At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
COMPLIANT AUTHENTICATION BASED ON DYNAMICALLY-UPDATED CRTEDENTIALS
A system, method and a computer-readable medium for authenticating a user in a live manner in non-face-to-face transactions, including a user downloading an...
PROVIDING A SECURITY MECHANISM ON A MOBILE DEVICE
Disclosed are methods, apparatus, systems, and computer program products for providing a security mechanism on a mobile device before performing an action on a...
Method for safeguarding a network
A method for safeguarding a network made up of at least one first device and one second device. The first device derives a first challenge from physical...
INFORMATION PROCESSING SYSTEM AND AUTHENTICATION METHOD
An information processing system includes a service utilizing device and at least one information processing device to provide a service for the service...
EMBEDDED EXTRINSIC SOURCE FOR DIGITAL CERTIFICATE VALIDATION
A computer uses the information included within a digital certificate to obtain a current date and time value from a trusted extrinsic trusted source and the...
MANAGEMENT METHOD AND ARRANGEMENT FOR OUTPATIENT ELECTROCARDIOGRAPHY ON A
A management method for outpatient electrocardiography on a patient using an ECG recorder, an administration network, a first mobile device and at least one...
METHOD AND APPARATUS FOR ENABLING SECURED CERTIFICATE ENROLLMENT IN A
HYBRID CLOUD PUBLIC KEY INFRASTRUCTURE
In a method a public key infrastructure (PKI) device receives a certificate signing request (CSR) and an identity assertion cryptographically bound to an end...
STEP-UP AUTHENTICATION FOR SINGLE SIGN-ON
A method for authenticating a user seeking access to first and second resources that have different authentication levels. The method includes receiving a...
CONTINUOUS MULTI-FACTOR AUTHENTICATION
Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication...
MULTIPLE INPUT BASED PASSWORDS
A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method...
DATA PROCESSING SYSTEM, DATA PROCESSING APPARATUS AND LOG IN METHOD
A data processing system including a data processing apparatus, includes a user data storing unit that stores user data of a user who uses a first service, the...
Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new...
AGGREGATE SERVICE WITH USER INTERFACE
One embodiment provides a method, including: receiving authentication input, at a device, that is sent to an aggregate service device; requesting file system...
The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The user can use movements or gesture that...
System And Method For Providing A Content Delivery Network Via A Motor
A cache server disposed in a motor vehicle receives and caches content from a content distribution network when a load of a cellular link to the content...
PASSWORD-LESS AUTHENTICATION SYSTEM AND METHOD
A processor-implemented method for authenticating a login without a password. The method includes: receiving a request to authenticate a login, the request...
AUTHENTICATING DATA TRANSFER
In an embodiment, a method for authenticating data transfer is provided. A user-agent is redirected between an enterprise, an intermediary platform, and an...
System and Method for Providing Security Monitoring
The present disclosure describes systems and methods for processing security sensor data that enhances the ability of a user to quickly and efficiently review...
A Method and Apparatus for Anonymous and Trustworthy Authentication in
Pervasive Social Networking
A method for anonymous authentication may comprise: issuing token information to a first node registered with a network entity, wherein the token information...
METHOD AND APPARATUS FOR CONNECTING A COMMUNICATION DEVICE TO A DEPLOYABLE
NETWORK WITHOUT COMPROMISING...
A method and apparatus is provided for connecting a communication device to a deployable system. The deployable system obtains at least one deployable key...
AGGREGATE SERVICE WITH ENHANCED CLOUD DEVICE MANAGEMENT
One embodiment provides a method, comprising: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at an...
AGGREGATE SERVICE WITH ENHANCED REMOTE DEVICE MANAGEMENT
One embodiment provides a method, including: receiving, from a client device, a request by a user to access an aggregate service device; authenticating, at the...
SYSTEMS AND METHODS FOR CLOUD DATA SECURITY
Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider ("SSP")...
PREVENTING PERSISTENT STORAGE OF CRYPTOGRAPHIC INFORMATION USING SIGNALING
Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore,...
DIRECTORY SERVICE DEVICE, CLIENT DEVICE, KEY CLOUD SYSTEM, METHOD THEREOF,
Name information which is generated by using a value corresponding to a decryption key and address information of a key cloud device which provides a cloud-key...
RESUMPTION OF PLAY FOR A CONTENT-DELIVERY SESSION
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the...
Technologies for Secure Inter-Virtual Network Function Communication
Technologies for secure inter-virtual network function communication include a computing device to determine a cryptographic key for secure communication over...
OFF-HOST AUTHENTICATION SYSTEM
An off-host authentication system includes an authentication information handling system (IHS) that is coupled to a network. The off-host authentication system...
METHOD AND SYSTEM FOR ENCRYPTED COMMUNICATIONS
Method and device of encrypting communication between a server and a peripheral device are disclosed. The method includes: a server receiving a session request...
RESOURCE LOCATORS WITH KEYS
Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and...
SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED
Controlling access to position information at a receiver, or at another device external to the receiver. Various considerations, including a requested service...
INVISIBLE TWO FACTOR AUTHENTICATION AND INCREMENTAL DYNAMIC DATA
In an example embodiment, invisible two factor authentication is performed by receiving, at a first machine, a registration request from a second machine, with...
ROAMING CONTENT WIPE ACTIONS ACROSS DEVICES
Content on a device is encrypted and protected based on a data protection key. The protected content can then be copied to cloud storage, and from the cloud...
TELECOMMUNICATION METHOD FOR SECURELY EXCHANGING DATA
The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer...
SCRAMBLING BUSINESS DATA
Methods and system are disclosed that scramble business data before transferring to a test environment. In one aspect, a business data scrambling logic may...
PRIVACY PROTECTED INTERNET NETWORKS, SUBNETWORKS AND SUB-SUBNETWORKS
A computerized methods and systems to create, control and manage restricted scope and closed internet interactive networks, subnetworks and sub-subnetworks....
TRUSTED DEVICE CONTROL MESSAGES
Two endpoint devices communicate with one another in a secure session using a secure protocol. Trusted control messages are passed upstream from one of the...
MASKING DATA WITHIN JSON-TYPE DOCUMENTS
A method comprising using at least one hardware processor for: receiving input from a user with respect to masking of a data element in one or more documents...
METHOD AND SYSTEM FOR VPN ISOLATION USING NETWORK NAMESPACES
One embodiment of the present invention provides a system for providing exclusive access to a virtual private network (VPN) connection to an authorized...
Proxy Forwarding of Local Traffic by Edge Devices in a Multi-Homed Overlay
Virtual Private Network
A first provider edge network device that is configured in a multi-homed virtual private network for a data center in which there are one or more peer edge...
METHOD AND SYSTEM FOR AUTONOMOUS RULE GENERATION FOR SCREENING INTERNET
A computer system for evaluating transactions in a network includes a storage medium, one or more processors coupled to said storage medium, and computer code...
SECURITY SERVICES FOR END USERS THAT UTILIZE SERVICE CHAINING
Embodiments described herein provide security for end users of User Equipment (UE) that utilize service chaining for Service Data Flows (SDFs). One embodiment...
METHOD AND APPARATUS FOR DISPLAYING HTTPS BLOCK PAGE WITHOUT SSL
The present disclosure discloses a method and system for displaying an HTTPS block page without SSL inspection. Specifically, a network device snoops a first...
HIGHLY SECURE FIREWALL SYSTEM
A firewall system with closed ports configured to reject the data packets and create a readable log of rejected data packets. A port listening processor...
FIREWALL BASED PREVENTION OF THE MALICIOUS INFORMATION FLOWS IN SMART HOME
A system for preventing malicious attacks on a device in a Smart Home network comprises logical circuitry suitable to compare information flows in said network...
Front End Processor for Short Message Service Centers
A communication gateway which includes a short-message-system network element is disclosed. The communication gateway includes a short-message-system network...
Identifying Port Misconnections On A Network Device
Identifying port misconnections on a network device is disclosed. In an embodiment, host-to-port configuration data for a second network device is received at...
Optimization of Resource URLS in Machine-to-Machine Networks
A mechanism for forming and using shortened Uniform Resource Locators or URLs for resources available within a Machine-to-Machine, M2M, network enables the use...
RECLAIMING LEASED IP ADDRESSES IN WIRELESS NETWORKS
Methods, systems and computer readable media for reclaiming DHCP leased IP address from disassociated clients in a WLAN are described.
DISTRIBUTED INDUSTRIAL CONTROL MONITORING AND MANAGEMENT
An industrial control system provides for a bottom-up configuration and incremental growth in size and complexity without requiring system-specific programming...