). In a typical embodiment, an authenticating device is provided that includes an...
9038152 Access to resources  
A method performed by one or more processing devices, comprising: receiving a request for a quick response code associated with the hosted resource; generating a reference code that references...
9038156 Automatic sign in of a user at multiple endpoints  
The present disclosure is directed to methods and systems for user registration, where a user is logged in to a first device in communication with a server, including: receiving an anonymous...
9038158 Systems and methods for enforcing geolocation-based policies  
A computer-implemented method for enforcing geolocation-based policies may include (1) identifying a request from a computing system to access a computing resource, (2) identifying a public key...
9038132 Bus monitoring security device and bus monitoring security system  
A bus monitoring security device is connected to a bus, which includes a tool side bus having a tool connection terminal and an ECU side bus. The ECU side bus is coupled with an ECU, and the tool...
9038130 Sensor aware security policies with embedded controller hardened enforcement  
An information handling system (IHS) performs security policy enforcement using security policy data maintained in an embedded controller, which operates within a privileged environment. The...
9038168 Controlling resource access based on resource properties  
Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from...
9037844 System and method for securely communicating with electronic meters  
An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link...
9038134 Managing predictions in data security systems  
A. method is used in managing predictions in data security systems. An authentication request is received from an entity for access to a computerized resource. A predictor is determined based on...
9038194 Client-side encryption in a distributed environment  
Methods and systems for encrypting and decrypting data are described. In one embodiment, a client computing system sends to a server computing system over a network a first network request to...
9032493 Connecting mobile devices, internet-connected vehicles, and cloud services  
A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle...
9032476 Secure authentication  
Technologies are generally described for secure authentication tokens that employ hardware public physically unclonable functions. Each unique token can be implemented as hardware such that...
9032508 Pattern password trajectory configuration system and method using the same  
A pattern password trajectory configuration system used in an electronic device with a graphics input interface and a method using the same are provided. The disclosed pattern password trajectory...
9032209 Optical network terminal management control interface-based passive optical network security enhancement  
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical...
9032477 Automatic software update on network devices  
A method may include contacting, by a network device, another device to obtain at least one of a network address, authentication, or authorization, receiving, from the other device, software...
9032487 Method and system for providing service access to a user  
A method and system for providing service access to a user, includes the steps of: a) Registering a local identity provider located in al local network at a global identity provider with a local...
9027088 Systems and methods for protection of a SIP back-to-back user agent on modems  
Systems and methods are provided for authenticating Internet Protocol (IP) Multimedia Subsystem (IMS) applications in a User Equipment (UE). A method includes: receiving a first Session Initiation...
9027080 Proxy access to a dispersed storage network  
A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory. The method...
9027120 Hierarchical architecture in a network security system  
A network security system having a hierarchical configuration is provided. In one embodiment the present invention includes a plurality of subsystems, where each subsystem includes a plurality of...
9027081 Secure network connection allowing choice of a suitable security algorithm  
The invention provides for a method for use in a mobile radio communications device network connection procedure and including the step of, at a network, sending to a mobile radio communications...
9026456 Business-responsibility-centric identity management  
One embodiment of the present invention provides a system for managing business responsibilities. During operation, the system receives a user request for a business responsibility and forwards...
9027151 Inhibiting denial-of-service attacks using group controls  
A sandbox tool can cooperate with components of a secure operating system (OS) to create an isolated execution environment for accessing content without exposing other processes and resources of...
9027118 Image processing apparatus, control method, and computer-readable storage medium for computer program  
An image processing apparatus performs specific processing on images read out of a document having pages as follows. Each of the pages is a member assigned to at least any one of groups. The...
9027090 Network system and information processing method  
A network system includes first information processing apparatus and a second information processing apparatus that are connected through a network. The first information processing apparatus...
9027079 Method and system for dynamic security using authentication servers  
Disclosed is a method and system for network access control, including an authentication proxy that authenticates different access-points, retrieves data from security databases and from Network...
9024974 Augmented reality system, apparatus and method  
Information technology tools can be provided to manage access by a plurality of attendees through a network to a presentation. Each of the attendees is registered with an associated content access...
9027082 Handling of public identities  
The invention relates to a subscriber data entity, method and a computer program product for defining a first record including a wildcarded public user identity covering plurality of public user...
9026597 Messaging enhancements  
In some embodiments, techniques for electronic messages may include various enhancements.
9021598 Managing application events  
Systems, methods, and computer-readable media for managing application events are provided. In embodiments, a notifier is received that indicates a usage of an application installed on a user...
9021550 Optimization of workflow access control  
A computer-implemented method for executing a workflow is described, wherein the workflow comprises a set of individual activities, the method comprising the operations of deriving a global...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9021558 User authentication based on network context  
Example systems and methods of user authentication based on network context are presented. In one example, a command to authenticate a user of a computing device is received in response to a...
9021553 Methods and apparatus for fraud detection and remediation in knowledge-based authentication  
Methods and apparatus are provided for fraud detection and remediation in knowledge-based authentication (KBA). A knowledge-based authentication method is performed by a server for restricting...
9020149 Protected storage for cryptographic materials  
Disclosed are various embodiments for obtaining a service request from a client, the service request including plaintext data to be encrypted and associated metadata. Ciphertext data is generated...