At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
TECHNIQUES FOR DATA SECURITY IN A MULTI-TENANT ENVIRONMENT
The usage of data in a multi-tenant environment can be controlled by utilizing functionality at the hypervisor level of various resources in the environment....
WEBSITE ACCESS CONTROL
A method of controlling access to content such as web sites on the intranet or interne is described. For example, the method comprises receiving an address of...
IDENTITY MANAGEMENT AND AUTHENTICATION SYSTEM FOR RESOURCE ACCESS
A system that authorizes access to a resource by a client validates the client and generates a Security Assertion Markup Language ("SAML") assertion for the...
System, method and computer program product for using opinions relating to
trustworthiness to block or allow access
A system, method and computer program product are provided. After identifying a computer readable item, at least one opinion relating to the trustworthiness of...
SYSTEMS AND METHODS FOR PROVIDING IOT SERVICES
Provided is a method for subscribing to a data feed from an internet of things ("IoT") device. The method comprises obtaining, by a subscribe application...
PRIVACY LIST SNAPSHOT
Exemplary methods, apparatuses, and systems receive a request from a first user of a social networking system, during a first time period, to share a content...
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for...
Method for Controlling Contents and Electronic Device Thereof
The present disclosure relates to a sensor network, Machine Type Communication (MTC), Machine-to-Machine (M2M) communication, and technology for Internet of...
Secure Remote Authentication of Local Machine Services Using a Self
Discovery Network Protocol
A method for secure remote authentication of a computing device over a network that uses a communications protocol which does not require use of an address,...
Distributed Storage and Distributed Processing Query Statement
Reconstruction in Accordance with a Policy
A non-transitory computer readable storage medium has instructions executed by a processor to receive a query statement. The query statement is one of many...
SECURELY AUTHORIZING ACCESS TO REMOTE RESOURCES
Methods and an apparatus are provided for securely authorizing access to remote resources. For example, a method is provided that includes receiving a request...
COMMUNICATION SYSTEM, CONTROL INSTRUCTION APPARATUS, COMMUNICATION CONTROL
METHOD AND PROGRAM
A control execution apparatus is provided with a communication unit that makes an inquiry concerning a packet processing method with respect to a predetermined...
IDENTITY VERIFYING METHOD, APPARATUS AND SYSTEM, AND RELATED DEVICES
The invention discloses an identity verifying method, apparatus and system, and related devices so as to improve the security and universality of identity...
SYSTEMS AND METHODS FOR ESTABLISHING OWNERSHIP AND DELEGATION OWNERSHIP OF
IOT DEVICES USING DOMAIN NAME SYSTEM...
Provided is a method for establishing ownership of a component of an internet of things ("IoT") device. The method comprises receiving, at a registration...
SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTS
Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that...
IDENTIFICATION METHOD OF AN ENTITY
The present invention relates to identification method of an entity executed by an identification system from indexed distance data (d.sub.1, . . . , d.sub.n)...
MOBILE DEVICE TO PROVIDE CONTINUOUS AND DISCRETE USER AUTHENTICATION
Disclosed is a mobile device to provide continuous and discrete user authentication. The mobile device may include: a contextual sensor; a soft biometric...
INFORMATION SECURITY SYSTEM IN SMART MOBILE ENVIRONMENT
Provided is a security communication method of a terminal device. A first authentication unit of the terminal device identifies a first subscriber to connect a...
Utilizing X.509 Authentication for Single Sign-On Between Disparate
An authentication scheme may be utilized for a single sign-on operation between servers. One or more servers (e.g., a SHAREPOINT server) receives a data...
INFORMATION PROCESSING SYSTEM, CONTROL METHOD OF INFORMATION PROCESSING
APPARATUS, AND STORAGE MEDIUM
There are provided a beacon authentication API that obtains identification information of a terminal and performs authentication if a resource is provided to...
AUTHENTICATION SERVER TESTING METHOD AND SYSTEM
A method and a system for testing an authentication server. The method comprises: installing a certificate of an authentication server to be tested in a...
PROXY AUTHENTICATION FOR SINGLE SIGN-ON
In an example, a web gateway is described, including an authentication proxy engine (PAE). The PAE authenticates a user device via, for example, a username and...
Transferring Web-Application Prerequisite Files While Authentication
Interface Occludes Web-Application Interface
A web browser sends to a web-application server a request to access a web application. The web server transmits to the web browser a parent document with an...
MANAGING SHARING OF WIRELESS NETWORK LOGIN PASSWORDS
Managing sharing of wireless network login passwords is disclosed, including: receiving from a terminal an authentication request to authenticate a wireless...
Secure Network Access Processing Method and Apparatus
Provided are a method and device for accessing a secure network. The method includes that: a new node which intends to access a secure network triggers a...
DYNAMIC ADJUSTMENT OF AUTHENTICATION MECHANISM
According to one aspect of the present disclosure, a method and technique for dynamic adjustment of authentication mechanism is disclosed. The method includes:...
AUTHENTICATION AND PAIRING OF DEVICES USING A MACHINE READABLE CODE
An MR code is generated within a browser on a client device and is read by a mobile application on a mobile device. A communication channel is then established...
SYSTEM AND METHOD FOR PREVENTING UNAUTHORIZED ACCESS TO RESTRICTED
COMPUTER SYSTEMS THROUGH THE USE OF A...
A method and system for automatically terminating a logout session for a restricted access system by determining that an authorized user has left the vicinity...
SECURE AUTHENTICATION AND SWITCHING TO ENCRYPTED DOMAINS
A device and method for switching to an encrypted domain requiring authentication in an operating system which implements a plurality of secure domains. An...
HIERARCHICAL DATA SECURITY
A computing system comprises, in one example, a user interface component configured to generate a data security configuration interface that displays user...
METHODS FOR SECURE ENROLLMENT AND BACKUP OF PERSONAL IDENTITY CREDENTIALS
INTO ELECTRONIC DEVICES
A method and system for securely enrolling personal identity credentials into personal identification devices. The system of the invention comprises the...
User Authentication System and Method for Encryption and Decryption
A system configured to authenticate a user for encryption or decryption includes a user authentication apparatus, a computer-readable medium operable to...
SYSTEMS AND METHODS FOR REGISTERING, MANAGING, AND COMMUNICATING WITH IOT
DEVICES USING DOMAIN NAME SYSTEM...
Provided herein is a method for registering an IoT device with a DNS registry. The method can include obtaining, at a DNS server, an identifier, IP address,...
Low Latency Active Noise Cancellation System with Client
A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content...
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND
An information processing apparatus performs a communication using a wireless encryption method via an access point. A plurality of access points are displayed...
Implementation of an Integrity-Protected Secure Storage
An internal but not integrated security token is provided for a device which includes a first integrated circuitry including a secure processor. The security...
CRYPTOGRAPHIC SYSTEMS AND METHODS
Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment...
ONE-CLICK REPUTATION ADJUSTMENT
In an example, there is disclosed a monolithic reputation update on a data exchange layer (DXL). According to one embodiment, designating a set of objects as...
METHOD AND SYSTEM FOR ANALYZING A DATA FLOW
A method for analyzing a data flow includes extracting packet information of a packet of the data flow, determining the status of the packet and the status of...
PROVIDING A FAST PATH BETWEEN TWO ENTITIES
The present disclosure combines Software Defined Networks (SDN) concepts with Security concepts. The coordination between SDN and Security provides a myriad of...
METHOD AND APPARATUS FOR AUTOMATIC COMPLETION OF AN ENTRY INTO AN INPUT
An apparatus for automatic completion of an entry into an input field is provided. The apparatus may include a webpage. The webpage may include a search box....
METHOD, DEVICE, AND SYSTEM FOR MONITORING A SECURITY NETWORK INTERFACE
The invention relates to a method for monitoring a security network interface unit (23), FIG. 2 for example a firewall, which receives a stream of data packets...
COMMUNICATION CONTROL METHOD, COMMUNICATION NODE, AND MOBILE NODE
A technique is disclosed in which an MN (mobile node) 100 notifies, to a CN (correspondent node), home network connection information indicative of whether or...
CLIENT AND SERVER GROUP SSO WITH LOCAL OPENID
A user of a mobile communications device may access services in a target domain using a source domain identity that is used to access services in a source...
UNIQUE DEVICE ADDRESS ASSIGNMENT TECHNIQUE FOR BIDIRECTIONAL DAISY CHAIN
Devices, systems and methods are disclosed for assigning unique addresses to slave devices in a system comprising a host controller and multiple slave devices...
TECHNIQUES FOR GROUP-BASED SPATIAL STREAM ASSIGNMENT SIGNALING IN 60 GHZ
Techniques for group-based spatial stream assignment signaling in 60 GHz wireless networks are described. According to various such techniques, a 60...
Method, Device and System for Processing Network Address, WLAN and UE
Provided are a method, device, system for accessing a network address, WLAN and UE. The method comprises: a trusted WLAN access network acquires a flow routing...
Method, device and system for implementing address sharing
Provided are a method, device and system for implementing address sharing. An address pool configured for unified management over IP addresses is configured on...
MANAGING NETWORK COMPUTING COMPONENTS UTILIZING REQUEST ROUTING
Aspects of the disclosure will be described with regard to the processing of a client computing device DNS queries by a DNS processing service to determine an...
ADVANCED DATING WEBSITES
Social websites, such as dating websites, are provided with advanced features. For example, a dynamic telephone number generator is provided that may be...