At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Dynamic authorization in a multi-tenancy environment via tenant policy
In one example, a method for managing user access includes creating a set of user characteristics for authorization of a user. The user characteristics are...
Internet of things security
Apparati, methods, and computer-readable media for improving the security of communications networks. An embodiment of the present invention is a system for...
Enhanced communication platform and related communication method using the
Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at...
Method and system for determining and sharing a user's web presence
A method and system for determining and sharing a user's web presence have been disclosed. According to one embodiment, a computer implemented method comprises...
Trust/value/risk-based access control policy
Generating a resource access control decision is provided. A user trust value associated with a user identifier of a user requesting access to a protected...
Disabling administrative access to computing resources
Disclosed are various embodiments for disabling administrative access to computing resources. A customer request is obtained to disable administrative access of...
One step security system in a network storage system
This is directed to providing access to content stored on a local cloud. In particular, a device can direct a librarian service overseeing the operation of a...
Access policy based on collaboration participation
According to example configurations as described herein, an on-line conference management application receives an indication of multiple participants that...
Hybrid cloud identity mapping infrastructure
In various exemplary embodiments, a system and associated method for providing a hybrid cloud computing environment are disclosed. For example, a system may...
Secured transmission of a sequence of data to be transmitted
A method for transmitting a sequence of data blocks to be transmitted includes: one first piece of authentication data and one second piece of authentication...
Secure data containers
Embodiments for providing secure data containers and allowing selective access to files stored in the containers include systems and methods that receive a...
Document distribution and interaction
A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document...
Processing method for piecing together fingerprint based on mobile
terminal and mobile terminal
A processing method for piecing together a fingerprint based on a mobile terminal and a mobile terminal are disclosed. The method includes: acquiring...
Fingerprint based smartphone user verification
A touch screen, now incorporated in most smart phones, presents an effective and transparent method to incorporate continuous active user verification schemes....
Streaming music using authentication information
Techniques provided herein may facilitate set-up of an audio system with audio content services that have been previously registered on a second system. An...
System and method for providing a service to end terminal that uses
authentication information of another...
The present invention relates to an end-point terminal that uses authentication information of another mobile communication terminal comprising a communication...
System and method for using credentials of a first client station to
authenticate a second client station
Described are methods that allow credentials of a first client station to authenticate a second client station. An exemplary method includes associating a first...
Secure time functionality for a wireless device
The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module...
System and method for changing security behavior of a device based on
proximity to another device
The security and convenience of a mobile communication device is enhanced based on a separate key device. If the key device is near the mobile communication...
Security-aware split-server passcode verification for one-time
Techniques are provided for security-aware split-server passcode verification for one-time authentication tokens. An exemplary method comprises receiving an...
Registration and network access control
In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface...
System and method of authenticating user account login request messages
A computer server receives a login request message sent by a remote terminal to access a user account. If the message includes a first login key, the server...
Computer network security management system and method
A computer network security management system is provided, in which a corporate computer network can be substantially separated from an external network because...
Host identity bootstrapping
Automated provisioning of hosts on a network with reasonable levels of security is described in this application. A certificate management service (CMS) on a...
Single sign-on method in multi-application framework
A method for permitting single sign-on to multiple independent applications in a single framework.
Role-based access tool
The tool to provide a role-based access tool is configured to receive a single sign-on login from a user; determine an identity of the user based on the single...
Serialized authentication and authorization services
Requests for User Services on networked computers running on different platforms with different Authentication, Authorization and Auditing (AAA) Security...
Method and apparatus for processing authentication request message in a
A method and an apparatus for processing an authentication request message in a social network are provided. To improve the inefficiency of existing technology...
Authorization and authentication based on an individual's social network
In particular embodiments, a method includes receiving a request for a first user to access a loan from a lender, the request identifying a user identifier (ID)...
System and method for intelligent workload management
The system and method for intelligent workload management described herein may include a computing environment having a model-driven, service-oriented...
Service access authentication method and system
An access authentication system for authenticating a subscriber of a service, the access authentication system comprising an operator access authentication...
Secure zone for secure purchases
An apparatus according to the present disclosure may comprise a secure zone configured to execute a task having a subtask. The task and subtask may have...
Secure desktop interface
An apparatus and system for providing a secure user interface restricting the access of users to selected functions, files, and communications by implementing a...
Protocol for controlling access to encryption keys
A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover...
Authentication engine and stream cipher engine sharing in digital content
A system for receiving and decrypting media content encrypted according to the HDCP protocol is described herein. A receiving device coupled to a plurality of...
Secure storage and sharing of user objects
Information objects model real-world objects or concepts that may be associated with users, such as vehicles, homes, people, animals, accounts, places, and the...
System and method to anonymize data transmitted to a destination computing
A method and system for anonymizing data is disclosed. Data to be anonymized is received by an anonymization system. A request for a data encryption key is...
Securing data in a dispersed storage network
A method begins by a source processing module securing data based on a key stream to produce secured data, where the key stream is derived from a unilateral...
System and method for secure end-to-end chat system
The present invention provides an efficient secure end-to-end messaging system utilizing encrypted ephemeral messages. The method comprises the steps of using a...
Automated token renewal using OTP-based authentication codes
One embodiment is described of a method performed by a computing device for renewing a remote token. The method includes (a) receiving an activation code from...
Secure communications using adaptive data compression
Aspects of the subject technology relate to systems, methods, and machine-readable media for communicating using adaptive data compression. A system is...
System and method for generating and managing product authentication codes
A method for generating product authentication codes comprises allocating a lot identification value and a total lot size for an order of a plurality of product...
Secure electronic device application connection to an application server
The present disclosure presents a system, method and apparatus for creating a secure tunnel between a mobile device and a server. The server can be configured...
Cloud-based multi-layer security architecture with firewalled virtual
A virtual network may include a web application firewall (WAF) portion to receive network traffic for one or more other portions of the virtual network; a first...
Native application single sign-on
In an example embodiment, a virtual private network (VPN) connection is established between a client device and an authentication service. Then a request is...
Trusted content distribution system
A trusted content distribution system is described comprising a trustworthy enduser device and a network management infrastructure, the enduser device being...
Proxy device for a network of devices
A proxy device for a network of devices may include memory, a device status module, a data intercept module, a network interface, and an emulation module. The...
Mechanism for distributed rate limiting
A method for distributed rate limiting is provided. The method includes detecting, in a first communication received by an application, a suspicious behavior,...
Data interaction method, apparatus, and system
A data interaction method is provided, which includes: sending simultaneously an address detection request for a UDP channel and an address detection request...
Network address assignment with duplication detection
Network storage system configuration via a network is disclosed. A network address assignment component is configured to listen for network discovery requests...