At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
SECURE IDENTITY PROPAGATION IN A CLOUD-BASED COMPUTING ENVIRONMENT
The present disclosure describes methods, systems, and computer program products for providing secure identity propagation in a cloud-based computing...
METHOD AND APPARATUS FOR DISPLAYING USER INTERFACE IN ELECTRONIC DEVICE
A method for obtaining biometric information associated with a user of the electronic device from the electronic device is provided. The method includes...
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND
NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes an authenticating section, a detecting section, and a processor. The authenticating section authenticates a user....
AUTHENTICATING A DEVICE BASED ON AVAILABILITY OF OTHER AUTHENTICATION
An approach for authenticating a device is provided. The approach includes a computer implemented method for receiving a first stage biometric variable...
IDENTITY ASSERTION BASED ON BIOMETRIC INFORMATION
A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity...
TERMINAL DEVICE AND METHOD FOR PROTECTING TERMINAL DEVICE, AND TERMINAL
A terminal device includes: a condition checking unit to monitor an operation state of the terminal device by executing a terminal managing program, and...
METHOD AND APPARATUS FOR REGISTERING A DEVICE FOR USE
A server and method for supporting device registration by the server are provided. The present disclosure relates to a sensor network, Machine Type...
GENERALIZED CERTIFICATE USE IN POLICY-BASED SECURE MESSAGING ENVIRONMENTS
Within a secure messaging environment, a determination is made that a request to send a message has been generated by a message sender. A message protection...
SYSTEMS AND METHODS FOR SYSTEM LOGIN AND SINGLE SIGN-ON
Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected...
IDENTITY INFRASTRUCTURE AS A SERVICE
A method and system of an identity service to provide a single point of access for a plurality of applications for an authentication of a user identity. An...
Method of network identity authentication by using an identification code
of a communication device and a...
A method of network identity authentication uses an identification code of a communication device and a network operating password. The network operating...
System for Providing an Indication of the Validity of the Identity of an
Aspects of this disclosure relate to an identity level generating computer which may include a processor and memory storing computer executable instructions...
End-to-End Trusted Communications Infrastructure
A method establishing a trusted end-to-end communication link is disclosed. The method comprises executing a communication application in a trusted security...
Ad Hoc Communications
Ad hoc communications are established between unknown contacts. For example, in today's mobile communications environment, there are many instances in which a...
STRONG AUTHENTICATION VIA DISTRIBUTED STATIONS
In various embodiments, authentication stations are distributed within a facility, particularly in spaces where mobile devices are predominantly used--e.g., a...
Terminal Authentication Apparatus and Method
A terminal authentication apparatus and method. The method includes sending, by an authenticator, a media access control (MAC) address of a terminal to an...
IDENTITY MANAGEMENT SYSTEM
There is described a system for authenticating a client device in a network having a plurality of IDM components. One or more of the IDM components subscribes...
ELECTRONIC DEVICE, SERVER, ELECTRONIC DEVICE CONTROLLING METHOD,
INFORMATION PROCESSING METHOD AND RECORDING MEDIUM
An information processing device includes an interface configured to receive authentication information from an electronic device. The device also includes...
THIRD-PARTY DOCUMENTED TRUST LINKAGES FOR EMAIL STREAMS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for establishing third-party documented trust linkages. In...
Short-Range Device Interactions for Facilitating Partial Uses of Clustered
Systems and methods are provided for communication networks and network operations for processing partial uses of clustered access rights. The communication...
SECURE, UNTETHERED PROVISIONING AND TROUBLESHOOTING OF WIRELESS NETWORK
A wireless network device only installs configuration information that is wirelessly received from a provisioning device if the wireless network device...
STORAGE FOR ENCRYPTED DATA WITH ENHANCED SECURITY
Technologies described herein provide enhanced security for encrypted data. In some configurations, encrypted data may be generated at a client computing...
APPARATUS AND METHOD FOR A MULTI-ENTITY SECURE SOFTWARE TRANSFER
A method and a system embodying the method for a multi-entity secure software transfer, comprising, configuring a communication interface controller at each...
OFF-HOST AUTHENTICATION SYSTEM
An off-host authentication system includes a network. An off-host processing system is coupled to the network and sends an encrypted authentication item...
TUNNEL INTERFACE FOR SECURING TRAFFIC OVER A NETWORK
Methods and systems for a flexible, scalable hardware and software platform that allows a managed security service provider to easily provide security services...
INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND PROGRAM
An information processing apparatus includes first processing means for performing a setting for performing encrypted communication on the information...
Systems, Methods, and Media for a Cloud Based Social Media Network
System and methods for providing private social networks, which are cloud-based in some instances, are provided herein. A method includes receiving a selection...
DIGITAL RIGHTS MANAGEMENT FOR EMAILS AND ATTACHMENTS
A digital rights management (DRM) method for protecting emails can apply different protection policies to different components of an email such as the message...
SYSTEMS AND METHODS FOR MAINTAINING USER PRIVACY AND SECURITY OVER A
COMPUTER NETWORK AND/OR WITHIN A RELATED...
Systems and methods are provided to maintain the privacy of a user's actions and/or experiences on a computer network. The user's privacy is maintained by...
ASSOCIATING ANONYMOUS INFORMATION TO PERSONALLY IDENTIFIABLE INFORMATION
IN A NON-IDENTIFIABLE MANNER
The present disclosure provides a detailed description of techniques used in methods, systems, and computer program products for associating anonymous...
REACHING ANONYMIZATION SERVICE LEVELS THROUGH ADDED TRANSACTIONS
Methods, apparatuses, systems, and computer-readable media for an anonymization service level improvement system ("ALI") are described. One or more...
COMMUNICATION APPARATUS, CONTROL METHOD, AND NON-TRANSITORY
COMPUTER-READABLE STORAGE MEDIUM
A communication apparatus which performs communication in a wireless LAN by operating as a base station or a terminal station of the wireless LAN determines,...
STREAMING MEDIA FOR PORTABLE DEVICES
A system and method for allowing hand-held/wireless device devices to (1) provide audio/video conferencing; (2) access AV content through streaming and cloud...
TECHNIQUES TO AUTHENTICATE A CLIENT TO A PROXY THROUGH A DOMAIN NAME
Techniques to authenticate a client to a proxy through a domain name server intermediary are described. In one embodiment, for example, a client apparatus may...
PRIVATE AND SECURE COMMUNICATION SYSTEMS AND METHODS
Private and secure communication systems and methods implemented by a server in a local network behind a local router/firewall include authenticating a client...
Control of Out-of-Band Multipath Connections
An intermediate device (such as a firewall) is disposed between first and second devices (such as a client and a server device, respectively). Communications...
Preventing Browser-originating Attacks
A method and device for preventing a browser-originating attack in a local area network. A security device in the local area network intercepts a message from...
TRANSMISSION SYSTEM AND METHOD FOR NETWORK ADDRESS TRANSLATION TRAVERSAL
A transmission system and a transmission method for network address translation traversal are provided. The transmission system includes a private network...
SYSTEM AND METHOD FOR AUTOMATICALLY ADDRESSING DEVICES IN A MULTI-DROP
A system for assigning communications addresses within a network is provided. The system comprises a memory and at least one processor coupled to the memory....
SERVICE ADDRESSING IN DISTRIBUTED ENVIRONMENT
An example service addressing method in a distributed environment includes: generating a service querying request, the service querying request including a...
Routing to Multiple Diameter Peers with the Same Identity
Various exemplary embodiments relate to a method performed by a Diameter Routing Agent (DRA) for processing a Diameter message, the method including: providing...
MANAGING CONTENT DELIVERY NETWORK SERVICE PROVIDERS
A system, method, and computer readable medium for managing CDN service providers are provided. A network storage provider storing one or more resources on...
METHOD AND SYSTEM FOR AUTOMATIC PROVISIONING OF ENTERPRISE PRIVATE NETWORK
OVER 3G/4G MOBILE WIRELESS NETWORKS...
An intelligent mechanism to map the public user identity into the private user identity inside the mobile network is defined. The identity mapping logic...
ADDRESS RESOLUTION REWRITING
A network controller may rewrite an address resolution request and an address resolution response. The address resolution request may be rewritten by changing...
Secure Electronic Mail System
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may...
METHOD AND ELECTRONIC DEVICE FOR PROCESSING INTENT
A method of operating an electronic device includes segmenting a second message in a first message, allocating the segmented second message to at least two...
CUSTOM ENCODED MESSAGES AMONGST A CUSTOMIZED SOCIAL GROUP
A system and method for sending custom encoded messages amongst a customized social group. A selection of intended recipients within a subgroup from a list of...
IMAGE WITH AUDIO CONVERSATION SYSTEM AND METHOD UTILIZING SOCIAL MEDIA
A system and method are presented that use an existing social networking message system to allow interactive audio commentary concerning a visual image. Audio...
ELECTRONIC MAIL DELIVERY APPARATUS, ELECTRONIC MAIL DELIVERY METHOD, AND
PROGRAM STORAGE MEDIUM
Various embodiments prevent erroneous transmission of electronic mails and therefore forestall information leakage in an electronic mail delivery apparatus....
ITEM IMPORTANCE INDICATION
A method of operating a computerized device to indicate importance of messages to a user includes calculating importance scores for the messages based on...