СПИСОК патентов США - подгруппа МПК16 H04L9/32



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19609459Network tools for analysis, design, testing, and production of services
29609279Method and system for providing secure CODECS
39609024Method and system for policy based authentication
49608982Identity validation system and associated methods
59608978Relationship-based authorization
69608967Method and system for establishing a session key
79608849Method, system and apparatus for audio communication modulation mode self-adaptation and electronic signature token
89608829System and method for creating a multi-branched blockchain with configurable protocol rules
99608828Elongated physical unclonable function
109608827Memory cell with de-initialization circuitry
119608826System and method for partner key management
129608825Trusted platform module certification and attestation utilizing an anonymous key system
139608824Using digital fingerprints to associate data with a work
149608823Secure remote kernel module signing
159608822Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
169608821System and method for high performance secure access to a trusted platform module on a hardware virtualization platform
179608820Mobile terminal, restricting system and method of accessing an information using the mobile terminal
189608819Learning parity with noise-based relational encryption for proximity relations
199608818Cryptographic communication system and cryptographic communication method
209608805Encryption key generation
219608804Secure key authentication and ladder system
229608803Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption
239608634Toothed-rack physical unclonable function
249607300Multi-layer transaction tracking
259607180Information processing apparatus, control method for controlling the information processing apparatus in a maintenance mode, and storage medium
269607143Provisioning account credentials via a trusted channel
279607139Map-based authentication
289607135Asset protection based on redundantly associated trusted entitlement verification
299607131Secure and efficient content screening in a networked environment
309606967Tracing a document in an electronic publication
319606810Method and apparatus for replacing the operating system of a limited-resource portable data carrier
329604406Three-dimensional design and manufacturing systems
339603016Uniquely identifying a mobile electronic device
349602612Overlay networks for application groups
359602515Enforcing alignment of approved changes and deployed changes in the software change life-cycle
369602509Methods and systems for securely uploading files onto aircraft
379602507Virtual smart card to perform security-critical operations
389602506Method and apparatus for supporting login through user terminal
399602500Secure import and export of keying material
409602499Authenticating a node in a communication network
419602497Trusted and unsupervised digital certificate generation using a security token
429602487Method for the protected transmission of data
439602485Network, network node with privacy preserving source attribution and admission control and device implemented method therfor
449602483Adaptive method for biometrically certified communication
459602481Generation of short key for communications
469602478Trust relationships in a computerized system
479602473Secure message forwarding with sender controlled decryption
489602470Network device, IPsec system and method for establishing IPsec tunnel using the same
499602292Device-level authentication with unique device identifiers
509602291Secure connection certificate verification
519602290System and method for vehicle messaging using a public key infrastructure
529602289Steganographic embedding of executable code
539602288Enhanced data security through uniqueness checking
549602287Method and system for signed stateless data transfer
559602286Electronic device and method for extracting encrypted message
569602285Authentication device, authentication method, and program
579602284Secure offline authentication
589602283Data encryption in a de-duplicating storage in a multi-tenant environment
599602282Secure software and hardware association technique
609602281Parallelizable cipher construction
619602279Configuring devices for use on a network using a fast packet exchange with authentication
629602276Method and apparatus for virtual pairing with a group of semi-connected devices
639602275Server pool kerberos authentication scheme
649601120Working method of sound transmission-based dynamic token
659601016Communication system, vehicle-mounted terminal, roadside device
669600690Secure access for sensitive digital information
679600686Augmented reality based privacy and decryption
689600683Protecting data in insecure cloud storage
699600676Application-level wireless security for wearable devices
709600653Providing time ratio-based password/challenge authentication
719600651System and method for determining use of non-human users in a distributed computer network environment
729600508Data layer service availability
739600304Device configuration for multiple users using remote user biometrics
749600302Using a public key infrastructure for automatic device configuration
759596604Method and system for enhanced wireless network security
769596599Authentication for secure wireless communication
779596236Method for veryifying authorized signer for mobile device based document escrow service
789596227Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment
799596221Encryption of user data for storage in a cloud server
809596220Secure protocol for peer-to-peer network
819596097Apparatus and method for transferring network access information of smart household appliances
829596090Method for controlling data acquisition for a plurality of field devices
839596089Method for generating a certificate
849596088Systems and methods for biometric e-signature
859596087Token authentication for touch sensitive display devices
869596086Password-based authentication
879596085Secure battery authentication
889596084Initializing camera subsystem for face detection based on sensor inputs
899596082Secure debug trace messages for production authenticated code modules
909596078Set of servers for "machine-to-machine" communications using public key infrastructure
919595057Identity verification and authentication
929594923Data protection systems and methods
939594922Non-persistent shared authentication tokens in a cluster of nodes
949594893Multi-touch local device authentication
959594892User authentication method and apparatus based on electrocardiogram (ECG) signal
969594883Recording medium device, terminal device, distribution device, control method, and program recording medium
979594769Computing device configured with a table network
989591682Automatic password handling
999591483Authentication mechanisms for wireless networks
1009591480Method and device for secure communication of a component of a vehicle with an external communication partner via a wireless communication link
1019591097System and method for enabling pseudonymous lifelike social media interactions without using or linking to any uniquely identifiable user data and fully protecting users' privacy
1029591068Updating error recovery information in a dispersed storage network
1039591013Radio frequency fingerprint detection
1049590989Data access and anonymity management
1059590988Service location based authentication
1069590982Proximity based dual authentication for a wireless network
1079590975Efficient network layer for IPv6 protocol
1089590963System and method for key management for issuer security domain using global platform specifications
1099590962Using cookies to identify security contexts for connectionless service
1109590959Data security service
1119590955Methods and systems for providing information relating to an event
1129590949Confidential message exchange using benign, context-aware cover message generation
1139590810Device security
1149590809Method for operating a mobile device by means of a motor vehicle
1159590808Obfuscated passwords
1169590805Ladder-based cryptographic techniques using pre-computed points
1179590804Identification information generation device and identification information generation method
1189589406Key device and associated method, computer program and computer program product
1199589397Securing internet of things (IoT) based entrance/exit with multi-factor authentication
1209589309Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
1219589268Integration of payment capability into secure elements of computers
1229589154Programming on-chip non-volatile memory in a secure processor using a sequence number
1239589153Securing integrity and consistency of a cloud storage service with efficient client operations
1249589144System and method for cryptographic suite management
1259589143Semi-trusted Data-as-a-Service platform
1269589138Computing device boot software authentication
1279589111System for controlling the distribution and use of rendered digital works through watermarking
1289584587Managing transmission and storage of sensitive data
1299584582Method and system for publishing an electronic file attached to an electronic message
1309584547Statistical security for anonymous mesh-up oriented online services
1319584542Relay attack countermeasure system
1329584527User authentication based on FOB/indicia scan
1339584520Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers
1349584514Binding mobile device secure software components to the SIM
1359584509Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
1369584507Distributed password verification
1379584484Systems and methods to secure a virtual appliance
1389584398Methods and apparatus to utilize route parameter sets for exchanging routes in a communication network
1399584329Physically unclonable function and helper data indicating unstable bits
1409584328Embedding information or information identifier in an IPv6 address
1419584327System and method for authentication for transceivers
1429584326Creating a new file for a dispersed storage network
1439584325User-configurable cryptographic interface controller
1449584324Centralized datastore password management
1459584323Compressing encrypted data without the encryption key
1469584322System and method for hypervisor-based remediation and provisioning of a computer
1479584318Perfect forward secrecy distributed denial of service attack defense
1489584317Identifying security boundaries on computing devices
1499582843Authentication and validation of smartphone imagery
1509582714Digital fingerprinting track and trace system
1519582671Security and data privacy for lighting sensory networks
1529582652Federation among services for supporting virtual-network overlays
1539582648Method for using a multi-function computer for testing
1549582106Method and system of providing a picture password for relatively smaller displays
1559578035System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
1569578019Method and system for managing an embedded secure element eSE
1579578017Secure management of operations on protected virtual machines
1589578016Optimizing secure communications between a client authenticating server and a mobile client
1599578015Step-up authentication for single sign-on
1609577999Enhanced security for registration of authentication devices
1619577998Dynamic file access to files of unmapped remote computers
1629577997Authentication system and authentication method
1639577993System and method for authenticating users
1649577992Data encryption/decryption using neuro and neuro-mechanical fingerprints
1659577990Control of access to a secondary system
1669577834Generalized certificate use in policy-based secure messaging environments
1679577833Generalized certificate use in policy-based secure messaging environments
1689577832Generating a hash using S-box nonlinearizing of a remainder input
1699577831Relational encryption
1709577830Multi-tenant discovery and claiming of distributed storage nodes over an insecure network
1719577829Multi-party computation services
1729577828Batch verification method and apparatus thereof
1739577824Delivering a content item from a server to a device
1749577822Secure bitstream authentication
1759576410System and method for implementing a threat condition protocol in pass control
1769576285One gesture, one blink, and one-touch payment and buying using haptic control via messaging and calling multimedia system on mobile and wearable device, currency token interface, point of sale device, and electronic payment card
1779576133Detection of data tampering of encrypted data
1789576125Configuring identity federation configuration
1799576118Image processing apparatus, method for controlling the same, and storage medium for carrying out login processing
1809576005Search system
1819575727Methods for generating random data using phase change materials and related devices and systems
1829573060System and method for providing user with services
1839572033Systems and methods for encrypted mobile voice communications
1849572016Methods and apparatus for use in transferring an assignment of a secure chip between subscription managers
1859571634Digital signature-over-voice for caller ID verification
1869571494Authorization server and client apparatus, server cooperative system, and token management method
1879571485Spatial and temporal verification of users and/or user devices
1889571484Device certificate based appliance configuration
1899571483Multi user device management system
1909571475Call encryption systems and methods
1919571468Encoding data using a variable number of pixels and bits based on entropy
1929571289Methods and systems for glitch-resistant cryptographic signing
1939571288Peer to peer enterprise file sharing
1949571287Secure proofs of storage for deduplication
1959571286Authenticating the identity of initiators of TCP connections
1969571285Identity assertion framework
1979571284Controlling access to personal information stored in a vehicle using a cryptographic key
1989571283Enabling packet handling information in the clear for MACSEC protected frames
1999571282Authentication on a computing device
2009571278Encryption key recovery in the event of storage management failure
2019571276Derivation of a device-specific value
2029571213Tag generation method in broadcast encryption system
2039570403Secure chip with physically unclonable function
2049570103Optional data encryption by partition for a partitionable data storage library
2059569774System and method for processing feedback entries received from software
2069569631Method and apparatus for configuring an electronics device
2079569630Method and system for providing an encryption proxy
2089569629Communication between key manager and storage subsystem kernel via management console
2099569623Secure boot with resistance to differential power analysis and other external monitoring attacks
2109569622Self-measuring nonvolatile memory device systems and methods
2119569606Verification of a pattern based passcode
2129569605Systems and methods for enabling biometric authentication options
2139569599Systems, methods, software, and components using tamper-proof real-time clock
2149569587Multi-services application gateway and system employing the same
2159569371Memory device, memory system, and operating method of memory system
2169569124Deduplication of virtual machine content
2179565558Securing communications of a wireless access point and a mobile device
2189565205Detecting fraudulent activity from compromised devices
2199565197Secure verification of website claims
2209565195User authentication based on FOB/indicia scan
2219565188System and method for digitally signing documents from a mobile device
2229565187Systems and methods for mutual authentication of electronic devices
2239565184Digital certification analyzer temporary external secured storage
2249565180Exchange of digital certificates in a client-proxy-server network configuration
2259565172Method for enabling a secure provisioning of a credential, and related wireless devices and servers
2269565023Signature generation and verification system and signature verification apparatus
2279565022RFID tags with dynamic key replacement
2289565020System and method for generating a server-assisted strong password from a weak secret
2299565019Secure and anonymous distributed authentication
2309563774Apparatus and method for securely logging boot-tampering actions
2319563773Systems and methods for securing BIOS variables
2329563769System and method for secure loading data in a cache memory
2339563767System and methods for weak authentication data reinforcement
2349563757Secure digital credential sharing arrangement
2359563011Optical transmission using few-mode fibers
2369561662Supply authentication via timing challenge response
2379561330Pen-type drug injection device with optical dose encoding and decoding system
2389560524Wireless network application access by a wireless communication device via an untrusted access node
2399560138Methods and systems for secure communication between wireless electronic devices and vehicles
2409560110Synchronizing shared content served to a third-party service
2419560047Multi-device authorization to access wireless network communications based on shared event times
2429560036Cross-protocol federated single sign-on (F-SSO) for cloud enablement
2439560024Pairwise temporal key creation for secure networks
2449560022Avoiding collection of biometric data without consent
2459560008Method and arrangement for providing a wireless mesh network
2469559852Cryptographic security functions based on anticipated changes in dynamic minutiae
2479559851Secure pairing for secure communication across devices
2489559850Component management via secure communications
2499559849Service-to-service digital path tracing
2509559848Method, apparatus, and instructions for safely storing secrets in system memory
2519559842Trusted key management for virtualized platforms
2529559837Methods for cryptographic delegation and enforcement of dynamic access to stored data
2539558636Automatic teller machine inventory and distribution system
2549558416Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously
2559558370Cloud key directory for federating data exchanges
2569558366Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method
2579558358Random number generator in a virtualized environment
2589558343Methods and systems for controlling access to resources and privileges per process
2599558228Client computer for querying a database stored on a server via a network
2609557824Computer keyboard with ultrasonic user proximity sensor
2619554271Generating keys for protection in next generation mobile networks
2629554270Enhanced security for direct link communications
2639553982System and methods for tamper proof interaction recording and timestamping
2649553896System and method for controlling electronic communications
2659553871Clock synchronized dynamic password security label validity real-time authentication system and method thereof
2669553869Method for initializing a memory area that is associated with a smart meter
2679553863Computer implemented method and system for an anonymous communication and computer program thereof
2689553859Adaptive method for biometrically certified communication
2699553858Hardware-based credential distribution
2709553857Communication system, communication apparatus, communication method, and computer program
2719553847Virtual desktop accelerator with support for multiple cryptographic contexts
2729553732Certificate evaluation for certificate authority reputation advising
2739553731Transmission method and system for terminal unique information
2749553730Certificating authority trust evaluation
2759553729Authentication method between a reader and a radio tag
2769553728Method and apparatus for providing end-to-end security for distributed computations
2779553727Secure and mobile biometric authentication for electronic health record management
2789553726Method for distributed identification of a station in a network
2799553725System and method for authenticating data
2809553724Car-charging system
2819553721Secure execution environment communication
2829552485Cryptographic material renewal
2839552482Method for determining debug authorization for motherboard control module and associated motherboard control module
2849549062Digital signature-over-voice for caller ID verification
2859548983Cross access login controller
2869548867Method and apparatus for secure distribution of embedded firmware
2879548866Deletion of content in digital storage systems
2889548865Token authentication for touch sensitive display devices
2899548863Method for unambiguous marking of an object
2909548859Ticket-based implementation of content leasing
2919548814System and method for communication over color encoded light patterns
2929547860System for processing feedback entries received from software
2939547858Real-time multi master transaction
2949547774System and method for distributed deduplication of encrypted chunks
2959544769Method for providing application service
2969544766System and method for authentication and key exchange for a mobile device via spectrally confined wireless communications
2979544759Systems, methods, and computer program products for managing states
2989544424Trust enabled communication system
2999544311Secure identity propagation in a cloud-based computing environment
3009544307Providing a security mechanism on a mobile device
3019544306Attempted security breach remediation
3029544300Method and system for providing device-specific operator data for an automation device in an automation installation
3039544299Information processing apparatus, server, method for controlling the same and storage medium
3049544298Method for certificate-based authentication
3059544297Method for secured data processing
3069544281Selective password synchronization
3079544280Utilization of a protected module to prevent offline dictionary attacks
3089544272Detecting image spam
3099544266NSEC3 performance in DNSSEC
3109544154Method of authenticating a device
3119544153Compression of cryptographic chaining certificates
3129544152Dual layer transport security configuration
3139544151Controlling access to clinical data analyzed by remote computing resources
3149544150Using multiple digital identification documents to control information disclosure
3159544149Automatic E-signatures in response to conditions and/or events
3169544148Method of sending a self-signed certificate from a communication device
3179544147Model based multi-tier authentication
3189544146Image processing apparatus, biometric authentication apparatus, image processing method and recording medium
3199544145Device, method, and medium for facility management verification
3209544144Data encryption
3219544143System and method of notifying mobile devices to complete transactions
3229544142Data authentication using plural electronic keys
3239544138Authenticator, authenticatee and authentication method
3249544135Methods of and systems for facilitating decryption of encrypted electronic information
3259544047System and method to prevent misuse of aircraft messages
3269542713Systems and methods for securing the manufacturing supply chain
3279542589Signal strength enhancement in a biometric sensor array
3289542568Systems and methods for enforcing third party oversight of data anonymization
3299542550Method of mutual authentication between a radio tag and a reader
3309542543Biometric authentication device, biometric authentication method and computer readable, non-transitory medium
3319542540System and method for managing application program access to a protected resource residing on a mobile device
3329542537Method and system for confidentially providing software components
3339542157Random number generator and method for generating random numbers
3349542114Methods and apparatus to protect memory regions during low-power states
3359538311Auto-provisioning for internet-of-things devices
3369537951Management of network devices within a dispersed data storage network
3379537918File sharing with client side encryption
3389537910Communication and action approval system and method
3399537864Encryption system using web browsers and untrusted web servers
3409537861Method of mutual verification between a client and a server
3419537857Distributed password verification
3429537854Transmitting encoded digital certificate data to certificate authority using mobile device
3439537813Communication system for providing the delivery of an e-mail message
3449537762Producing routing messages for voice over IP communications
3459537663Manipulation and restoration of authentication challenge parameters in network authentication procedures
3469537662Certificates for low-power or low-memory devices
3479537661Password-less authentication service
3489537660Method of establishing public key cryptographic protocols against quantum computational attack
3499537659Authenticating a user device to access services based on a device ID
3509537658Password-based authentication
3519537657Multipart authenticated encryption
3529536581Tamper-resistant non-volatile memory device
3539536112Delaying or deterring counterfeiting and/or cloning of a component
3549536092Method, system, and program product for remotely attesting to a state of a computer system
3559535967Method and system for providing efficient and complex database functionality to a mobile device
3569535725System and method for disabling and/or enabling a device
3579535675Rule based device enrollment
3589535406Method and apparatus for generating a real time attribute mark of a picture

2016

3599532215Secure deployment of terminals in a wireless network
3609532161Wireless device with application data flow tagging and network stack-implemented network access policy
3619532089Session-based encryption for delivering content on-demand
3629531775Mobile application migration to cloud computing platform
3639531772Dynamic profile sharing using expiring tokens
3649531732Computer implemented system and method for authenticating a sender of electronic data to a recipient
3659531715Method and system for protecting credentials
3669531714Enterprise authentication via third party authentication support
3679531704Efficient network layer for IPv6 protocol
3689531691Providing forward secrecy in a terminating TLS connection proxy
3699531687Techniques for secure message offloading
3709531682Splicing into an active TLS session without a certificate or private key
3719531679Content-based transport security for distributed producers
3729531549Image verification by an electronic device
3739531548Security system for handheld wireless devices using time-variable encryption keys
3749531547Host-based digital signature verification for guest components
3759531546Methods and apparatus to certify digital signatures
3769531545Tracking and notification of fulfillment events
3779531544Two-dimensional bar code for ID card
3789531543Authentication for relay deployment
3799531542Secure remote password
3809531541Cryptographic storage device controller
3819531540Secure token-based signature schemes using look-up tables
3829531539Information processing apparatus, and information processing method
3839531538Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
3849531537System and method for performing secure communications
3859531532Method for establishing a secure communication channel
3869530263System and method of verification of access using a wearable security device
3879530137Method and apparatus for secure access payment and identification
3889530127Method and system for handling sensitive data in a content delivery network
3899530027Device lock for transit
3909530026Privacy protection for participatory sensing system
3919530011Method and system for provision of cryptographic services
3929530010Energy usage data management
3939530009Secure execution and update of application module code
3949530008System and method for a processing device with a priority interrupt
3959530005Techniques for secure data management in a distributed environment
3969529996Controlling mobile device access to enterprise resources
3979529734Smart storage device
3989529626Facilitating equitable distribution of thread resources for job types associated with tenants in a multi-tenant on-demand services environment
3999526009Protecting data stored on a mobile communication device utilizing a personal identification number code of a universal integrated circuit card
4009525999Method of securely transferring services between mobile devices
4019525683Secret supplemental username
4029525679Sending session tokens through passive clients
4039525676Message content adjudication based on security token
4049525673Content protection for extract, transform, load (ETL) scripts
4059525669Method and opportunistic sensing
4069525640System and method for controlling lifespan of interaction requests
4079525557Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method
4089525556Method and system for issuing CSR certificate for vehicle-to-anything communication
4099525555Partitioning access to system resources
4109525554Device and method for identifying a certificate for multiple identities of a user
4119525553System and method for providing digital signature based on mobile trusted module
4129525552Audio device and method for adding watermark data to audio signals
4139525551Randomly skewing secret values as a countermeasure to compromise
4149525550Method and apparatus for securing a mobile application
4159525549Method and apparatus for securing a mobile application
4169524497Registration of a mobile computing device for a data service on a wireless network
4179524477Utilizing a secondary application to render invitational content in a separate window above an allocated space of primary content
4189524404Program execution device
4199521546Secure RF communication method, terminal and system
4209521215Micro cloud image uploading
4219521141Caller validation
4229521140Secure execution environment services
4239521124Secure computation using a server module
4249521123Method for file encryption
4259521097System and method for management of persistent and irrefutable instant messages
4269521002Method for copy-protected storage of information on a data carrier
4279521001Privacy preserving electronic document signature service
4289521000Complete forward access sessions
4299520999Systems and methods for identifying an individual
4309520998System and method for recovery key management
4319520990System and method for software protection and secure software distribution
4329519800Device and method for online storage, transmission device and method, and receiving device and method
4339519798Zero-knowledge databases
4349519796Systems and methods for electronic ticket management
4359519770Transaction card for providing electronic message authentication
4369519767Apparatus and method for authenticating a combination code using a quick response code
4379519757AES-GCM based enhanced security setup for media encryption
4389519433Secure virtual sector erasure method and system
4399519296Randomized input device heating
4409516499Protection for a means of transportation against unauthorised usage or theft
4419516335Wireless display encoder architecture
4429516059Using mock tokens to protect against malicious activity
4439516011MRCP resource access control mechanism for mobile devices
4449516010Authenticating a user while the user operates a client apparatus and possesses an electronic card
4459516007Verifier and prover have an authentication protocol with challenge-response with the challenge from prover having identification of the verifier
4469516002Systems and methods for securing data in motion
4479515999Automated access, key, certificate, and credential management
4489515996Distributed password-based authentication in a public key cryptography authentication system
4499515994Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario
4509515836System and method for location assurance using passive computational tags
4519515835Stable probing-resilient physically unclonable function (PUF) circuit
4529515834Content protection continuity through authorized chains of components
4539515833Electronic personal signature generation and distribution for personal communication
4549515832Process authentication and resource permissions
4559515831Reducing the effectiveness of smudge and thermal imaging attacks
4569515830Universal hash function computing device, method and program
4579515829Information distribution method, information distribution system and in-vehicle terminal
4589515827Key management device, communication device, communication system, and computer program product
4599515826Network topology aided by smart agent download
4609515824Provisioning devices for secure wireless local area networks
4619515822System and method of secure encryption for electronic data transfer
4629514584Access management and reporting technology
4639514500Watermark generator, watermark decoder, method for providing a watermarked signal based on discrete valued data and method for providing discrete valued data in dependence on a watermarked signal
4649514440Methods and apparatus for providing data warehousing with respect to, inter alia, interactive hierarchical entitlements
4659514330Meta-complete data storage
4669514321Electro device for protecting user's privacy and method for controlling thereof
4679514314Method and apparatus for efficient computation of one-way chains in cryptographic applications
4689514300Systems and methods for enhanced security in wireless communication
4699514294Accessing a computing resource
4709514063Secure compact flash
4719513790Electronic device and method for unlocking screen of electronic device
4729510216Node device and communication control method
4739510194Open and encrypted wireless network access
4749509737Client side encryption with recovery method
4759509686Secure element authentication
4769509681Secure instant messaging system
4779509677Method, apparatus, and system for sending credentials securely
4789509669Efficient routing of streams encrypted using point-to-point authentication protocol
4799509667Method and system for digital rights management of documents
4809509665Protecting against malicious modification in cryptographic operations
4819509663Secure distribution of session credentials from client-side to server-side traffic management devices
4829509516Apparatus and method for providing digital signature
4839509515Method and apparatus for registering devices capable of device-to-device communication in server
4849509514Deleting encoded data slices in a dispersed storage network
4859509513Provisioning using a generic configuration
4869509512Message digest generator
4879509510Communication device, communication method, and computer program product
4889509508Generating a session key for authentication and secure data transfer
4899509506Quantum key management
4909509505Group management of authenticated entities
4919509504Cryptographic key manager for application servers
4929509502Symmetric keying and chain of trust
4939509499Electronic key registration method and electronic key registration system
4949509498System and method for transmitting data
4959509492Authentication device, output device, verification device and input device
4969508209Ultraviolet anti-counterfeiting check verification method
4979507964Regulating access using information regarding a host machine of a portable storage drive
4989507926Mobile wireless hand-held identification system and method for identification
4999507920Controlling access by code
5009503939Neighbor list broadcasting techniques
5019503890Method and apparatus for delivering keying information
5029503462Authenticating security parameters
5039503453OTP-based authentication system and method
5049503448Authenticated session establishment
5059503446Authentication within openflow network
5069503307Split channel authenticity queries in multi-party dialog
5079503269Utilizing a stapling technique with a server-based certificate validation protocol to reduce overhead for mobile communication devices
5089503268Securing results of privileged computing operations
5099503267Generating digital signatures
5109503266Relational encryption
5119503265Scheduler and context cache controller and storage for security context
5129503263Method and apparatus for storing encrypted data files across distributed storage media
5139503261Public key encryption with digital signature scheme
5149503260Security token and service access system
5159501664Method, apparatus and system to compensate for drift by physically unclonable function circuitry
5169501634Efficient browser-based identity management providing personal control and anonymity
5179501576Identification of content by metadata
5189501429Dynamic key and rule storage protection
5199497632System and method for pairing a UICC card with a particular mobile communications device
5209497626Certificate validation and channel binding
5219497573Security protocols for unified near field communication infrastructures
5229497191Multiple user authentications on a communications device
5239497190Information processing apparatus, method of controlling the same, storage medium and information processing system
5249497186Methods and systems for securing proofs of knowledge for privacy
5259497184User impersonation/delegation in a token-based authentication system
5269497158Secure electronic mail system
5279497157Secure electronic mail system
5289497029Hardening of direct anonymous attestation from side-channel attack
5299497028System and method for remote storage auditing
5309497027Encryption engine with twin cell memory array
5319497026Authorizing removable medium access
5329497025Ethernet interface module
5339497024Electronic file sending method
5349495555Client computer for querying a database stored on a server via a network
5359495546Electronic signing methods, systems, and apparatus
5369495544Secure data transmission and verification with untrusted computing devices
5379495240Encrypting data for storage in a dispersed storage network
5389494648Comparator with load signal output connected to timestamp value register
5399491201Highly scalable architecture for application network appliances
5409491176Monitoring content consumption by restricted account
5419491175System and method for proxying federated authentication protocols
5429491172Method for communication of energy consumption-specific measurement data elements between a smart meter device and a computer system of a utility company and/or operator of a measuring system
5439491169Generation and authentication of biometric information using watermark
5449491163Object delivery authentication
5459491159Secure challenge system for verifying access rights to media content
5469491148Establishing a direct connection between two devices
5479491146Computational systems and methods for encrypting data for anonymous storage
5489490987Accurately classifying a computer program interacting with a computer system using questioning and fingerprinting
5499490986Authenticating a node in a communication network
5509490985Systems and methods to secure user identification
5519490984Method and apparatus for trusted authentication and logon
5529490983Encryption and decryption of visible codes for real time augmented reality views
5539490982Method and storage device for protecting content
5549490981Antialiasing for picture passwords and other touch displays
5559490980Authentication and secured information exchange system, and method therefor
5569490979System and method for providing credentials
5579490978Information processing apparatus and information processing method
5589490974Identity-based decryption
5599490970Methods and system for secure communication between an RFID tag and a reader
5609489999Magnetic tunnel junction resistance comparison based physical unclonable function
5619489662Apparatus and method for storing electronic receipts on a unified card or smartphone
5629489533Efficient memory utilization in a dispersed storage system
5639489522Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security
5649489509Electronic device and method for unlocking objects of electronic device
5659489504Physically unclonable function pattern matching for device identification
5669489499Security context passing for stateless system management
5679489498Digital rights management using trusted processing techniques
5689489354Masking content while preserving layout of a webpage
5699489023Secure wake on LAN with white list
5709485609Pulse frequency control for wireless communications and ranging
5719485291Imparting real-time priority-based network communications in an encrypted communication session
5729485280Proposal system access policy enforcement
5739485254Method and system for authenticating a security device
5749485251Methods and systems for authenticating users
5759485246Distributed authentication with data cloud
5769485239Implementing single sign-on across a heterogeneous collection of client/server and web-based applications
5779485232User equipment credential system
5789485230Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)
5799485229Object level encryption system including encryption key management system
5809485224Information delivery system with advertising mechanism and method of operation thereof
5819485220Virtual desktop accelerator with support for dynamic proxy thread management
5829485145System, method, apparatus, and computer program product for determining a configuration of a converged infrastructure
5839485102Techniques for user-validated close-range mutual authentication
5849485101Provisioning digital certificates in a network environment
5859485100Trust management systems and methods
5869485099Apparatus, systems and methods for agile enablement of secure communications for cloud based applications
5879485098System and method of user authentication using digital signatures
5889485097Device, system, and method for registering and authenticating handwritten signatures and archiving handwritten information
5899485093Push button configuration pairing
5909483889Method for controlling an electronically secured device and transponder for it
5919483650Systems and methods for managing data incidents
5929483647Firmware verified boot
5939483629Document authentication based on expected wear
5949483422Access to memory region including confidential information
5959483328System and method for delivering application content
5969483249On-board applet migration
5979479928Cross-component message encryption
5989479605User presence data for web-based document collaboration
5999479509Unified system for authentication and authorization
6009479503Authenticating cloud computing enabling secure services
6019479497One time password authentication of websites
6029479496Communication terminal and secure log-in method acquiring password from server using user ID and sensor data
6039479375Joint physical layer security and PAPR mitigation in OFDM systems
6049479340Controlling use of encryption keys
6059479339Methods and apparatus for use in obtaining a digital certificate for a mobile communication device
6069479338Method and system for certificate discovery and ranking certificate authorities
6079479337Method and apparatus for deriving a certificate for a primary device
6089479336Generalized method for authenticating subscribers of a service via a graphical user interface or telephone using the same user name and password
6099479335Encrypted mass-storage device with self running application
6109479327Apparatus and method for generating key
6119477832Digital identity management
6129477830Controlled and client-side authentication module
6139477517Service broker systems, methods, and apparatus
6149473915Call verification system and method thereof and mobile terminal
6159473799Resource data query processing
6169473576Service discovery using collection synchronization with exact names
6179473498Method for using java servlets as a stack based state machine
6189473492Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords
6199473475Low-cost authenticated signing delegation in content centric networking
6209473474Communicating an identity of a group shared secret to a server
6219473470Method and system for the supply of data, transactions and electronic voting
6229473469Method and system for establishing a communications pipe between a personal security device and a remote computer system
6239473468Methods and systems of data security in browser storage
6249473467Customer controlled data privacy protection in public cloud
6259473311Method and device for managing certificates
6269473310Identity-based certificate management
6279473309System and method for providing a trust framework using a secondary network
6289473308Method and system for implementing digital signature in mobile operating system
6299473307Method and apparatus of data authentication
6309473306Document verification with ID augmentation
6319473305Computer program and method for biometrically secured, transparent encryption and decryption
6329473304Generation and distribution of named, definable, serialized tokens
6339473303Method and system for product authentication
6349471948System and method for administering licenses stored by a product unit, and administration of said unit in the field
6359471916Wireless establishment of identity via bi-directional RFID
6369471811Learning a new peripheral using a security provisioning manifest
6379471786Method for booting and dumping a confidential image on a trusted computer system
6389471775Security protocols for low latency execution of program code
6399471771Method of enhanced account authentication management integrated with real time script shifting
6409471770Method and control unit for recognizing manipulations on a vehicle network
6419471760Authentication of an end user
6429471119Detection of deleted records in a secure record management environment
6439467798Systems, methods and apparatuses for ensuring proximity of wifi communication devices
6449467492System and method for reconstructable all-in-one content stream
6459467450Data driven schema for patient data exchange system
6469467442Automated step-up digital certificate installation process
6479467440Method and apparatus for providing an authentication context-based session
6489467431Application specific master key selection in evolved networks
6499467430Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
6509467405Routing messages between applications
6519467323Communication device and a control method therefor that perform authentication using digital certificates
6529467299Device for and method of controlled multilevel chain of trust/revision
6539467298Device for and method of multilevel chain of trust/revision
6549467297Industrial control system redundant communications/control modules authentication
6559467296Virally distributable trusted messaging
6569467295HNB or HeNB security access method and system, and core network element
6579467294Methods and systems for storing and retrieving data
6589467293Generating authentication codes associated with devices
6599467292Hardware-based zero-knowledge strong authentication (H0KSA)
6609467291Information processing system, information processing method, and non-transitory computer readable medium for processing requests using an authority object
6619467290Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
6629467287Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
6639467283Securing method for lawful interception
6649467280Methods and systems for personal authentication
6659466054Interoperable systems and methods for peer-to-peer service orchestration
6669465952Systems and methods for secure multi-tenant data storage
6679465947System and method for encryption and key management in cloud storage
6689465755Security parameter zeroization
6699465746Diagnostics for transactional execution errors in reliable transactions
6709464905Over-the-air vehicle systems updating and associate security protocols
6719462624Authenticated session establishment
6729462473Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)
6739462470Dual interface device for access control and a method therefor
6749462464Secure and simplified procedure for joining a social Wi-Fi mesh network
6759462022Mobile application migration to cloud computing platform
6769462014System and method for tracking and auditing data access in a network environment
6779462005Systems and methods for broadcast WLAN messages with message authentication
6789462003Bidirectional authorization system, client and method
6799461995Terminal, network locking and network unlocking method for same, and storage medium
6809461994Trusted computing base evidence binding for a migratable virtual machine
6819461991Virtual smartcard authentication
6829461990Method for reading attributes from an ID token
6839461986Single sign-on for disparate servers
6849461983Multi-dimensional framework for defining criteria that indicate when authentication should be revoked
6859461975Method and system for traffic engineering in secured networks
6869461972Intelligently designed user interface based on user behavior
6879461828Signature-efficient real time credentials for OCSP and distributed OCSP
6889461827Method for distributing a list of certificate revocations in a vanet
6899461826Tamper-protected hardware and method for using same
6909461825Method and system for preventing revocation denial of service attacks
6919461824Transmitting a document
6929461822Image forming apparatus, control method, and storage medium
6939461821System and method for key material protection on devices using a secret sharing scheme
6949461819Information sharing system, computer, project managing server, and information sharing method used in them
6959461817Method and system for encrypting JavaScript object notation (JSON) messages
6969461759Identification of changed broadcast media items
6979460575Vehicle control apparatus and method thereof
6989460435Advancing a committed transaction time
6999460312Data integrity protection from rollback attacks for use with systems employing message authentication code tags
7009460020Diagnostics for transactional execution errors in reliable transactions
7019457740Vehicle control system
7029455992Trusted hardware component for distributed systems
7039455988System and method for verifying status of an authentication device
7049455984Secret data matching device, secret data matching method, and recording medium
7059455978System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added
7069455975Techniques for managing credentials in a distributed computing environment
7079455972Provisioning a mobile device with a security application on the fly
7089455967Load balancing hash computation for network switches
7099455963Long term encrypted storage and key management
7109455962Protecting memory interface
7119455886Providing mobile device management functionalities
7129455839Wireless key management for authentication
7139455838Creating a digital certificate for a service using a local certificate authority having temporary signing authority
7149455837Method and system for exchange multifunction job security using IPV6 neighbor discovery options
7159455836Verification of authenticity and responsiveness of biometric evidence and/or other evidence
7169455835System and method for circular link resolution with hash-based names in content-centric networks
7179455834Securely providing secret data from a sender to a receiver
7189455833Behavioral fingerprint in a white-box implementation
7199455832Signatures with confidential message recovery
7209455830Method for securing credentials in a remote repository
7219454677Secure communication architecture including video sniffer
7229454666Method for protecting data
7239454660Security verification device and a security verification method
7249454657Security access device and method
7259454605Transferring data between devices using bar codes
7269454494Encrypting a communication from a device
7279452733Vehicle-mounted control system and vehicle-mounted control device
7289451452Method of triggering a key delivery from a mesh key distributor
7299450966Method and apparatus for lifecycle integrity verification of virtual machines
7309450947Apparatus and method for securing a debugging session
7319450937Vehicle network authentication system, and vehicle network authentication method
7329450933Systems and methods for device and data authentication
7339450928Secure registration of group of clients using single registration procedure
7349450765System and method capable of verifying contactless sensor tag
7359450764Systems and methods for validating self-signed certificates
7369450763Server-side key generation
7379450761Memory system and method of generating management information
7389450760System and method for authenticating a client to a device
7399450759Apparatus and methods for controlling distribution of electronic access clients
7409450758Virtual requests
7419450757Method and device for communication security
7429450756Method and system for authenticating entity based on symmetric encryption algorithm
7439449195Method and apparatus to perform online credential reporting
7449449191Device, system and method for securing and comparing genomic data
7459449183Secure file drawer and safe
7469449180Secure data parser method and system
7479449178System, method and computer product for fast and secure data searching
7489449166Performing authentication based on user shape manipulation
7499449165System and method for wireless proximity-based access to a computing device
7509449164Method of securing a computing device
7519449153Unique and unclonable platform identifiers using data-dependent circuit path responses
7529448950Using authenticated manifests to enable external certification of multi-processor platforms
7539448949Mobile data vault
7549448405Head mounted display, motion detector, motion detection method, image presentation system and program
7559445269Terminal identity verification and service authentication method, system and terminal
7569445263Method for ensuring security and privacy in a wireless cognitive network
7579444849Enforcing policy compliance on a device
7589444822Storage array access control from cloud-based user authorization and authentication
7599444809Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones.TM.
7609444805Context-aware validation
7619444803Authentication method and system oriented to heterogeneous network
7629444801Method, device and system for verifying communication sessions
7639444789System and method for secure cloud service delivery with prioritized services in a network environment
7649444645Method and device for assessing a probative value of electronic document management systems
7659444632Quantum secure device, system and method for verifying challenge-response pairs using a physically unclonable function (PUF)
7669444631Certificates for low-power or low-memory devices
7679444630Visualization of trust in an address bar
7689444629Dual layer transport security configuration
7699444628Providing differential access to a digital document
7709444627System and method for providing global platform compliant trusted execution environment
7719444626Password processing device
7729444625Systems and methods for authenticating an electronic message
7739444624Providing user authentication
7749444621Electronic key system
7759444517Coupled inductor power transfer system
7769443298Digital fingerprinting object authentication and anti-counterfeiting system
7779443240Transaction verification on RFID enabled payment and transaction instruments
7789443238Distributed payment system and method
7799443229Supply chain message management and shipment constraint optimization
7809443108Secure timestamping
7819443107Method for protecting the integrity of a group of memory elements using an aggregate authentication code
7829443071Proximity based device security
7839443068System and method for preventing unauthorized access to information
7849442808Session tickets for a backup and recovery system
7859442695Random bit generator based on nanomaterials
7869439068Dynamic configuration for a wireless peripheral device
7879439067Systems and methods of performing link setup and authentication
7889438964Capturing video of an image with embedded code to access content
7899438667Method and system for fast access to advanced visualization of medical scans using a dedicated web portal
7909438629Sensitive information leakage prevention system, sensitive information leakage prevention method, and computer-readable recording medium
7919438608Method and device for verifying the integrity of platform software of an electronic device
7929438604Managing user authentication in association with application access
7939438590Privacy preserving biometric authentication based on error correcting codes
7949438589Binding a digital file to a person's identity using biometrics
7959438588Passporting credentials between a mobile app and a web browser
7969438586Method and system for processing operation request
7979438583Certificate generation method, certificate generation apparatus, information processing apparatus, and communication device
7989438571Securely connecting control device to target device
7999438569Secured embedded data encryption systems
8009438568System and method for email and file decryption without direct access to required decryption key
8019438506Identity and access management-based access control in virtual networks
8029438429Method for authentication and electronic device for performing the authentication
8039438428Method and system for email identity validation
8049438427Method and system for providing a plurality of tamperproof digital certificates for a plurality of public keys of a device
8059438426Key-value data storage device with hybrid architecture
8069438425Robust MAC aggregation with short MAC tags
8079438424Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
8089438423Encryption device, encryption method, and information processing device
8099438417System and method for shared key agreement over untrusted communication channels
8109437201Advanced watermarking system and method
8119437196Working method of sound transmission-based dynamic token
8129436930Method and apparatus for recognizing image content
8139436923Tracking unitization occurring in a supply chain
8149436845Physically unclonable fuse using a NOR type memory array
8159436841Enhanced system security
8169436817Information-processing device, service-providing system, service-providing method, and computer program
8179436812Platform-hardened digital rights management key provisioning
8189436773Method and computer program for discovering a dynamic network address
8199436557Method and computation node for processing application data
8209432384Methods and nodes for verification of data
8219432368Document distribution and interaction
8229432364System and method for providing a service to end terminal that uses authentication information of another mobile communication terminal, service server, mobile communication terminal, end terminal, and storage medium
8239432359Registration and network access control
8249432350System and method for intelligent workload management
8259432345Authentication engine and stream cipher engine sharing in digital content protection architectures
8269432340System and method for secure end-to-end chat system
8279432199System access determination based on classification of stimuli
8289432198Method for certificate-based authentication
8299432197Wireless communications device and authentication processing method
8309432196Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices
8319432195Method of operating data security and electronic device supporting the same
8329432194Recording medium with authentication and encryption/decryption functions
8339432193Face-based authentication with situational adaptivity
8349432190Computational systems and methods for double-encrypting data for subsequent anonymous storage
8359430672Stack fusion architecture including distributed software clusters to enable software communication services
8369430671Method and apparatus for privacy protected clustering of user interest profiles
8379430650Method for managing memory space in a secure non-volatile memory of a secure element
8389430648Method and apparatus for near field communication
8399430628Access authorization based on synthetic biometric data and non-biometric data
8409430620System and method for securing the life-cycle of user domain rights objects
8419430619Media decoding control with hardware-protected digital rights management
8429430406System for generating a cryptographic key from a memory used as a physically unclonable function
8439426660EHF secure communication device
8449426659Service activation using algorithmically defined key
8459426648Systems and methods of performing link setup and authentication
8469426647Method and device for protecting privacy data of mobile terminal user
8479426164Network device and network system
8489426147Protected device management
8499426146Digital certificate issuer-correlated digital signature verification
8509426145Designation of classes for certificates and keys
8519426138Identity-independent authentication tokens
8529426136Increased communication security
8539426135Increased communication security
8549426134Method and systems for the authentication of a user
8559426128System for generating a security document
8569426116Multiple-master DNS system
8579425968System and method for updating an encryption key across a network
8589425967Method for certificate generation and revocation with privacy preservation
8599425966Security mechanism evaluation service
8609425965Cryptographic certification of secure hosted execution environments
8619425964Display device with mobile high-definition link port and signal processing method thereof
8629425963Securing electronic control units using message authentication codes
8639425962Low energy Bluetooth system with authentication during connectionless advertising and broadcasting
8649425960Searchable encryption for outsourcing data analytics
8659425958System, method and apparatus for cryptography key management for mobile devices
8669425955Power line communication (PLC) network nodes using cipher then segment security
8679424576Methods and systems of creating a payment record with a cryptographically secure audit trail
8689424573Batch settlement transactions system and method
8699424564Interoperable systems and methods for peer-to-peer service orchestration
8709424478Multimodal biometric profiling
8719424413Integration of payment capability into secure elements of computers
8729424410Methods and systems for leveraging transaction data to dynamically authenticate a user
8739424407Weak password support in a multi-user environment
8749424406Asset protection based on redundantly associated trusted entitlement verification
8759424400Digital rights management system transfer of content and distribution
8769420457Multiple-persona on mobile devices
8779420454Method for ensuring security and privacy in a wireless cognitive network
8789420007Access control using impersonization
8799419978Personal video channels
8809419969Method and system for granting access to a secured website
8819419966Method for producing dynamic data structures for authentication and/or password identification
8829419965Digital certification analyzer
8839419964Sharing between CPE and companion device
8849419961Apparatus and method for managing use of secure tokens
8859419956Systems and methods for authenticating a user for accessing account information using a web-enabled device
8869419949Increased communication security
8879419948Method and apparatus for avoiding license storming during an unplanned regional blackout
8889419806Trusted certificate authority to create certificates based on capabilities of processes
8899419805Generating a CRL using a sub-system having resources separate from a main certificate authority sub-system
8909419804Data authenticity assurance method, management computer, and storage medium
8919419803Flexible data authentication
8929419802Secure message filtering to vehicle electronic control units with secure provisioning of message filtering rules
8939419801System and method for transmitting needed portions of a data file between networked computers
8949419800Secure network systems and methods
8959419799System and method to provide secure credential
8969418027Secure boot information with validation control data specifying a validation technique
8979418026Transition between states in a processor
8989414230Certificate management with consequence indication
8999413752One-time password operating method
9009413738Securing communications with enhanced media platforms
9019413732Vehicle network system
9029413693Network relay apparatus and program
9039413538Cryptographic certification of secure hosted execution environments
9049413537Information update system and method, vehicle, charger and server apparatus
9059413536Remote secure device management in smart grid ami networks
9069413535Critical security parameter generation and exchange system and method for smart-card memory modules
9079413534Mobile device-based keypad for enhanced security
9089413533System and method for authorizing a new authenticator
9099413532Information recording device
9109412284Contour encryption and decryption
9119412283System, design and process for easy to use credentials management for online accounts using out-of-band authentication
9129412148Transmission terminal, transmission method, and computer-readable recording medium storing transmission program
9139411981Method and system for activating a portable data carrier
9149411972System and method for creating and protecting secrets for a plurality of groups
9159411952Method for authentication
9169411950Methods and systems for user authentication in a computer system using image-based log-ins
9179411949Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same
9189411946Fingerprint password
9199411748Secure replay protected storage
9209407852Method and system for providing program guide data from a content provider to a user device through a partner service provider based upon user attributes
9219407637Method for managing and checking data from different identity domains organized into a structured set
9229407634Cryptographic protocol for portable devices
9239407633System and method for cross-channel authentication
9249407629Method for assembling authorization certificate chains
9259407622Methods and apparatus for delegated authentication token retrieval
9269407620System and method for identity management
9279407619Un-password.TM.: risk aware end-to-end multi-factor authentication via dynamic pairing
9289407618Systems and methods for device and data authentication
9299407617Pass-thru for client authentication
9309407615Single set of credentials for accessing multiple computing resource services
9319407610Method and system for securing communication
9329407609Lighting system, a light source, a device and a method of authorizing the device by the light source
9339407446Communication device, communication method, reader/writer, and communication system
9349407445Security system and method
9359407444Method for validating messages
9369407443Component analysis of software applications on computing devices
9379407442Tamper-evident network messaging method and system, and device configured therefor
9389407441Adding entropy to key generation on a mobile device
9399407440Multiple authority data security and access
9409407439Authentication system and authentication code convertor
9419407436Portable device registration system and portable device registration method
9429407431Systems and methods for distributing and securing data
9439406054Virtual account based new digital cash protocols
9449405912Hardware rooted attestation
9459405898Secure element as a digital pocket
9469405897Authenticating an entity
9479405891User authentication
9489401928Data stream security processing method and apparatus
9499401921Insuring integrity of remote procedure calls used in a client and server storage system
9509401919Web form protection
9519401918User to user delegation service in a federated identity management environment
9529401913Updating stored passwords
9539401907Information processing apparatus and method, recording medium and program
9549401896Systems and methods for authenticating and protecting the integrity of data streams and other data
9559401895Device configuration for secure communication
9569401888Internet protocol mapping resolution in fixed mobile convergence networks
9579401811Attribute-based digital signatures
9589401809Composite system, method, and storage medium
9599401804Leakage resilient garbled circuit generation using reduced memory hardware token
9609401059System and method for secure voting
9619400979Transactional security over a network
9629400879Method and system for providing authentication through aggregate analysis of behavioral and time patterns
9639400846Method and system for managing information in an on-line community
9649398622System and method for connecting a communication to a client
9659398455System and method for generating an identification based on a public key of an asymmetric key pair
9669398397Secure manipulation of embedded modem connection settings through short messaging service communication
9679398063Customizing distribution of an operating system based on detected network carrier by retrieving differences between the distributed operating system and an operating system currently installed on a computing device
9689398038Collaborative phishing attack detection
9699398025Method for generating and check-controlling network identity indentification code in network electronic identification card
9709398024System and method for reliably authenticating an appliance
9719398023Server verification of secure electronic messages
9729398018Virtual currency system
9739398008Cloud-based system for reading of decodable indicia
9749398005Managing seed provisioning
9759398004Method for reading attributes from an ID token
9769398003Token device re-synchronization through a network solution
9779397997Systems and methods for secure operation of an industrial controller
9789397996Establishing historical usage-based hardware trust
9799397994Packet forwarding device, packet forwarding system, and packet forwarding method
9809397991Digital content distribution and subscription system
9819397986Authenticating acceptance of a string using an automaton
9829397982Secure key storage systems, methods and apparatuses
9839397841Motion-based human verification system and method
9849397840Digital certificate automatic application method, device and system
9859397839Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI)
9869397838Credential management
9879397837Secure access to information associated with a value item
9889397836Securing devices to process control systems
9899397835Web of trust management in a distributed system
9909397829Electronic key registration method and electronic key registration system
9919397827Systems and methods for managing cryptographic keys
9929396506System providing an improved skimming resistance for an electronic identity document
9939396372Method for monitoring a system comprising a number of readers and a plurality of portable communication units
9949396348System and method for electronic stamping
9959396339Protecting computers using an identity-based router
9969396338Method and system for providing a secure secrets proxy
9979396320System and method for non-intrusive, privacy-preserving authentication
9989392454System and method for computer authentication using image analysis of a shared secret
9999392453Authentication
10009392448Wireless communications system
10019391993Sharing content by indicating activity from users in a social network
10029391988Community biometric authentication on a smartphone
10039391986Method and apparatus for providing multi-sensor multi-factor identity verification
10049391984Mobile virtual communication and entertainment service
10059391980Enterprise platform verification
10069391967Authentication for network access related applications
10079391961Information operating device, information output device, and information processing method
10089391783Method and system for state machine security device
10099391782Validation of user credentials
10109391781Systems and methods for intermediate message authentication in a switched-path network
10119391780Method and device for storing secured sent message data
10129391779Reactive biometric single sign-on utility
10139391778Secure password management systems, methods and apparatuses
10149391777System and method for performing key resolution over a content centric network
10159391776Method and system for authenticating peer devices using EAP
10169391775Signature method and device
10179391774Strauss greenmail system and method
10189391772Key information generation device and key information generation method
10199391014Physical unclonable interconnect function array
10209390296Computer recovery or return
10219390295Device with capacitive security shield
10229390290Applying group policies
10239390254Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method
10249390240System and method for querying data
10259390030Information processing device, information storage device, information processing system, information processing method, and program
10269386254Broadcast method and broadcast apparatus
10279386037Using hash signatures of DOM objects to identify website similarity
10289386033Security recommendation engine
10299386026System and method for scheduling and executing secure electronic correspondence operations
10309386023Method, apparatus and system for managing packet delivery
10319386017Authentication device, system and method
10329386015Security model for industrial devices
10339386013Dynamic password authentication method and system thereof
10349386011Systems and methods for managing resetting of user online identities or accounts
10359386009Secure identification string
10369386005Method and system for data communication over network
10379385996Method of operating a computing device, computing device and computer program
10389385995Anonymous authentication
10399385954Hashing techniques for use in a network environment
10409385872Reissue of cryptographic credentials
10419385871Method and apparatus for authenticating a non-volatile memory device
10429385870Secure method for remote grant of operating rights
10439385869Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions
10449385868Methods and systems for testing performance of biometric authentication systems
10459385864Secure session capability using public-key cryptography without access to the private key
10469385863System and method for authenticating a communication device
10479385862Method and apparatus for binding subscriber authentication and device authentication in communication systems
10489384484Secure content distribution system
10499384390Sensing data from physical objects
10509384344Authorizing local application activity using remotely defined security data
10519384341System and method for controlling access to secure resources
10529384338Architectures for privacy protection of biometric templates
10539380093Mobile device application streaming
10549380062Techniques for sharing virtual machine (VM) resources
10559380058Systems and methods for anonymous authentication using multiple devices
10569380050Scan image authentication
10579380043System and method for providing a one-time key for identification
10589380038Bootstrap authentication framework
10599380026Authenticating to a network via a device-specific one time password
10609380024Method and apparatus for providing security to devices
10619379897Method and apparatus for providing an interactive hierarchical entitlement map
10629379896Compromised password mitigation
10639379895HTTP authentication and authorization management
10649379894Authentication using cryptographic value derived from a shared secret of a near field communication tag
10659379892Trusted manager bridge
10669378499Software PIN entry
10679378359Gateway for controlling mobile device access to enterprise resources
10689378358Password management system
10699378356Two factor authentication using a one-time password
10709378351System and method for enrolling in a biometric system
10719378348Adding biometric identification to the server security infrastructure for an enterprise service bus system
10729378347Computer terminals biometrically enabled for network functions and voice communication
10739378343Automatic detection of required network key type
10749374837Preventing misuse of random access procedure in wireless communication system
10759374707Secure connection for wireless devices via network records
10769374619System and method for enabling pairing of a companion device with a mate device for performing a companion device
10779374407Mobile device application streaming
10789374373Encryption techniques for improved sharing and distribution of encrypted content
10799374358Methods, systems, and media for providing access control for a computing device
10809374355Programming vehicle modules from remote devices and related methods and systems
10819374350Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method
10829374347Method and system for authentication over a public network using multiple out-of-band communications channels to send keys
10839374344Secure end-to-end communication system
10849374229Graphical user interface for digital certificate profile configuration
10859374228Verifying a geographic location of a virtual disk image executing at a data center server within a data center
10869374227Verification of signed digital documents
10879374226Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer
10889374225Document de-registration
10899374224System and methods for encrypting data
10909374223Methods and apparatus for including a confidential structural component in a third party remote product simulation
10919374222Secure communication of data between devices
10929374221Distributed protection of credential stores utilizing multiple keys derived from a master key
10939374218Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device
10949373205Access control system and method for use by an access device
10959373122Methods, apparatus and computer program products for securely accessing account data
10969373002Electronic document management and delivery
10979372986Selective password synchronization
10989372982ID usage tracker
10999372981Electronic device and method for unlocking screen of electronic device
11009372972System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console
11019369873Network application function authorisation in a generic bootstrapping architecture
11029369495Sensor aware security policies with embedded controller hardened enforcement
11039369479Detection of malware beaconing activities
11049369463Information processing method and system
11059369461Passcode verification using hardware secrets
11069369459Method of establishing secure groups of trusted contacts with access rights in a secure communication system
11079369455Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment
11089369454Computerized method and system for managing a community facility in a networked secure collaborative exchange environment
11099369448Network security parameter generation and distribution
11109369442System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers
11119369441End-to-end secure communication system
11129369290Challenge-response authentication using a masked response value
11139369289Methods and systems for performing secure authenticated updates of authentication credentials
11149369288Video data delivery protection
11159369287System and method for applying a digital signature and authenticating physical documents
11169369286System and methods for facilitating authentication of an electronic device accessing plurality of mobile applications
11179369285Social network based PKI authentication
11189369284Browser based identity with multiple login
11199369283Method for entering password and portable electronic device and unlocking method and data authenticating method
11209369282Mobile device user authentication for accessing protected network resources
11219369281Method and system for secure use of services by untrusted storage providers
11229369280Secure processing systems and methods
11239367842Software pin entry
11249367833Data services outsourcing verification
11259367708Method for producing a hardware device and hardware device
11269367699Automating the creation and maintenance of policy compliant environments
11279367693Bitstream confirmation for configuration of a programmable logic device
11289367678Password authentication
11299367676System and method for confirming location using supplemental sensor and/or location data
11309367675Method for verifying and calibrating time
11319367669Content source identification using matrix barcode
11329367339Cryptographically attested resources for hosting virtual machines
11339367328Out-of-band host OS boot sequence verification
11349363672Method and network node device for controlling the run of technology specific push-button configuration sessions within a heterogeneous or homogenous wireless network and heterogeneous or homogenous wireless network
11359363670Systems and methods for restricting access to network resources via in-location access point protocol
11369363578Communication system, communication device, communication method, and computer program
11379363411Data certification system, server device, client device, publishing server, and data certification method
11389363273Secure clock synchronization
11399363266Secured electronic device
11409363262Authentication tokens managed for use with multiple sites
11419363259Performing client authentication using onetime values recovered from barcode graphics
11429363258Secure digital signature system
11439363256User authentication in separate authentication channels
11449363249Secure simple enrollment
11459363246Certificate distribution device and method for same, and computer program
11469363245Secure network access
11479363090Authorization of communication links between end user devices using intermediary nodes
11489363089Information processing apparatus, information storage apparatus, information processing system, and information processing method and program for controlling content use
11499363088Automated provisioning of a network appliance
11509363087End-to-end security for hardware running verified software
11519363086Aggregate signing of data in content centric networking
11529363085Attestation of data sanitization
11539363084Methods and apparatus for controlling the transmission and receipt of email message
11549363083Authentication method and system
11559363082Cryptographic communication system and cryptographic communication method
11569363080System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment
11579363079Method of generating message authentication code and authentication device and authentication request device using the method
11589363077Time-based authentication
11599361740Systems and methods for access control
11609361482Device specific information generation device and device specific generation method
11619361471Secure vault service for software components within an execution environment
11629361467Owner-controlled access control to released data
11639361452Mobile credential revocation
11649361447Authentication based on user-selected image overlay effects
11659361440Secure off-chip processing such as for biometric data
11669361436Multiple profile authentication
11679361435Multi-tier digital supply chain management
11689361265Method and device for integrating a device into a network
11699357389Security identity discovery and communication method
11709357247Apparatus and methods for content delivery and message exchange across multiple content delivery networks
11719357083System and method for providing user lifecycle management and service orchestration of multiple media services across multiple display screens
11729356968Managing authentication using common authentication framework circuitry
11739356946Detecting malware in mobile sites
11749356927Enabling digital signatures in mobile apps
11759356916System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
11769356826Connecting network management systems
11779356787Secure communication architecture including sniffer
11789356786Method for encrypting a plurality of data in a secure set
11799356778Secured communication for local area network
11809356718Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor
11819356622Apparatus and method for reconstructing a bit sequence with preliminary correction
11829355389Purchase transaction system with encrypted payment card data
11839355274Method and device for archiving a document
11849351165Identity verifying method, account acquiring method, and mobile terminal
11859350900Information processing apparatus, and user authentication method for information processing apparatus
11869350819Centralized service for distributed service deployments
11879350746Transmission network system, transmission method, and authentication information device
11889350739Recovery from rolling security token loss
11899350732Integrity protection for data storage
11909350731Secure method of processing data
11919350728Method and system for generating and authorizing dynamic password
11929350726Recovery from rolling security token loss
11939350722Authentication of an end user
11949350721Air interface security method and device
11959350720Delegating authorizations
11969350715Methods and apparatus for network communications via a transparent security proxy
11979350700Watermark generator, watermark decoder, method for providing a watermark signal in dependence on binary message data, method for providing binary message data in dependence on a watermarked signal and computer program using a differential encoding
11989350556Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key
11999350555Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
12009350554Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
12019350553One-to-many electronic signature process
12029350552Document fingerprinting
12039350551Validity determination method and validity determination apparatus
12049350550Power management and security for wireless modules in "machine-to-machine" communications
12059350549Selective shredding in a deduplication system
12069350548Two factor authentication using a protected pin-like passcode
12079350547Systems and methods for watermarking software and other media
12089350546Method and system to decrypt private contents
12099350545Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens
12109350541Communication apparatus, communication method, communication system, and computer program
12119350540System and method of secure encryption for electronic data transfer
12129350538Revocation status using other credentials
12139348996Method and device for the authentication of at least two agricultural devices coupled via a data bus
12149348986Authentication server apparatus, authentication server apparatus-use program and authentication method
12159348981System and method for generating user authentication challenges
12169348437Mobile data collection and validation systems and methods
12179345058Efficient communication for devices of a home network
12189344895Method and system for securely accessing portable hotspot for intelligent mobile phones
12199344891Secure reception reporting
12209344884Module for authenticity verification of authentication messages
12219344688Recall device
12229344489Electronic data sharing device and method of use
12239344455Apparatus and method for sharing a hardware security module interface in a collaborative network
12249344453Secure protocol execution in a network
12259344439Executing unprotected mode services in a protected mode environment
12269344434GET VPN group member registration
12279344428Method and system for digitally certifying the association between an entity and a place
12289344426Accessing enterprise resources while providing denial-of-service attack protection
12299344425Dynamic object creation and certificate management
12309344419Methods of authenticating users to a site
12319344417Authentication method and system
12329344416File vault and cloud based document notary service
12339344285Method and system for preserving privacy and accountability
12349344284Method of anonymous entity authentication using group-based anonymous signatures
12359344283Captcha image scramble
12369344282Central and implicit certificate management
12379344281Detecting fraud using operational parameters for a peripheral
12389344280Systems and methods for authenticating and providing anti-counterfeiting features for important documents
12399344279Mobile device-based keypad for enhanced security
12409344278Secure data transfer using random ordering and random block sizing
12419344276Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program
12429344275System, device, and method of secure entry and handling of passwords
12439343135Physically unclonable function based on programming voltage of magnetoresistive random-access memory
12449342701Digital rights management system and methods for provisioning content to an intelligent storage
12459342674Man-machine interface for controlling access to electronic devices
12469342661Apparatus and methods for rights-managed content and data delivery
12479338810Efficient communication for devices of a home network
12489338656Conditional limited service grant based on device verification
12499338653Secure reception reporting
12509338587System and method for radio-tagging radio transmitters
12519338220System and method to anonymize data transmitted to a destination computing device
12529338185Service provision
12539338165Common internet file system proxy authentication of multiple servers
12549338159Method and apparatus for sharing wireless network subscription services
12559338155Security device provisioning
12569338150Content-centric networking
12579338144System and method for operating on streaming encrypted data
12589338142Method for verifying the security of a device that generates private and public cryptographic keys
12599338141Embedded module system with encrypted token authentication system
12609338140Secure data parser method and system
12619338014Network system, certificate management method, and certificate management program
12629338013Verifiable redactable audit log
12639338012Systems and methods for identifying code signing certificate misuse
12649338011Document modification detection and prevention
12659338010Systems, methods and apparatuses for secure time management
12669338008System and method for secure release of secret information over a network
12679338007Secure delegated authentication for applications
12689338006Multi-channel multi-factor authentication
12699338001Privacy enhanced spatial analytics
12709336696Enhanced security setup for media decryption
12719336634Hand geometry biometrics on a payment device
12729336394Securely recovering a computing device
12739336359Device certificate individualization
12749336189Systems and methods for providing fused images to remote recipients for descrambling and interpretation
12759336092Secure data deduplication
12769332431Method of and system for authenticating and operating personal communication devices over public safety networks
12779332422Method of file transmission based upon distributed storage in wireless communication system
12789332377Device and method for control of data transfer in local area network
12799332018Method and system for secure authentication
12809332011Secure authentication system with automatic cancellation of fraudulent operations
12819332007Method for secure, entryless login using internet connected device
12829332006Service account access
12839332004Digital content acquisition system and techniques
12849332000One-pass authentication mechanism and system for heterogeneous networks
12859331998Dynamic secured network in a cloud environment
12869331997Systems and methods for managing disclosure of protectable information
12879331996Systems and methods for identifying devices by a trusted service manager
12889331991Authenticating a client using linked authentication credentials
12899331990Trusted and unsupervised digital certificate generation using a security token
12909331989Secure shared key sharing systems and methods
12919331988System and method for provisioning secrets to an application (TA) on a device
12929331985Portable device, a stationary device, a digital device and a method for performing secure communication using thereof
12939331856Systems and methods for validating digital signatures
12949331855Apparatus, system, and method for providing attribute identity control associated with a processor
12959331854Message authentication method in communication system and communication system
12969331849Information setting method and wireless communication system
12979331012Method for fabricating a physical unclonable interconnect function array
12989330270Encryption processing device and authentication method
12999330268Storage devices with secure debugging capability and methods of operating the same
13009330261Proving age and integrity of website pages
13019330258Systems and methods for identifying uniform resource locators that link to potentially malicious resources
13029327510Verification record for a replaceable supply
13039326307Efficient communication for devices of a home network
13049326142Cryptographic key generation
13059325839Call authentification methods and systems
13069325721Restricting access to objects created by privileged commands
13079325702Method for secure user and transaction authentication and risk management
13089325700Service account access
13099325698Method and apparatus for on-site authorisation
13109325694Anonymous entity authentication method and system
13119325693Method and apparatus for identity federation gateway
13129325683Mobile application management framework
13139325680Digital rights management retrieval system
13149325677Method of registering devices
13159325509Determination method for cryptographic algorithm used for signature, validation server and program
13169325508Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
13179325507System and method for managing mobile device using device-to-device communication
13189325506Cryptographically enforcing strict separation of environments
13199325505Apparatus and method for content encryption and decryption based on storage device ID
13209325504Method for secure transfer of an application from a server into a reading device unit
13219325503Methods and systems for user authentication
13229325502Identity management for transactional content
13239325501Method to implement two fiber shared protection ring with extra traffic on STM-1/OC-3 interface
13249325500Providing support for multiple authentication chains
13259325496Encryption key providing method, semiconductor integrated circuit, and encryption key management device
13269325495Encrypted server-less communication between devices
13279324436Method and apparatus for controlling operation of flash memory
13289324122Voting scheme for time alignment
13299323951Encrypted warranty verification and diagnostic tool
13309323950Generating signatures using a secure device
13319323945Systems, methods, and computer program products for managing secure elements
13329323937Methods and systems for establishing and enforcing document visibility rights with an electronic signature service
13339323918Methods, systems, and computer program products for recovering a password using user-selected third party authorization
13349323915Extended security for wireless device handset authentication
13359323914Virtual smart card to perform security-critical operations
13369323902Conditional access using embedded watermarks
13379323435Method and system of providing a picture password for relatively smaller displays
13389319469Host agnostic integration and interoperation system
13399319467Apparatus and method for efficiently and securely exchanging connection data
13409319407Authentication extension to untrusted devices on an untrusted network
13419319405System and methods for assignation and use of media content subscription service privileges
13429319404Security for the internet of things
13439319401System and method for cross-channel authentication
13449319398Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems
13459319394System and method for pool-based identity authentication for service access without use of stored credentials
13469319389Data recording device, and method of processing data recording device
13479319386Security for mobility between MBMS servers
13489319385System and method for accessing host computer via remote computer
13499319371Management of commercial messages in a social network
13509319224Public key infrastructure for system-on-chip
13519319223Key derivation for a module using an embedded universal integrated circuit card
13529319222Two factor authentication of ICR transport and payload for interchassis redundancy
13539319221Controlling access based on recognition of a user
13549319220Method and apparatus for secure network enclaves
13559317848Integration of verification tokens with mobile communication devices
13569317843Interoperable systems and methods for peer-to-peer service orchestration
13579317705Secure data parser method and system
13589317670Security based on usage activity associated with user device
13599317668Dynamic tardos traitor tracing schemes
13609317449Secure key access with one-time programmable memory and applications thereof
13619313605Wireless communication system and information providing method
13629313530Technique for securely communicating programming content
13639313297Virtual desktop accelerator with support for dynamic proxy thread management
13649313248Method and apparatus for delivering encoded content
13659313214Enhanced security using service provider authentication
13669313192Communications hub for use in life critical network
13679313188Providing domain-joined remote applications in a cloud environment
13689313185Systems and methods for authenticating devices
13699313178Method and system for secure over-the-top live video delivery
13709313105Network management using secure mesh command and control framework
13719313033Derived certificate based on changing identity
13729313032Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
13739313031Telephone caller authentication
13749313030Method and apparatus for secure ad hoc group device-to-device communication in information-centric network
13759313029Virtualized network interface for remote direct memory access over converged ethernet
13769313025Generating and processing an authentication certificate
13779311956Information processing device, information processing method, and program
13789311504Anti-identity-theft method and hardware database device
13799311500Data security using request-supplied keys
13809311494Secure search method and secure search device
13819311465Secure information storage and retrieval apparatus and method
13829311461Security system based on questions that do not publicly identify the speaker
13839311456Auto-negotiation of content formats using a secure component model
13849307374Transferring information on a first mobile computing device to a peer mobile computing device
13859307091Method and apparatus for the secure storage of audio signals
13869307028Device for archiving handwritten information
13879306945Client authentication during network boot
13889306943Access point--authentication server combination
13899306938Secure authentication systems and methods
13909306936Techniques to classify virtual private network traffic based on identity
13919306926User authentication using unique hidden identifiers
13929306925Image processing apparatus and image processing system
13939306915Systems and methods for secure file transfers
13949306905Secure access to application servers using out-of-band communication
13959306754System and method for implementing transaction signing within an authentication framework
13969306753Mobile system and method for improving safety of impromptu meetings
13979306752Generation of a digital signature
13989306751Secure time and crypto system
13999306750Techniques for securing supply chain electronic transactions
14009306749Method of biometric authentication, corresponding authentication system and program
14019306748Authentication method and apparatus in a communication system
14029306743One-way key fob and vehicle pairing verification, retention, and revocation
14039305298System and method for location-based authentication
14049305282Contact-less tag with signature, and applications thereof
14059305188Image-display method, projector, image-display system, projector-control method, image-display program, and projector-control program
14069305177Source identification for unauthorized copies of content
14079305173Portable authorization device for authorizing use of protected information and associated method
14089305172Multi-ring encryption approach to securing a payload using hardware modules
14099305160Method and system for automatic updating of randomly generated user passwords
14109305159Secure system for allowing the execution of authorized computer program code
14119304941Self-encrypting flash drive
14129304782Network switch, systems, and servers implementing boot image delivery
14139300762Virtual desktop accelerator with support for multiple cryptographic contexts
14149300665Credential authentication methods and systems
14159300662System and method for providing digital content
14169300660Providing authorization and authentication in a cloud for a user of a storage array
14179300659Method and system of providing a picture password for relatively smaller displays
14189300656Secure connection certificate verification
14199300654Method of handling a certification request
14209300649Context sensitive dynamic authentication in a cryptographic system
14219300479Method and apparatus for protecting digital content in a storage device
14229300478Splitting certificate status responses evenly across multiple distributed certificate status responders
14239300477Identifying and correcting an undesired condition of a dispersed storage network access request
14249300476Management of certificates for mobile devices
14259300475Signature generation by calculating a remainder modulo public information
14269300474Enhanced authentication and/or enhanced identification of a secure element of a communication device
14279300473Module for "machine-to-machine" communications using public key infrastructure
14289300472Method and apparatus for improving digital signatures
14299300471Information processing apparatus, information processing method, and program
14309300470Semiconductor device and method of writing data to semiconductor device
14319300469Secure computing system, secure computing method, secure computing apparatus, and program therefor
14329300468Secure node admission in a communication network
14339300466Transmitting device, receiving device, transmitting method, receiving method, and program
14349299094State-based compliance verification in a disconnected system
14359299006Authentication device and method
14369298950Undiscoverable physical chip identification
14379298947Method for protecting the integrity of a fixed-length data structure
14389298946Physically unclonable function based on breakdown voltage of metal-insulator-metal device
14399298937Secure data parser method and system
14409298923Software revocation infrastructure
14419298922Method, system, and program product for remotely attesting to a state of a computer system
14429298897Method of and systems for privacy preserving mobile demographic measurement of individuals, groups and locations over time and space
14439298891Enhanced content management based on watermark extraction records
14449294918Method and system for secure remote login of a mobile device
14459294915Localized network authentication and security using tamper-resistant keys
14469294478Hardware-based device authentication
14479294468Application-level certificates for identity and authorization
14489294465Identity verification and authentication
14499294457Federated realm discovery
14509294453Direct mode communication system and discovery interactive method thereof
14519294450Selectively performing man in the middle decryption
14529294448Cryptographic security functions based on anticipated changes in dynamic minutiae
14539294447Access control
14549294445Secure data parser method and system
14559294444Systems and methods for cryptographically splitting and storing data
14569294438Cloud computing method and system
14579294433Multiple-master DNS system
14589294429Method and system for providing service for searching friends
14599294288Facilitating secure online transactions
14609294287Interrogating an authentication device
14619294286Computerized system and method for deployment of management tunnels
14629294285Information recording device
14639294284Systems and methods for validating application signatures
14649294283Methods and devices for monitoring the integrity of an article during transporting said article
14659294282Cryptographically verified repeatable virtualized computing
14669294281Utilization of a protected module to prevent offline dictionary attacks
14679294280Location verification in quantum communications
14689294279User authentication system
14699294269Communication apparatus and communication method
14709294268System and method for variable length encryption
14719294267Method, system and program product for secure storage of content
14729292987System and method for fully encrypted remote web-based voting
14739292876Systems and methods for employing document snapshots in transaction rooms for digital transactions
14749292851System and method for biometric signature authorization
14759292713Tiered access to on chip features
14769292706Customer data management for data analytics outsourcing
14779292692System and device for verifying the integrity of a system from its subcomponents
14789292681Password audit system
14799292674Password encryption key
14809292671Multi-server authentication using personalized proactivization
14819292670Systems and methods for generating and authenticating one time dynamic password based on context information
14829292665Secure serial number
14839292513Methods for identifying audio or video content
14849292248Span out load balancing model
14859288672Method for configuring a remote station with a certificate from a local root certificate authority for securing a wireless network
14869288208Cryptographic key escrow
14879288206Shared secret techniques for ubiquitous computing devices
14889288203Multiple input based passwords
14899288201Disconnected credential validation using pre-fetched service tickets
14909288196Identity verification via selection of sensible output from recorded digital data
14919288195Single sign on with multiple authentication factors
14929288192System and method for securing data from a remote input device
14939288064Trust information delivery scheme for certificate validation
14949288063Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method
14959288062Telephone caller authentication
14969288061Safe communication method with card
14979288060System and method for decentralized authentication of supplicant devices
14989288059Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys
14999288058Executing compliance verification or remediation scripts
15009288057Content segmentation of watermarking
15019288056Data access and anonymity management
15029288055Method for verifying correct encryption key utilization
15039288054Method and apparatus for authenticating and managing application using trusted platform module
15049288053Schema signing
15059288052Method and apparatus to provide an authoring tool to create content for a secure content service
15069288050Unified storage and management of cryptographic keys and certificates
15079288049Cryptographically linking data and authentication identifiers without explicit storage of linkage
15089288048Real-time frame authentication using ID anonymization in automotive networks
15099286596Signing ceremony system and method
15109286490Systems and methods for providing conditional access to transmitted information
15119286476Method and system for configuring constraints for a resource in an electronic device
15129286459Authorized remote access to an operating system hosted by a virtual machine
15139286458Systems and methods for online identity verification
15149286457Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties
15159286455Real identity authentication
15169286454Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method
15179286447Portable digital vault and lending of same
15189286446Domain spanning applications
15199286301Approach for managing access to electronic documents on network devices using document analysis, document retention policies and document security policies
15209282108Generalized certificate use in policy-based secure messaging environments
15219282107Secure verification of website claims
15229282106Authenticated communication between security devices
15239282097Systems and methods for providing single sign on access to enterprise SAAS and cloud hosted applications
15249282095Security and privacy enhancements for security devices
15259282093Synchronizing credential hashes between directory services
15269282090Methods and systems for identity verification in a social network using ratings
15279282083Encryption system and method
15289281949Device using secure processing zone to establish trust for digital rights management
15299281948Revocation information for revocable items
15309281947Security mechanism within a local area network
15319281946Authentication system for gaming machines
15329281945Offline methods for authentication in a client/server authentication system
15339280765Multiple tokenization for authentication
15349280657Apparatus and method for managing passwords
15359280651Securely handling server certificate errors in synchronization communication
15369280337Secured distribution of software updates
15379277463Method and system for managing security in mobile communication system
15389277407Methods for authentication using near-field
15399277406Methods and system for secure communication between an RFID tag and a reader
15409276980Data synchronization based on file system activities
15419276957Systems and methods for handling SSL session not reusable across multiple cores
15429276944Generalized certificate use in policy-based secure messaging environments
15439276933Security token caching in centralized authentication systems
15449276930Device for controlling network user data
15459276928Sending session tokens through passive clients
15469276921System and method for establishing a communication session
15479276918Computer-readable medium, information processing device, information processing method and information processing system
15489276912Dispersed storage network with slice refresh and methods for use therewith
15499276911Secure and scalable mapping of human sequencing reads on hybrid clouds
15509276887Systems and methods for managing security certificates through email
15519276754Key rotation with external workflows
15529276753System and method for data authentication among processors
15539276752System and method for secure software update
15549276751System and method for circular link resolution with computable hash-based names in content-centric networks
15559276750Secure processing environment measurement and attestation
15569276749Distributed validation of digitally signed electronic documents
15579276748Data-encrypting method and decrypting method for a mobile phone
15589276747Remote profile security system
15599276743Probabilistic key distribution in vehicular networks with infrastructure support
15609276742Unified storage and management of cryptographic keys and certificates
15619276740Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
15629276738Digital tachograph
15639276737Securing a command path between a vehicle and personal wireless device
15649276735Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program
15659275379Method for mutual authentication of a user and service provider
15669275257Secure communication architecture
15679275243Communication between key manager and storage subsystem kernel via management console
15689275241Cryptographic method
15699275219Unauthorized account access lockout reduction
15709275217ID usage tracker
15719274976Code tampering protection for insecure environments
15729274864Accessing large amounts of data in a dispersed storage network
15739274754Program generating apparatus, program generation method and computer readable medium
15749271256Verifying generic broadcast of location assistance data
15759270719Device connection proxy through cloud to optimize network messages
15769270683Storage device authentication
15779270673Terminal device, verification device, key distribution device, content playback method, key distribution method, and computer program
15789270667Utilizing X.509 authentication for single sign-on between disparate servers
15799270666Verification of user communication addresses
15809270663System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added
15819270650System and method for providing secure subnet management agent (SMA) in an infiniband (IB) network
15829270646Systems and methods for generating a DNS query to improve resistance against a DNS attack
15839270471Client-client-server authentication
15849270470Unauthorized contents detection system
15859270469Authentication using public keys and session keys
15869270468Methods to improve secure flash programming
15879270467Systems and methods for trust propagation of signed files across devices
15889270466System and method for temporary secure boot of an electronic device
15899270465Control word protection
15909270464Methods for secure enrollment and backup of personal identity credentials into electronic devices
15919270463Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method
15929270460Instructions to perform JH cryptographic hashing in a 256 bit data path
15939270454Public key generation utilizing media access control address
15949270450Method and device for mutual authentication
15959269094System and method for creating and implementing scalable and effective surveys and testing methods with human interaction proof (HIP) capabilities
15969268968Credential validation
15979268594Processor extensions for execution of secure embedded containers
15989268555Multiple system images for over-the-air updates
15999265960Use case-based services
16009264902Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)
16019264899Binding mobile device secure software components to the SIM
16029264534Methods, systems, and computer-readable media for self-maintaining interactive communications privileges governing interactive communications with entities outside a domain
16039264497System and method for hosting mobile devices for testing in a cloud computing environment
16049264439Systems and methods to generate, preserve, collect, search, and certify authentic original documents
16059264426System and method for authentication via a proximate device
16069264419Two factor authentication with authentication objects
16079264404Encrypting data using time stamps
16089264237Verifying requests for access to a service provider using an authentication component
16099264236Embedded extrinsic source for digital certificate validation
16109264235Apparatus, system and method for verifying server certificates
16119264234Secure authentication of identification for computing devices
16129264233System and method for a log-in procedure for non-readers
16139264232Cryptographic device that binds an additional authentication factor to multiple identities
16149264231System and method of using RFID tag proximity to grant security access to a computer
16159264228System and method for a secure display module
16169264224Systems and methods for secure data sharing
16179264223System and method for distributed security
16189264220Secure virtual machine provisioning
16199262877Access authorization servers, methods and computer program products employing wireless terminal location
16209262876Method for controlling fraud and enhancing security and privacy by using personal hybrid card
16219262655System and method for enhanced RFID instrument security
16229262631Embedded device and control method thereof
16239262620Secure communications kit and client device for securely communicating using the same
16249262617Method for providing software to be used by a control unit of a vehicle
16259262616Simplified multi-factor authentication
16269262592Wireless storage device
16279262247Updating data stored in a dispersed storage network
16289258713Rogue wireless beacon device detection
16299258297Methods, devices, and mediums for securely sharing restricted content
16309258296System and method for generating a strong multi factor personalized server key from a simple user password
16319258130Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property
16329258129Resilient device authentication system
16339258128Systems and methods for creating customer-specific tools for generating certificate signing requests
16349258127System and method for providing cryptographic video verification
16359258126Method for non-repudiation of ad-hoc workflows
16369258125Generating evidence of web services transactions
16379258124Time and event based one time password
16389258123Multi-layered color-sensitive passwords
16399258121Method to manage modification of encryption credentials
16409258117Mutual authentication with symmetric secrets and signatures
16419258113Username based key exchange
16429258111Memory device which protects secure data, method of operating the memory device, and method of generating authentication information
16439256763Method and system for providing a public key/secret key pair for encrypting and decrypting data
16449256750Secure credential unlock using trusted execution environments
16459256728Method, apparatus, and computer program product for managing software versions
16469256721Mobile wireless hand-held biometric capture, processing and communication system and method for biometric identification
16479256613Systems, methods, and computer program products for secure multi-enterprise storage
16489256210Safe method for card issuing, card issuing device and system
16499253633Method and mobile device for generating a data authentication key
16509253530Stream data management program, method and system
16519253200Programming vehicle modules from remote devices and related methods and systems
16529253199Verifying authenticity of a sender of an electronic message sent to a recipient using message salt
16539253179Managing security restrictions on a resource in a defined environment
16549253178Method and apparatus for authenticating a communication device
16559253177Authentication system, information registration system, server, program, and authentication method
16569253169Memory and storage devices to be authenicated using a host device, authenication system and host device
16579253162Intelligent card secure communication method
16589253087Principal-identity-domain based naming scheme for information centric networks
16599252960System for establishing a cryptographic key depending on a physical system
16609252959Challenging a first terminal intending to communicate with a second terminal
16619252958Systems and methods for providing a self-maintaining PKI infrastructure among loosely connected entities
16629252957Method for preventing laundering and repackaging of multimedia content in content distribution systems
16639252956Method and system for transmitting control data in a manner that is secured against manipulation
16649252955Apparatus and methods for the secure transfer of electronic data
16659252952Gesture-based encryption methods and systems
16669252949Broadcast encryption based media key block security class-based signing
16679252948Broadcast encryption based media key block security class-based signing
16689252946Method and system to securely migrate and provision virtual machine images and content
16699252945Method for recognizing a manipulation of a sensor and/or sensor data of the sensor
16709252941Enhanced digital signatures algorithm method and system utilitzing a secret generator
16719251385Computer system for accessing confidential data by means of at least one remote unit and remote unit
16729251383Device for preventing logging of computer on-screen keyboard
16739251372Secure service for receiving sensitive information through nested iFrames
16749251366Augmented reality based privacy and decryption
16759251365Trusted storage systems and methods
16769251332Security system and method for controlling access to computing resources
16779251326Personal digital key initialization and registration for secure transactions
16789251325Verifying passwords on a mobile device
16799251319Method and apparatus for using non-volatile storage device
16809250870Automated creation of shim programs and interfaces
16819247432Systems and methods for controlling network access
16829247429Key derivation
16839247311Systems and methods for playing back alternative streams of protected content protected using common cryptographic information
16849247024Controlled activation of function
16859246929Providing a fast, remote security service using hashlists of approved web objects
16869246925Method and system for third-party service platform login
16879246909Image authentication and retrieval processing device and method
16889246907Confidence-based authentication discovery for an outbound proxy
16899246905Authentication within openflow network
16909246901Secure network computing
16919246900Using a single certificate request to generate credentials with multiple ECQV certificates
16929246897Method and system of login authentication
16939246889Layered protection and validation of identity data delivered online via multiple intermediate clients
16949246888Systems and methods for secure communication over an unsecured communication channel
16959246882Method and apparatus for providing a structured and partially regenerable identifier
16969246881Method and system for securing the exchange of data between a client module and a server module
16979246691System, method and apparata for secure communications using an electrical grid network
16989246690Secure execution environment services
16999246689Component management via secure communications
17009246688Dataset licensing
17019246687Method for authorizing and authenticating data
17029246686Salt value service
17039246685Automated password authentication
17049246684Data protection system and method
17059246682Communication apparatus, method for controlling communication apparatus, and program
17069246679Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks
17079246677Method and system for secure data communication between a user device and a server
17089246673Taste-based authentication to securely share data
17099245266Auditable privacy policies in a distributed hierarchical identity management system
17109245154System and method for securing input signals when using touch-screens and other input interfaces
17119245152Method for authenticating a storage device, machine-readable storage medium, and host device
17129245139Non-retained message system
17139245133Authentication method and system
17149245107Systems and methods for determining a strength of a created credential
17159241264Network access authentication for user equipment communicating in multiple networks
17169241003Methods, systems, and computer program products for authenticating an entity through use of a global identity of the entity that serves as a proxy for one or more local identities of the entity
17179241001Method and apparatus for providing service using personal network
17189240999Managed virtual point to point communication service having verified directory, secure transmission and controlled delivery
17199240981System and method for authenticating identity of discovered component in an infiniband (IB) network
17209240980Management of group secrets by group members
17219240979Distributing keypairs between network appliances, servers, and other network assets
17229240891Hybrid authentication
17239240890Computerized system and method for deployment of management tunnels
17249240889Method and system for secure data access among two devices
17259240888Authentication system for gaming machines
17269240887Off-host authentication system
17279240886Authentication adaptation
17289240884Method and apparatus for verifiable generation of public keys
17299240880Distributed data storage device
17309240089Systems and methods for time variable financial authentication
17319239920Generation of working security key based on security parameters
17329239912Method, manufacture, and apparatus for content protection using authentication data
17339239748Comparator circuitry coupled to first, second time stamp overlap bits
17349237149Certificate based distributed policy enforcement
17359237148System and method for displaying a security encoding indicator associated with a message attachment
17369237135Trusted and confidential remote TPM initialization
17379237134Communicating in a peer-to-peer computer environment
17389237133Detecting matched cloud infrastructure connections for secure off-channel secret generation
17399237022Use of multiple digital signatures and quorum rules to verify aircraft information
17409237021Certificate grant list at network device
17419237020Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
17429237019Resource locators with keys
17439237018Multisystem biometric token
17449237017Lightweight authentication for on-premise rich clients
17459237016System and method for wiping encrypted data on a device having file-level content protection
17469237015Compact and efficient communication security through combining anti-replay with encryption
17479237010Secure transmission of a message
17489237009Disrupting offline password attacks
17499235838System and method for secure downhole intelligent completions
17509235834Interoperable systems and methods for peer-to-peer service orchestration
17519235833Interoperable systems and methods for peer-to-peer service orchestration
17529235732Secure communication methods
17539235731Trusted data relay
17549235725Client computer for querying a database stored on a server via a network
17559235708System and method for supporting full volume encryption devices in a client hosted virtualization system
17569235699Computer system and method of controlling computer
17579235697One-time passcodes with asymmetric keys
17589235204Method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure
17599232403Mobile device with common secure wireless message service serving multiple applications
17609232400Restricted certificate enrollment for unknown devices in hotspot networks
17619232398Method and apparatus for link setup
17629232024Communicating an identity to a server
17639231959Multiple transaction interface framework
17649231947RFID authentication architecture and methods for RFID authentication
17659231933Providing application programs with access to secured resources
17669231928Validation method and system for use in securing nomadic electronic transactions
17679231924Gesture-initiated encryption using error correction coding
17689231770Combined digital certificate
17699231769Systems and methods for providing interfaces for creating transport layer security certificates
17709231768Utilizing a deterministic all or nothing transformation in a dispersed storage network
17719231767Identification of content by metadata
17729231766Information processing device and information processing program
17739231765Trusted device
17749231764Methods and systems of data security in browser storage
17759231763System and method for providing a multi-credential authentication protocol
17769231762Method of secure communication, controlled device, and control program
17779231759Internet key exchange protocol using security associations
17789231757Proxy signature scheme
17799230630Physically unclonable function based on the initial logical state of magnetoresistive random-access memory
17809230455Steganographic embedding of executable code
17819230374Access management and reporting technology
17829230135Secure access for sensitive digital information
17839230133Secure access for sensitive digital information
17849230097Method and system for detecting data modification within computing device
17859230090Storage device, and authentication method and authentication device of storage device
17869230084Method and system for enabling secure one-time password authentication
17879230039Adaptive data transformation engine
17889229823Storage and retrieval of dispersed storage network access information
17899229489Adjusting mobile device state based on user intentions and/or identity

2015

17909226153Integrated IP tunnel and authentication protocol based on expanded proxy mobile IP
17919226144Systems and methods of performing link setup and authentication
17929226143Controlling application access to mobile device functions
17939226043Displaying content associated with code embedded in an image
17949225754Ad-hoc network communications
17959225746Timestamp systems and methods
17969225745Proposal system access policy enforcement
17979225743Automatic generation of policy from a group of SSL server certificates
17989225729Blind hash compression
17999225728Method and device for anonymous entity identification
18009225722Image forming system, image forming apparatus, and recording medium
18019225716Multiple authentication mechanisms for accessing service center supporting a variety of products
18029225714Spatial and temporal verification of users and/or user devices
18039225706Multiple access point zero sign-on
18049225699Security key generation in link aggregation group topologies
18059225693Major management apparatus, authorized management apparatus, electronic apparatus for delegation management, and delegation management methods thereof
18069225691Deduplication of encrypted dataset on datadomain backup appliance
18079225533System and method for interapplication communications
18089225532Method and system for providing registration of an application instance
18099225531Automated test to tell computers and humans apart
18109225530Secure crypto-processor certification
18119225529Encrypted virtual machines in a cloud
18129225528Broadband certified mail
18139225527Hidden plug-in storage drive for data integrity
18149225526Multifactor username based authentication
18159225525Identity management certificate operations
18169225524Forwarding e-mail from a wireless device
18179225523Authentication system and authentication method
18189225519Method, system, and apparatus for enabling secure functionalities
18199225518Method of providing fresh keys for message authentication
18209225517Secure device association
18219225516Combined authentication and encryption
18229225513Authenticator, authenticatee and authentication method
18239224182Medical and personal data retrieval system
18249224135Method and apparatus for adaptive configuration for translation of business messages
18259224011Embedded system, information processing unit, and image forming apparatus
18269224005Cloud key directory for federating data exchanges
18279224003Method for secure storing and sharing of a data file via a computer communication network and open cloud services
18289223949Secure transformable password generation
18299223617Methods and systems for migrating networked systems across administrative domains
18309219778Resource upload
18319219762Techniques for desktop migration
18329219730Securing a secret of a user
18339219725Method, apparatus, and system for sending credentials securely
18349219718System and method for supporting sub-subnet in an infiniband (IB) network
18359219715Mediator utilizing electronic content to enforce policies to a resource
18369219714ID-based encryption and signature method and terminal
18379219713Electronic electricity meter with integrated digital-certification mechanism for secure communication
18389219612Method of mutually authenticating a reader and a radio tag
18399219611Systems and methods for automating cloud-based code-signing services
18409219610Method for securing messages
18419219609Method and system for multiple passcode generation
18429219608Apparatus and method for sharing contents of Social Network Service in communication system
18439219607Provisioning sensitive data into third party
18449219602Method and system for securely computing a base point in direct anonymous attestation
18459218813Voice and/or facial recognition based service provision
18469218500System and method for automatic data protection in a computer network
18479218498Method of verifying the validity of an electronic parking ticket
18489218493Key camouflaging using a machine identifier
18499218475Scalable groups of authenticated entities
18509215700Counter check and reconfiguration method, apparatus, and system
18519215273Apparatus for enabling delivery and access of applications and interactive services
18529215268System and method for selection and switching of content sources for a streaming content session
18539215244Context aware network security monitoring for threat detection
18549215238System and method for transmitting and utilizing attachments
18559215230Method for authentication, RF chip document, RF chip reader and computer program products
18569215220Remote verification of attributes in a communication network
18579215076Key generation for hierarchical data access
18589215075System and method for secure relayed communications from an implantable medical device
18599215074Expressing intent to control behavior of application components
18609215073Key insulation method and device
18619215072Back-end matching method supporting front-end knowledge-based probabilistic authentication systems for enhanced credential security
18629215071Validating a system with multiple subsystems using trusted platform modules and virtual platform modules
18639215070Method for the cryptographic protection of an application
18649215069Methods and apparatus for device authentication with one-time credentials
18659215065Media player security for full length episodes
18669214214Physically unclonable function based on the random logical state of magnetoresistive random-access memory
18679214183Secure storage
18689213975Adaptive policies and protections for securing financial transaction data at rest
18699213971Method and system for providing information on pre-purchase and post-purchase items using RFID and computer-readable storage media storing programs for executing the method
18709213867Secure cloud database platform with encrypted database queries
18719213855Trusted user circles
18729213846Using flash storage device to prevent unauthorized use of software
18739213818Anonymous authentication using backup biometric information
18749213696Methods and systems for securely accessing translation resource manager
18759213380Mapping computers and ports of power distribution units in a data center
18769210483Method and apparatus for watermarking an AC-3 encoded bit stream
18779210172Method and system for establishing a communications pipe between a personal security device and a remote computer system
18789210166Applying a partial password in a multi-factor authentication scheme
18799210163Method and system for providing persistence in a secure network access
18809210162Certificate based connection to cloud virtual machine
18819210145Method and system for hypertext transfer protocol digest authentication
18829210141System and method for providing scorecards to visualize services in an intelligent workload management system
18839210138Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)
18849210137Local digital network, methods for installing new devices and data broadcast and reception methods in such a network
18859210133Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
18869209980Provisioning a shared secret to a portable electronic device and to a service entity
18879209979Secure network cloud architecture
18889209978Methods and apparatus to measure exposure to streaming media
18899209977Processing messages received at a vehicle
18909209976Method and system for restricting execution of virtual applications to a managed process environment
18919209975Secure access of electronic documents and data from client terminal
18929209972Mediator device monitoring and controlling access to electronic content
18939208491Format-preserving cryptographic systems
18949208355Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry
18959208350Certificate information verification system
18969208346Persona-notitia intellection codifier
18979208335Space-time separated and jointly evolving relationship-based network access and data protection system
18989208302Multi-factor authentication using biometric data
18999204374Multicarrier over-the-air cellular network activation server
19009204298Multilevel authentication
19019204296Apparatus and methods for key generation
19029203980Unit using operating system and image forming apparatus using the same
19039203905Sessionization of visitor activity
19049203842Establishing connections for secure element communications
19059203839User authentication method and apparatus
19069203836Token for securing communication
19079203835Systems and methods for authenticating a user based on a biometric model associated with the user
19089203833User authorization using an automated Turing Test
19099203829Unified user login
19109203827Methods for determining authentication requirements of information centric network based services and devices thereof
19119203813Content distribution method, content distribution system, source device, and sink device
19129203812Dispersed storage network with encrypted portion withholding and methods for use therewith
19139203811Authenticated encryption support in ISO/IEC 23009-4
19149203789Method and system for publishing an electronic file attached to an electronic message
19159203627Systems and methods for flash crowd control and batching OCSP requests via online certificate status protocol
19169203626User authentication system and method for encryption and decryption
19179203625Transferring encoded data slices in a distributed storage network
19189203624Authentication and notification heuristics
19199203623Apparatus and methods for keyword proximity matching
19209203621Policy-based data management
19219203620System, method and apparatus for secure use of cryptographic credentials in mobile devices
19229203617Secure provisioning of integrated circuits at various states of deployment, methods thereof
19239203616Multi-server fault tolerant data store update
19249203613Techniques for client constructed sessions
19259203607Keyless challenge and response system
19269203260Secure wireless charging
19279202328Authentication verifying method, authentication verifying member and authentication verifying member producing method
19289202256Methods and apparatus for embedding watermarks
19299202218Processing electronic mail replies
19309202215Method and system for handling sensitive data in a content delivery network
19319202179Device to document processes
19329202083Systems and methods for verifying uniqueness in anonymous authentication
19339202042Automatic device pairing
19349202040Chip authentication using multi-domain intrinsic identifiers
19359202032Methods and systems for authenticating users
19369202028Methods and systems for authenticating users
19379202023Digital rights management method
19389201811Device and authentication method therefor
19399201131Secure routing based on degree of trust
19409198117Network system with common secure wireless message service serving multiple applications on multiple wireless devices
19419198044Front end filter control for shared access system
19429198036Method for providing application service
19439198033Method and apparatus for authenticating nodes in a wireless network
19449197746System, method and apparatus for authenticating calls
19459197700Keychain syncing
19469197668Access control to files based on source information
19479197655Steganography detection
19489197637Method of comparing private data without revealing the data
19499197636Devices, systems and methods for security using magnetic field based identification
19509197635Remote verification of user presence and identity
19519197634Server and/or client device authentication
19529197631Digital certificate issuer-correlated digital signature verification
19539197618Method and apparatus for location-based authorization to access online user groups
19549197611Topic protection policy for publish-subscribe messaging system
19559197606Monitoring network performance of encrypted communications
19569197491Primitive functions for use in remote computer management
19579197422System and method for differential encryption
19589197421Methods and apparatus to measure exposure to streaming media
19599197420Using information in a digital certificate to authenticate a network of a wireless access point
19609197419Security system for data stored in the cloud
19619197418Communication system for authenticating messages with uniquely specified genuine information
19629197417Hosted application sandbox model
19639197416Verification apparatus, verification program, and verification method
19649197415Method and apparatus of cipher communication for management frame using quality of service mechanism in wireless local area network system
19659197414Cryptographic protocol for portable devices
19669197413Hybrid secure communication system and method
19679197411Protocol and method for client-server mutual authentication using event-based OTP
19689197409Key derivation techniques
19699197406Key management using quasi out of band authentication architecture
19709195845Trusted and secure techniques for item delivery and execution
19719195836Techniques for secure data management in a distributed environment
19729195830System and method for unattended computer system access
19739195813Secure gesture
19749191818Methods and devices for OTA management of subscriber identity modules
19759191772Bluetooth connection method and system
19769191380System and method for managing information technology models in an intelligent workload management system
19779191379Method and apparatus for authenticating multicast messages
19789191376Securing digital content system and method
19799191371Network coding-based anonymous communication
19809191324MAC aggregation with message multiplicity for use in a multi-node data network
19819191291Detection and handling of aggregated online content using decision criteria to compare similar or identical content items
19829191215Method and apparatus for providing authentication using policy-controlled authentication articles and techniques
19839191214Procedure for a multiple digital signature
19849191213Methods and systems for messaging with physical presence and temporal verifications
19859191212Controlling application access to mobile device functions
19869191211Data security system
19879191210Authenticator, authenticatee and authentication method
19889191209Efficient communication for devices of a home network
19899191208Schemes for signcryption
19909191203Secure industrial control system
19919191202Information processing device and computer program product
19929191198Method and device using one-time pad data
19939189820Methods and systems for creating monetary accounts for members in a social network
19949189642Safe processing of on-demand delete requests
19959189638Systems and methods for multi-function and multi-purpose cryptography
19969189617Apparatus and method for implementing zero-knowledge proof security techniques on a computing platform
19979189616Authentication method between client and server, machine-readable storage medium, client and server
19989189605Protected computing environment
19999189603Kill switch security method and system
20009185555Method for authentication of a wireless backup system for an optical network unit
20019185206Secured communication via location awareness
20029185169Methods, systems, and computer-readable media for self-learning interactive communications privileges for governing interactive communications with entities outside a domain
20039185115Secure access using location-based encrypted authorization
20049185108Token sharing system and method
20059185107Securing passwords with hash value
20069185106Access control method and mobile terminal which employs an access control method
20079185105System and method for single sign-on session management without central server
20089185104Method and apparatus for communication, and method and apparatus for controlling communication
20099185097Method and system for traffic engineering in secured networks
20109185094Systems, methods and apparatuses for the secure transmission and restricted use of media content
20119185089System and method for key management for issuer security domain using global platform specifications
20129185087Medical device communication using encryption based on correlated motion
20139184921Input challenge based authentication
20149184920Federated digital rights management scheme including trusted systems
20159184919Systems and methods for generating and using multiple pre-signed cryptographic responses
20169184918Trusted hardware for attesting to authenticity in a cloud environment
20179184917Method and system for registering a DRM client
20189184916System and method for using a streaming protocol
20199184915Strong authentication token with acoustic data input over multiple carrier frequencies
20209184914Information processing apparatus and information processing method
20219184913Authenticating a telecommunication terminal in a telecommunication network
20229184910Distributed single sign on technologies including privacy protection and proactive updating
20239183717RFID loss-prevention using synthesized-beam readers
20249183411Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption
20259183374Techniques for identity-enabled interface deployment
20269183369Thumb drive guest user
20279183357Recording/reproducing system, recording medium device, and recording/reproducing device
20289183159Authentication method
20299183158System and method for hardware based security
20309179316Mobile device with user controls and policy agent to control application access to device location data
20319179315Mobile device with data service monitoring, categorization, and display for different applications and networks
20329179311Securing vehicle service tool data communications
20339179308Network tools for analysis, design, testing, and production of services
20349179303Methods and apparatus for transmitting and receiving secure and non-secure data
20359179005Producing routing messages for voice over IP communications
20369178894Secure routing based on the physical locations of routers
20379178890Passwordless strong authentication using trusted devices
20389178881Proof of device genuineness
20399178875Method for authenticating an OTP and an instrument therefor
20409178871Authentication and authorization method and system
20419178870User authentication method using self-signed certificate of web server, client device and electronic device including web server performing the same
20429178858Method and system for message delivery security validation
20439178855Systems and methods for multi-function and multi-purpose cryptography
20449178708Non-deterministic time systems and methods
20459178707Policy based signature authentication system and method
20469178706Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion
20479178705Method and system for stateless validation
20489178704Input consistency verification for server assisted secure function evaluation
20499178702Revocation list generation device, revocation list generation method, and content management system
20509178701Parameter based key derivation
20519178700Information processing apparatus, information processing method, program, and recording medium
20529178699Public key encryption algorithms for hard lock file encryption
20539177489Digital rights convergence place chaser
20549177488Method, system and program product for securing data written to a storage device coupled to a computer system
20559177345One-to-many electronic signature process
20569177316Mobile monetary transactions and banking for rural populations
20579177159Secure data parser method and system
20589177126System and method for human identity validation via a mobile device
20599176707Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program
20609173097Techniques for auto-authentication
20619172835Information processing apparatus, information processing system, image forming apparatus, image forming system, and computer readable medium
20629172713Secure domain name system
20639172711Originator publishing an attestation of a statement
20649172705System and method for remote, interactive network and browsing supervision, monitoring, and approval
20659172688Secure shell authentication
20669172682Local authentication in proxy SSL tunnels using a client-side proxy agent
20679172547Apparatus and method for signature verification
20689172546Network mediated multi-device shared authentication
20699172545Systems and methods for evaluating and prioritizing responses from multiple OCSP responders
20709172544Systems and methods for authentication between networked devices
20719172543Determining CRL size in view of system capability
20729172542System and method to pass a private encryption key
20739172541System and method for pool-based identity generation and use for service access
20749172540System and method for processing encoded messages for exchange with a mobile data communication device
20759172539In-market personalization of payment devices
20769172536Audio communication based electronic signature system and method thereof
20779172535Key implementation system
20789172531Information processing apparatus and method
20799172480Radio-frequency communication controlled by a microcircuit
20809171810Electronic device incorporating a randomized interconnection layer having a randomized conduction pattern
20819171324Hybrid virtual account and token-based digital cash protocols
20829171191Method for dynamic authentication between reader and tag, and device therefor
20839171142Arrangements for identifying users in a multi-touch surface environment
20849171136Data protection method and device
20859168604Device and method for thermally treating workpieces in particular by convective heat transfer
20869167429Visible light communication system, communication terminal and server
20879167314Embedding information in an image
20889167099Computational systems and methods for identifying a communications partner
20899166977Secure text-to-speech synthesis in portable electronic devices
20909166971Authentication using an external device
20919166969Session certificates
20929166957Digital file authentication using biometrics
20939166893Methods, apparatus and systems for monitoring locations of data within a network service
20949166800Authentication method, authentication system, and authentication chip using common key cryptography
20959166799IMS security for femtocells
20969166798System and method for secure provisioning of an information handling system
20979166797Secured compartment for transactions
20989166796Secure biometric cloud storage system
20999166795Device and method for forming a signature
21009166794Securing private key access for cross-component message processing
21019166793Efficient authentication for mobile and pervasive computing
21029166792Data management device, power usage calculation system, data management method, and computer program product
21039166790Commission information generator for making processes on communication performed by another computer
21049166786Personal portable secured network access system
21059166782Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
21069166781Key change management apparatus and key change management method
21079166780Information processing apparatus and method
21089166779System and method of secure encryption for electronic data transfer
21099166777Method and system for user authentication for computing devices utilizing PKI and other user credentials
21109165297Virtual account and token-based digital cash protocols
21119165154Trusted cloud computing and services framework
21129165153System and method for protecting secrets file
21139165135Systems and methods using cryptography to protect secure computing environments
21149165122Content reproducing device, content reproducing method, and content reproducing system
21159164927Integrated circuit and memory data protection apparatus and methods thereof
21169164926Security control method of network storage
21179164725Apparatus and method for calculating an SHA-2 hash function in a general purpose processor
21189164719Method and apparatus for obtaining status information from a device
21199160972Digital signature system and digital signing method
21209160754Location based authentication of users to a virtual machine in a computer system
21219160740Establishing secure, mutually authenticated communication credentials
21229160737Statistical security for anonymous mesh-up oriented online services
21239160734Service activation using algorithmically defined key
21249160732System and methods for online authentication
21259160731Establishing a trust relationship between two product systems
21269160728Message sending/receiving method
21279160722System and method for securing user information on social networks
21289160720Digital rights management of streaming contents and services
21299160546Authenticating users based upon an identity footprint
21309160545Systems and methods for A2A and A2DB security using program authentication factors
21319160544Providing secure access to computing resources in a cloud computing environment
21329160543Verification of aircraft information in response to compromised digital certificate
21339160542Authorizing use of a test key signed build
21349160541Method and system for authenticating an accessory
21359160540Preventing playback of streaming video if ads are removed
21369160539Methods and apparatus for secure, stealthy and reliable transmission of alert messages from a security alerting system
21379160538Detection method for fraudulent mail, detection program therefor, and detection device therefor
21389160537Methods for secure restoration of personal identity credentials into electronic devices
21399160536Verification of authenticity and responsiveness of biometric evidence and/or other evidence
21409160535Truly anonymous cloud key broker
21419160534Authenticator, authenticatee and authentication method
21429160532Dynamic seed and key generation from biometric indicia
21439160531Host device, semiconductor memory device, and authentication method
21449160530Method and apparatus for verifiable generation of public keys
21459160528Distributed single sign on technologies including privacy protection and proactive updating
21469160522System and method for verifying the identity of an individual by employing biometric data features associated with the individual
21479159179Common access card security and document security enhancement
21489159113Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
21499158939Security chip, program, information processing apparatus, and information processing system
21509158937Information processing device and information processing program
21519158912Method and apparatus for a virtual machine hosting network with user devices
21529158906Authenticating a device and a user
21539158549Method, apparatus and system for binding MTC device and UICC
21549158467Optional data encryption by partition for a partitionable data storage library
21559154948Method and system for user authentication
21569154947Secure home-to-vehicle wireless connectivity
21579154946Secure coupling of hardware components
21589154815Method and system for securing multimedia data streamed over a network
21599154505Simplified login for mobile devices
21609154494Self-signed implicit certificates
21619154479Secure proxy
21629154477Systems and methods for encrypting mobile device communications
21639154475User authentication and authorization in distributed security system
21649154472Method and apparatus for improving security during web-browsing
21659154465Protecting privacy when communicating with a web server
21669154310Resilient device authentication system
21679154309Method and system for running encrypted files
21689154308Revocable platform identifiers
21699154307System, apparatus, application and method for bridging certificate deployment
21709154306Privacy-preserving flexible anonymous-pseudonymous access
21719154305State-based compliance verification in a connected system
21729154304Using a token code to control access to data and applications in a mobile platform
21739154303Third-party authorization of user credentials
21749154302System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number
21759154301Location information verification
21769154296Secure and anonymous distributed authentication
21779152868Personal identification combining proximity sensing with biometrics
21789152805Security device
21799152794Secure key handling for authentication of software for a system-on-chip
21809152779Protecting codes, keys and user credentials with identity and patterns
21819152772Device and portable storage device which are capable of transferring rights object, and a method of transferring rights object
21829152579Meta-complete data storage
21839152505Verified hardware-based erasure of data on distributed systems
21849148700Remotely defining security data for authorization of local application activity
21859148446Selective modification of encrypted application layer data in a transparent security gateway
21869148429Controlling access by web applications to resources on servers
21879148423Personal identification number (PIN) generation between two devices in a network
21889148422Method and system for enhanced wireless network security
21899148421Method and system for encryption of messages in land mobile radio systems
21909148419User administering a trustworthy workspace
21919148417Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment
21929148414Credential management in a multi-tenant environment
21939148407Selectively performing man in the middle decryption
21949148404System for accessing data of cloud database using transparent technology
21959148335Third party validation of internet protocol addresses
21969148308Apparatus for reducing network traffic in a communication system
21979148286Protecting against counterfeit electronic devices
21989148285Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
21999148284Identification and/or authentication method
22009148283Storing encrypted objects
22019147315Secure game download
22029147064Method for carrying out an application with the aid of a portable data storage medium
22039147061Multi-level authentication
22049146881Mobile data vault
22059143933Communication device that receives external device information from an external device using near field communication
22069143508Service location based authentication
22079143505Image collection based information security method and system
22089143496Device authentication using device environment information
22099143494Method and apparatus for accessing a network
22109143487System and method for massive controlled and secured update of devices firmware
22119143331Methods and devices for authentication and key exchange
22129143330Efficient and secure data currentness systems
22139143329Content integrity and incremental security
22149143328System and method for providing a system management command
22159143322Communication apparatus, data communication method, and network system
22169143319Mechanism for managing authentication device lifecycles
22179143318Secure recoverable offline storage of a shared secret
22189142250System and method for preventing illegal copy
22199142096Methods and devices for authentication and licensing in a gaming network
22209142069Systems and methods for access control
22219141959Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously
22229141953Personal token read system and method
22239141952EGM authentication mechanism using multiple key pairs at the bios with PKI
22249141945Secure distributed single action payment system
22259141824Dynamic database update in multi-server private information retrieval scheme
22269141823Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
22279141816Authenticating a replaceable printer component
22289141815System and method for intelligence based security
22299141802Computing device boot software authentication
22309141788Software self-checking systems and methods
22319141782Authentication using a wireless mobile communication device
22329141779Usable security of online password management with sensor-based authentication
22339141372Secure and interruptible transfer of a map update package to a navigation device
22349141309Versioning-capable data storage devices
22359141090Access code management systems
22369137739Network based service policy implementation with network neutrality and user privacy
22379137690Multiple protocol session record mapper
22389137658Electronic key registration system
22399137623Method and system for realizing concurrent access of multi-kinds of bearer protocols on machine-to-machine (M2M) platform
22409137385Determining a time to permit a communications session to be conducted
22419137303Pre-fetching data segments stored in a dispersed storage network
22429137244System and method for generating one-time password for information handling resource
22439137243Authentication system and authentication method
22449137238Pass-sequences
22459137237Automatically generating certification documents
22469137226Authentication method and authentication device for performing group authentication using a group key
22479137221Method of exchanging data such as cryptographic keys between a data processing system and an electronic entity such as a microcircuit card
22489137218Splicing into an active TLS session without a certificate or private key
22499137208Directory server for automatic network information access systems
22509137025Managing data for authentication devices
22519137024System and method for incorporating an originating site into a security protocol for a downloaded program object
22529137023Self-signed certificates for computer application signatures
22539137022Identifying a slice name information error in a dispersed storage network
22549137021Image forming apparatus, secure network system, method for controlling image forming apparatus, and method for updating certificate information
22559137020Authentication method and system
22569137019Secure wireless charging
22579137018Method and system for providing a generic program guide data from a primary content provider to a user network device through a partner service provider
22589137017Key recovery mechanism
22599137016Key pair updates based on digital signature states
22609137012Wireless authentication methods and apparatus
22619135833Process for selecting compressed key bits for collision resolution in hash lookup table
22629135820Communication system, vehicle-mounted terminal, roadside device
22639135763System and method for wireless state identification
22649135761Method of migrating RFID transponders in situ
22659135608Systems and methods for constructing a local electronic medical record data store using a remote personal health record server
22669135459Security management unit, host controller interface including same, method operating host controller interface, and devices including host controller interface
22679135456Secure data parser method and system
22689135430Digital rights management system and method
22699135425Method and system of providing authentication of user access to a computer resource on a mobile device
22709135424Secure identity binding (SIB)
22719134998Enforcing alignment of approved changes and deployed changes in the software change life-cycle
22729134413Method of measuring distance bound using radio frequency identification (RFID) and system thereof
22739132790In-vehicle network system
22749131374Knowledge-based authentication for restricting access to mobile devices
22759131008Discovery profile based unified credential processing for disparate security domains
22769130991Processing data packets in performance enhancing proxy (PEP) environment
22779130974System and method for limiting spyware activity
22789130973Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program
22799130935System and method for providing access credentials
22809130931Method for reading an attribute from an ID token
22819130925Personalized security management
22829130758Renewal of expired certificates
22839130757Method for authenticated communication in dynamic federated environments
22849130756Managing secure content in a content delivery network
22859130755Cross enterprise communication
22869130754Systems and methods for securely transmitting and receiving discovery and paging messages
22879130753Authentication using security device with electronic interface
22889129536Circuit for secure provisioning in an untrusted environment
22899129122Signature verification apparatus, signature verification method, program, and recording medium
22909129104System and method of security management for a virtual environment
22919129097Systems and methods for auditing software usage using a covert key
22929129089Digital rights management with persistently-unencrypted content
22939129086Providing security services within a cloud computing environment
22949128782Consolidated data services apparatus and method
22959124930In-circuit security system and methods for controlling access to and use of sensitive data
22969124637Data protection for keychain syncing
22979124577Method for assembling authorization certificate chains
22989124576Configuring a valid duration period for a digital certificate
22999124561Method of transferring the control of a security module from a first entity to a second entity
23009124434Securing a computing device accessory
23019124433Remote authentication and transaction signatures
23029124432Host device and authentication method for host device
23039124431Evidence-based dynamic scoring to limit guesses in knowledge-based authentication
23049124422System and method for digital rights management with secure application-content binding
23059124419Method, device, and system of secure entry and handling of passwords
23069123194Print medium, card creation method, and program
23079122894Method and apparatus for encryption
23089122882Method and apparatus of securely processing data for file backup, de-duplication, and restoration
23099122876Methods for firmware signature
23109122870Methods and apparatus for validating communications in an open architecture system
23119122862Password input method using visual object
23129122860Device and method for identification and authentication
23139122846Document verification with distributed calendar infrastructure
23149122504Apparatus and method for encryption in virtualized environment using auxiliary medium
23159119167Generic broadcast of location assistance data
23169119070Method and system for detecting unauthorized wireless devices
23179118718Techniques to monitor connection paths on networked devices
23189118699Communications methods and apparatus for use in communicating with communications peers
23199118691Content distribution with mutual anonymity
23209118673Methods and systems for secure key entry via communication networks
23219118672Back-end constrained delegation model
23229118668Authenticated remote pin unblock
23239118667System and method for accessing private networks
23249118666Computing device integrity verification
23259118664Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords
23269118662Method and system for distributed off-line logon using one-time passwords
23279118648Method for authorizing access to protected content
23289118645Distributed authentication using persistent stateless credentials
23299118643Authentication and data integrity protection of token
23309118641De-identifying medical history information for medical underwriting
23319118634Dynamic encryption of a universal resource locator
23329118633Topic protection policy for publish-subscribe messaging system
23339118632Anonymizing emails between sender and recipient
23349118488System and method for controlling access to network services using biometric authentication
23359118487Asymmetric encryption scheme with expiring revocable certificates having a predefined validity period
23369118486Revocation of public key infrastructure signatures
23379118485Using an OCSP responder as a CRL distribution point
23389118484Automatic configuration and provisioning of SSL server certificates
23399118483Communication system, relay device, and non-transitory computer readable medium
23409118467Generating keys using secure hardware
23419118464Set of servers for "machine-to-machine" communications using public key infrastructure
23429118463Distributed single sign on technologies including privacy protection and proactive updating
23439118462Content sharing systems and methods
23449117247Systems methods and computer program products for encoding and decoding tax return data
23459117095Data security for digital data storage
23469117065Dynamic interactive identity authentication method and system
23479117062Stateless and secure authentication
23489113376Multi-interface mobility
23499113333Authenticating a user of a system using near field communication
23509113330Wireless authentication using beacon messages
23519112861Registration and network access control
23529112860Method and apparatus for mutual authentication
23539112855Method for identifying pulse optical signal and device thereof
23549112852Method and apparatus for managing identity for mobile terminal
23559112847Authentication method
23569112844Device credentialing for network access
23579112842Secure authentication and transaction system and method
23589112732Security measures for countering unauthorized decryption
23599112705ID system and program, and ID method
23609112704Systems, methods and apparatuses for securing root certificates
23619112703Use of certificate authority to control a device's access to services
23629112702Alternate authentication
23639112701Wearable device, authentication method, and recording medium
23649112700Personal assistance safety systems and methods
23659112682Generating modular security delegates for applications
23669112681Method and apparatus for secure information transfer to support migration
23679112680Distribution of credentials
23689112678Information processing apparatus and method
23699111292Dynamic messaging in a personal data protection suite
23709111283RFID tag authentication with public-key cryptography
23719111120Method for creating a secure dataset and method for evaluating the same
23729111115Oblivious transfer with hidden access control lists
23739111103Remote access control of storage devices
23749111099Centralized kernel module loading
23759111084Authentication platform and related method of operation
23769111082Secure electronic identification device
23779111081Remote direct memory access authentication of a device
23789110976Supporting compliance in a cloud environment
23799107067Secured communication
23809106882Terminal device, content recording system, title key recording method, and computer program
23819106721Application state synchronization across multiple devices
23829106679Object delivery authentication
23839106648Method and apparatus for data transmission
23849106640Exploiting application characteristics for multiple-authenticator broadcast authentication schemes
23859106638Triggers for session persistence
23869106636Information authentication method and information authentication system
23879106633Systems and methods for authenticating mobile device communications
23889106632Provisioning by delivered items
23899106620Trusted communication session and content delivery
23909106617Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween
23919106426Username based authentication and key generation
23929106425Method and system for restricting execution of virtual applications to a managed process environment
23939106424Method and system for providing users login access to multiple devices via a communication system
23949106423Using positional analysis to identify login credentials on a web page
23959106422System and method for personalized security signature
23969106413Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications
23979106410Identity based authenticated key agreement protocol
23989106408Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program
23999106213Bit generation apparatus and bit generation method
24009105432Apparatus and method for generating digital value
24019105031Authentication mechanisms for wireless networks
24029105027Verification of portable consumer device for secure services
24039104926Systems and methods for performing secure financial transactions
24049104887Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
24059104874Method for detecting the hijacking of computer resources
24069104853Supporting proximity based security code transfer from mobile/tablet application to access device
24079104851Methods and systems for enabling, tracking, and correlating anonymous user activity
24089104842Data protection method and device
24099104691Securing data in a dispersed storage network using an encoding equation
24109104541Obtaining a signed certificate for a dispersed storage network
24119104511Method and computation node for processing application data
24129104400Cryptographic support instructions
24139104243Vehicle operation device
24149103805Environmental measurement display system and method
24159100827Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network
24169100826Method and apparatus for secure access payment and identification
24179100777Method and apparatus for controlling device
24189100419Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program
24199100403Apparatus and methods for providing authorized device access
24209100374Method for managing remote upgrading keys in an information security apparatus
24219100365Web application process
24229100244Registration method and registration apparatus
24239100242System and method for maintaining captive portal user authentication
24249100194Method and apparatus for providing authentication between a sending unit and a recipient based on challenge usage data
24259100193Method for protecting sensor data from manipulation and sensor to that end
24269100192Apparatus and method for provisioning an endorsement key certificate for a firmware trusted platform module
24279100191Combining multiple digital certificates
24289100190Previewing a digital certificate in a graphical user interface
24299100189Secure provisioning in an untrusted environment
24309100188Hardware-based root of trust for cloud environments
24319100187Authenticator
24329100186Secure file sharing method and system
24339100174Secure provisioning in an untrusted environment
24349098882Methods, systems, and products for anonymous loan documents
24359098718Systems and methods for securing data using multi-factor or keyed dispersal
24369098706Installer trust chain validation
24379098684Device and portable storage device which are capable of transferring rights object, and a method of transferring rights object
24389098682Data protection systems and methods
24399098678Streaming video authentication
24409098675Authorized delegation of permissions
24419098440Secure compact flash
24429098301Electronic device and booting method
24439098266Data layer service availability
24449094826Wireless communication system and terminal-device authentication method in wireless communication system
24459094823Data processing for securing local resources in a mobile device
24469094821Method and system for activation of performance enhancements for mobile devices
24479094818Method for cryptographically transmitting data between network nodes using a nonce value
24489094429Server verification of secure electronic messages
24499094413Configuration profile validation on iOS Using SSL and redirect
24509094402Retrieving access information in a dispersed storage network
24519094383Personal security manager for ubiquitous patient monitoring
24529094382Electronic key registration system
24539094376System and method for facilitating communications based on trusted relationships
24549094373Method and apparatus to scale authenticated firewall traversal using trusted routing point
24559094217Secure credential store
24569094216System and method for adjusting the frequency of updating certificate revocation list
24579094215Method and system for digital rights management of documents
24589094214Electronic certificate issue system and method
24599094213Method and system for effecting secure communication over a network
24609094212Multi-server authentication token data exchange
24619094211Systems and methods for identifying an individual
24629094210Systems and methods to secure a virtual appliance
24639094209Electronic transaction security system
24649094208User identity management and authentication in network environments
24659094207Terminal for strong authentication of a user
24669094206Method and system for secure session establishment using identity-based encryption (VDTLS)
24679094205Secure provisioning in an untrusted environment
24689094193Information recording device
24699093128Electronic device with a plurality of memory cells and with physically unclonable function
24709092885Method of processing a text, gesture, facial expression, and/or behavior description comprising a test of the authorization for using corresponding profiles for synthesis
24719092872System and method for creating an animation from a plurality of latent images encoded into a visible image
24729092780User-mediator monitoring and controlling access to electronic content
24739092640Access control for server applications
24749092609Authenticating a rich client from within an existing browser session
24759092385Facilitating access of a dispersed storage network
24769088893Control system, controlled apparatus, and operation control method
24779088891Wireless multi-factor authentication with captive portals
24789088580Access control based on user and service
24799088565Use of a public key key pair in the terminal for authentication and authorization of the telecommunication user with the network operator and business partners
24809088563Using service request ticket for multi-factor authentication
24819088562Using service request ticket for multi-factor authentication
24829088561Method and system for authentication in a computer network
24839088553Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets
24849088421Data transmitting device, data receiving device, and computer-readable storage medium
24859088420System and method for improved geothentication based on a hash function
24869088419Keyed PV signatures
24879088418System and method for updating read-only memory in smart card memory modules
24889088416Method for securely associating data with HTTP and HTTPS sessions
24899088415Authentication of cache DNS server responses
24909088414Asynchronous identity establishment through a web-based application
24919088408Key agreement using a key derivation key
24929087208Persistent key access to album
24939087203Information protection device and information protection method
24949087192Electronic circuit and method for monitoring a data processing
24959087187Unique credentials verification
24969087180Control of access to a secondary system
24979087178System and method for posting content to network sites
24989087016Detecting intentional corruption of data in a dispersed storage network
24999086994Verification of dispersed storage network access control information
25009084233Mobile network having IP multimedia subsystem (IMS) entities and solutions for providing simplification of operations and compatibility between different IMS entities
25019084218Location-based service provider method and system having a user controlled location privacy mechanism
25029083867Device for assigning a geographical position to a picture
25039083754Secure digital communications
25049083753Secure network access control
25059083746Method of providing assured transactions using secure transaction appliance and watermark verification
25069083727Securing client connections
25079083726Automatic content publication and distribution
25089083702System and method for providing internal services to external enterprises
25099083701Method for providing active security authentication, and terminal and system supporting same
25109083697Deriving a username based on a digital certificate
25119083696Trusted peer-based information verification system
25129083686Protocol for program during startup sequence
25139083601Method, system, and computer program product for managing interchange of enterprise data messages
25149083599Method, system and computer program product for providing access policies for services
25159083535Method and apparatus for providing efficient management of certificate revocation
25169083534Method and system for propagating a client identity
25179083533System and methods for online authentication
25189083532Physiological response PIN entry
25199083531Performing client authentication using certificate store on mobile device
25209083530Authentication apparatus, authentication system, authentication method and storage medium
25219083514Distributed single sign on technologies including privacy protection and proactive updating
25229083513Technique for securely communicating and storing programming material in a trusted domain
25239083506Cryptographic processing apparatus and cryptographic processing method, and computer program
25249083323Integrated circuit identification and dependability verification using ring oscillator based physical unclonable function and age detection circuitry
25259083184Battery pack for electric power tool, and battery connection device
25269082514Method and apparatus for physically unclonable function burn-in
25279082279Method for securely dematerializing the transfer of evidence in data-stream production systems, in particular video-surveillance systems
25289082172Device for generating watermark metadata, associated device for embedding watermark
25299082091Unified user login for co-location facilities
25309081989System and method for secure cloud computing
25319081969Apparatus and method for remotely deleting critical information
25329081949Information processor, authentication control method, and storage medium
25339081948Configurable smartcard
25349081635Provision to an application of a random number not generated by an operating system
25359078136Wireless device for group access and management
25369078130Secure reception reporting
25379078129Knowledge-based authentication for restricting access to mobile devices
25389078127Secure Communication Method
25399077854Preventing the use of modified receiver firmware in receivers of a conditional access system
25409077730Restricting network access while connected to an untrusted network
25419077725Configuration profile validation on iOS based on root certificate validation
25429077719Method and system for automatic distribution and installation of a client certificate in a secure manner
25439077714Secure authentication in a multi-party system
25449077713Typeless secure login to web-based services
25459077711Selective complex data entry from one time passwords for authentication
25469077702Flow ownership assignment in a distributed processor system
25479077546Two factor validation and security response of SSL certificates
25489077545Trust management systems and methods
25499077544Automatic provisioning of authentication credentials
25509077543Methods and apparatus for digital attestation
25519077542System and method for confirming that a user of an electronic device is an authorized user of a vehicle
25529077541Methods and systems for storage of large data objects
25539077540Method for verification of decryption processes
25549077539Server-aided multi-party protocols
25559077538Systems and methods for verifying user identities
25569077523Communication system and authentication card
25579077521Method and system for secure communication
25589077509Secure threshold decryption protocol computation
25599076484Methods for estimating playback time and handling a cumulative playback time permission
25609076290Application monetization platform
25619076000Authentication device, authentication method, and program
25629075984Secure system for allowing the execution of authorized computer program code
25639075983More secure image-based "CAPTCHA" technique
25649075962Secure video delivery
25659075653Embedding supplemental consumer data
25669071871Granular tagging of content
25679071637Automated security analytics platform
25689071636Predictive scoring management system for application behavior
25699071602Biometric authentication system and biometric authentication method
25709071601Authority delegate system, server system in authority delegate system, and control method for controlling authority delegate system
25719071599Method and device for securely configuring a terminal
25729071597Secure instant messaging system
25739071595Certificate validity checking
25749071591Authentication method for network connection and network device and network authentication system using the same method
25759071565Optimizing offline message (network history) delivery for users accessing an application from a single device
25769071447Security system and method
25779071446Tamper-protected hardware and method for using same
25789071445Method and system for generating implicit certificates and applications to identity-based encryption (IBE)
25799071444Trusted message storage and transfer protocol and system
25809071443Automated service platform prospecting
25819071442Signcryption method and device and corresponding signcryption verification method and device
25829071441Identification and authorization of communication devices
25839071440Method and system of authenticating the identity of a user of a public computer terminal
25849071439Method and apparatus for remote administration of cryptographic devices
25859071438System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment
25869071437Methods for identifying the guarantor of an application
25879071436Security-activated robotic system
25889071429Revocable shredding of security credentials
25899071426Generating a symmetric key to secure a communication link
25909071422Access authentication method for multiple devices and platforms
25919071416Galois/counter mode encryption in a wireless network
25929070279Electronic key registration system
25939070251Multi-tiered static chain of trust
25949070193Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval
25959070151Systems, methods and devices for trusted transactions
25969069984On-demand authorization management
25979069979LDAP-based multi-tenant in-cloud identity management system
25989069948Methods, systems, and media for measuring quality of gesture-based passwords
25999069943Method and apparatus for token-based tamper detection
26009069940Secure host authentication using symmetric key cryptography
26019069932User-rotatable three-dimensionally rendered object for unlocking a computing device
26029069706Confidential information protection system and method
26039069458Kid mode user interface with application-specific configurability
26049065845Detecting misuse of trusted seals
26059065842Methods and systems for authenticating electronic messages using client-generated encryption keys
26069065823System and method for using a portable security device to cryptograhically sign a document in response to signature requests from a relying party to a digital signature service
26079065656System and methods for managing trust in access control based on a user identity
26089065655Secure password management systems, methods and apparatuses
26099065643System and method for account identifier obfuscation
26109065642Intercepting key sessions
26119065639Device for generating encryption key, method thereof and computer readable medium
26129065636Data encryption system and method
26139065632Message authentication using a universal hash function computed with carryless multiplication
26149064127Systems and methods for securing data in the cloud
26159064102Method, system and device for secured access to protected digital material
26169064101Methods and systems for authenticating one or more users of a vehicle communications and information system
26179064035Medical and personal data retrieval system
26189060277Mobile communication devices, wireless access points, and wireless local area network (WLAN) authentication methods thereof
26199060274Smart card accessible over a personal area network
26209060245Methods and apparatus for collecting and using information regarding location object-based actions
26219059981System, method, and computer program product for security verification of communications to tenants of an on-demand database service
26229059980Systems and methods for authenticating mobile devices
26239059978System and methods for remote maintenance in an electronic network with multiple clients
26249059969Apparatus, method and system for a tunneling client access point
26259059858User characteristic based digital signature of documents
26269059857Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message
26279059856Providing security services on the cloud
26289059855System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves
26299059854Protocol for authenticating functionality in a peripheral device
26309059853System and method for preventing a computing device from obtaining unauthorized access to a secure network or trusted computing environment
26319059852Validating a user's identity utilizing information embedded in a image file
26329059843Information protection apparatus, information protection method, and storage medium
26339059842System and method for grid based cyber security
26349059840Recipient blind cryptographic access control for publicly hosted message and data streams
26359058584Method and apparatus for storage of data for manufactured items
26369058499Systems and methods for managing disclosure of protectable information
26379058482Controlling user access to electronic resources without password
26389058467Distributed computer systems with time-dependent credentials
26399055437Communication system, femtocell base station, authentication apparatus, communication method, and recording medium
26409055349Displaying video retrieved from embedded code in a still image
26419055314Secure transfer of credit card information
26429055107Authentication delegation based on re-verification of cryptographic evidence
26439055073Cross access login controller
26449055061Process of authentication for an access to a web site
26459055059Combining multiple digital certificates
26469055058Method and apparatus for serial device registration
26479055055Provisioning account credentials via a trusted channel
26489055052Method and system for improving storage security in a cloud computing environment
26499055041Device certificate based appliance configuration
26509054881Radio frequency identification (RFID) tag and interrogator for supporting normal mode and secure mode, and operation method thereof
26519054880Information processing device, controller, key issuing authority, method for judging revocation list validity, and key issuing method
26529054879Method and apparatus for delivering certificate revocation lists
26539054878System and method for security authentication of power system
26549054877Data expansion using an approximate method
26559054875Biometric authentication apparatus, biometric authentication method, and biometric authentication computer program
26569054874System and method for data authentication among processors
26579054873Compact security device with transaction risk level approval capability
26589054865Cryptographic system and methodology for securing software cryptography
26599054863Industrial protocol system authentication and firewall
26609054860Digital verified identification system and method
26619054848Electronic apparatus and encryption method thereof
26629053347Memory device, host device, and memory system
26639053332Policy for secure packet transmission using required node paths and cryptographic signatures
26649053310System and method for verifying status of an authentication device through a biometric profile
26659053307Behavior based identity system
26669053306Authentication system, authentication server, service providing server, authentication method, and computer-readable recording medium
26679052931Method and system for machine identification
26689049593Method and apparatus for restricting access to a wireless system
26699049200System and method for improving hardware utilization for a bidirectional access controls list in a low latency high-throughput network
26709049182Techniques for virtual representational state transfer (REST) interfaces
26719049026Authenticator, authenticatee and authentication method
26729049025Method of decrypting encrypted information for unsecure phone
26739049022Hashing prefix-free values in a certificate scheme
26749049006Systems, devices, and methods for securely transmitting a security parameter to a computing device
26759047494System and method for disabling and/or enabling a device
26769047458Network access protection
26779047449Method and system for entity authentication in resource-limited network
26789047448Branch auditing in a computer program
26799044855Processing context information
26809043938Secured wireless access system and related method
26819043604Method and apparatus for key provisioning of hardware devices
26829043601Digital watermark key generation
26839043600Security model for industrial devices
26849043599Method and server for providing a mobility key
26859043597Systems and methods for verifying the authenticity of a remote device
26869043596Method and apparatus for authenticating public key without authentication server
26879043592Communicating trust models to relying parties
26889042549Apparatus and method for address privacy protection in receiver oriented channels
26899042543Method for arbitrary-precision division or modular reduction
26909041510Capacitive data transfer in an electronic lock and key assembly
26919038178Detection of malware beaconing activities
26929038170Logging access system events
26939038134Managing predictions in data security systems
26949038130Sensor aware security policies with embedded controller hardened enforcement
26959038064Trace assisted prefetching of virtual machines in a distributed system
26969037862Instant messaging private tags
26979037861Enhancing data security using re-encryption
26989037859Processing of communication device signatures for use in securing nomadic electronic transactions
26999037857System and method for downloading application
27009037851User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management
27019037759Storage medium, information processing apparatus, information processing method and information processing system
27029037453Embedder for embedding a watermark into an information representation, detector for detecting a watermark in an information representation, method and computer program
27039032492Distributed computer systems with time-dependent credentials
27049032486Breathalyzer system for social media
27059032478Managing security in a network
27069032205Robust authentication and key agreement protocol for net-generation wireless networks
27079031235Method and apparatus for use in a downloadable conditional access system
27089027121Method and system for creating a record for one or more computer security incidents
27099027119Authentication frequency and challenge type based on application usage
27109027105Social network interaction using validated representations of user credentials
27119027102Web server bypass of backend process on near field communications and secure element chips
27129027101Providing subscriber consent in an operator exchange
27139027100Client-side ad caching for lower ad serving latency
27149027083Management of access identifiers
27159027079Method and system for dynamic security using authentication servers
27169026795Apparatus and method for signing application
27179026791Linear feedback shift register (LFSR)
27189026785Method and apparatus for smart-key management
27199026784System and method for innovative management of transport layer security session tickets in a network environment
27209021610Computer recovery or return
27219021603Non-volatile memory for anti-cloning and authentication method for the same
27229021572Anonymous access to a service by means of aggregated certificates
27239021267System and method for using digital signatures to assign permissions
27249021266Validation system and verification method including signature device and verification device to verify contents
27259021265Anonymity authentication method for global mobility networks
27269021248Secure access of mobile devices using passwords
27279021246Method to replace bootloader public key
27289019073System and method for user authentication in in-home display
27299015860Behavioral fingerprinting via derived personal relation
27309015820Cross site request forgery mitigation in multi-domain integrations
27319015819Method and system for single sign-on
27329015817Resilient and restorable dynamic device identification
27339015808Restricting mobile device services between an occurrence of an account change and acquisition of a security code
27349015801Methods and systems for handling recovery messages
27359015491Method and apparatus for managing private data in multifunction peripheral
27369015485Risk-based authentication duration
27379015469Supporting secure sessions in a cloud-based proxy service
27389015225Systems and methods for delivering messages over a network
27399014144Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol
27409013735Image forming system and image forming method providing controls of settings of image position and restriction
27419009839Method and device for protecting the integrity of data transmitted over a network
27429009817Virtual smart card to perform security-critical operations
27439009814Systems and methods for generating secure passwords
27449009804Method and system for hybrid software as a service user interfaces
27459009802Automatic PIN creation using password
27469009799Secure access
27479009796Spot beam based authentication
27489009793Dynamic pin dual factor authentication using mobile device
27499009492Prevention of playback attacks using OTP memory
27509009484Method and system for securing communication
27519009483Replacing blinded authentication authority
27529009480Techniques for handshake-free encrypted communication using public key bootstrapping
27539009477Archiving electronic content having digital signatures
27549009464Anonymous register system and method thereof
27559003551System and method for obscuring displayed information
27569003517Isolation and presentation of untrusted data
27579003489System and method for providing virtual user groups in a network environment
27589003361Generating a restful web service software development kit client
27599003194Systems and methods for data compression and decompression
27609003193Electronic apparatus for delegation management and delegation management methods thereof
27619003191Token-based authentication using middle tier
27629003190Method and apparatus for providing a key certificate in a tamperproof manner
27639003189Trusted third party client authentication
27649003186HTTP authentication and authorization management
27659002017Method and apparatus for key distribution for secure digital cinema presentations
27669001179Transmission terminal, transmission method, and computer-readable recording medium storing transmission program
27678997193Single sign-on for disparate servers
27688997187Delegating authorization to applications on a client device in a networked environment
27698997182Legacy device registering method, data transferring method and legacy device authenticating method
27708997174Configuring browser policy settings on client computing devices
27718996884High privacy of file synchronization with sharing functionality
27728996877Cryptographically secure authentication device, system and method
27738996876Method and system for using a smart phone for electrical vehicle charging
27748996872Contactless seed programming method and system thereof
27758996869Secure mission module
27768996868Method of authenticating vehicle communication
27778996867Method and device for end-user verification of an electronic transaction
27788995654Method for verifying correct encryption key utilization
27798995274Methods and systems for controlling traffic on a communication network
27808992631Theft prevention of media peripherals in a media exchange network
27818990953Software distribution service federation
27828990901Systems and methods for network filtering in VPN
27838990896Extensible mechanism for securing objects using claims
27848990889System and method for physical access control
27858990888Method and apparatus for providing a one-time password
27868990887Secure mechanisms to enable mobile device communication with a security panel
27878990697Associating file types with web-based applications for automatically launching the associated application
27888990576Methods and apparatus for efficient computation of one-way chains in cryptographic applications
27898990573System and method for using variable security tag location in network communications
27908990571Host device, semiconductor memory device, and authentication method
27918990570Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer
27928990569Secure communication session setup
27938990567Message originator token verification
27948990565Method and system for automatically logging in a client
27958990564System and method for performing device authentication using key agreement
27968990563Sending protected data in a communication network
27978990562Secure deployment of provable identity for dynamic application environments
27988990555Centralized key management
27998989883Systems and methods for providing access to resources through enhanced audio signals
28008989383Data authentication using plural electronic keys
28018989380Controlling communication of a wireless communication device
28028989374Cryptographic device for secure authentication
28038988187Proximity based biometric identification systems and methods
28048988186Self-service device user asset condition alert
28058984652Transfer of digital rights management information
28068984635Authenticating the identity of initiators of TCP connections
28078984595Method and system for hub-and-spoke website browsing and navigation on a multipaned platform for the communication, distribution, and collaboration of information and data
28088984298Managing access to a secure content-part of a PPCD using a key reset point
28098984288Electronic signing of content
28108984287Wireless personal area network access method based on primitive
28118984286Message originator token verification
28128984283Private certificate validation method and apparatus
28138983075Custodian securing a secret of a user
28148983061Method and apparatus for cryptographically processing data
28158982423Providing voter secrecy through manually created markings
28168982411Image processing apparatus and method
28178978124Service oriented secure collaborative system for compartmented networks
28188978118Pseudonymized authentication
28198978108Method, device, and system for service presentation
28208978099Methods and devices for detecting an IP address
28218977864Programmable logic device with resistance to external monitoring attacks
28228977855Secure function evaluation between semi-honest parties
28238977854Automatic user authentication and identification for mobile instant messaging application
28248977850Content data, transmitting apparatus, receiving apparatus and decoding method
28258977845Methods and apparatus for access control in service-oriented computing environments
28268977843Geolocating network nodes in attenuated environments for cyber and network security applications
28278976967Mediator monitoring and controlling access to electronic content
28288976383Method and system for document printing management and control, and document source tracking
28298973151Portable security device and methods for secure communication
28308973106Computer implemented methods and apparatus for providing permissions to users in an on-demand service environment
28318973096Fraud detection in adaptive authentication systems
28328973094Execution of a secured environment initialization instruction on a point-to-point interconnect system
28338972738Incorporating data into an ECDSA signature component
28348972737Unauthorized contents detection system
28358972735Methods and apparatus to certify digital signatures
28368972733Techniques to prime a stateful request-and-response communication channel
28378972732Offline data access using trusted hardware
28388972727Method of identification or authorization, and associated system and secure module
28398972726System and method for digital rights management using a secure end-to-end protocol with embedded encryption keys
28408972591Method for downloading software
28418970345Channel-switching remote controlled barrier opening system
28428970343Reteachable switching circuit with ability for locking
28438966594Proxy authentication
28448966589Methods, systems, and computer-readable media for exception handling of interactive communications privileges governing interactive communications with entities outside a domain
28458966588Systems and methods of establishing a secure connection between a remote platform and a base station device
28468966586Authentication within OpenFlow network
28478966273Lightweight group signature system and method with short signature
28488966271Data card verification system
28498966270Methods and systems for providing controlled access to the internet
28508966266Method for obtaining encryption keys corresponding terminals, server and computer program products
28518966265Pairwise temporal key creation for secure networks
28528966261Method for secure remote backup
28538966258Method for securely downloading from distributed download sources
28548966257Method and system for secret communication between nodes
28558966254Keyless challenge and response system
28568966243Method and system for data encryption and decryption in data transmission through the web
28578965039Client-side watermarking using hybrid I-frames
28588964976Secure storage and retrieval of confidential information
28598964744Management apparatus, management method, and computer-readable medium
28608963687System and method for DSRC communication
28618963683Enabling of functions in a door drive
28628959610Security bridging
28638959607Group key management and authentication schemes for mesh networks
28648959583Access to vaulted credentials using login computer and mobile computing device
28658959357Biometric encryption and key generation
28668959351Securely filtering trust services records
28678959350Token for securing communication
28688959349Method and apparatus for key sharing over remote desktop protocol
28698959343Authentication system, method and device
28708959342Communication apparatus
28718959340Method for accessing and transferring data linked to an application installed on a security module associated with a mobile terminal, and associated security module, management server and system
28728959273Composite data transmission interface and a judgment method thereof
28738959025System and method for automatic identification of speech coding scheme
28748958562Format-preserving cryptographic systems
28758958550Encryption operation with real data rounds, dummy data rounds, and delay periods
28768957757Access management and reporting technology
28778955077Server-token lockstep systems and methods
28788955072Single sign on for a remote user session
28798955071Controlled password modification method
28808955070Controlled password modification method and apparatus
28818955053Method for using rights to contents
28828954744Verification methods and apparatus for use in providing application services to mobile communication devices
28838954743System and method for watermarking content for tracking media consumption
28848954741Apparatus and method for supporting family cloud in cloud computing system
28858954739Efficient terminal authentication in telecommunication networks
28868954733Embedded extrinsic source for digital certificate validation
28878954730Establishing historical usage-based hardware trust
28888954604Replication server selection method
28898954261Autonomous vehicle positioning system for misbehavior detection
28908953795Forensic decryption tools
28918949973Image processing apparatus
28928949955Method and apparatus for mobile time-based UI for VIP
28938949935Secure account creation
28948949934Communication device, communication method, and program
28958949621Memory device authentication
28968949613Self-signed certificates for computer application signatures
28978949612One-to-many electronic signature process
28988949611Methods, apparatus and computer program products for authenticating and determining integrity of a software part of an air vehicle
28998949610Method for embedding secret message into PNG image
29008949608Field programmable smart card terminal and token device
29018949607Digital data authentication
29028949606Prevention of masquerade by using identification sequences
29038949605Communication system, communication apparatus, communication method, and computer program
29048949603Database management system and encryption method performed in database
29058949602Method and apparatus for authenticating per M2M device between service provider and mobile network operator
29068949601Communication system for providing the delivery of e-mail message
29078949597Managing certificates on a mobile device
29088948394Method and apparatus for distribution and synchronization of cryptographic context information
29098943324Green energy generation apparatus, mobile device, electric storage apparatus, and management method of green energy information
29108943323System and method for provisioning device certificates
29118943322Systems and methods for authenticating an electronic transaction
29128943319Managing security for computer services
29138943311System and methods for online authentication
29148941469RFID tag authentication with public-key cryptography
29158939834Software verification and authentication
29168938785Wireless session configuration persistence
29178938781Systems and methods for managing user permissions
29188938616Authentication method
29198938615System and method for authenticating radio frequency identification (RFID) tags
29208938614Motor vehicle electronics device, motor vehicle, method for displaying data on a motor vehicle display apparatus, and computer program product
29218938613Techniques for secure message offloading
29228938095Verification method, verification device, and computer product
29238938074Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier
29248937537Method and system for utilizing spread spectrum techniques for in car applications
29258935768Controlling client access to email responsive to email class levels
29268935765Method to enable mobile devices to rendezvous in a communication network
29278935681Source code protection
29288935532Content distribution and aggregation
29298935530Control device and computer readable medium
29308935528Techniques for ensuring authentication and integrity of communications
29318935527Secure transmission with error correcting code
29328934629Communication apparatus, image input apparatus, image output apparatus, wireless communication circuit, method for controlling apparatus, and program
29338933786RFID tag device and method of recognizing the same
29348931102Testing web applications for file upload vulnerabilities
29358931085Download optimization in the presence of multicast data
29368930707Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message
29378930705System and method for authenticating remote execution
29388930704Digital signature method and system
29398930698Encrypting globally unique identifiers at communication boundaries
29408930697Securing digital content system and method
29418930696System and method for exchanging secure information between secure removable media (SRM) devices
29428930692Mechanism for internal processing of content through partial authentication on secondary channel
29438930688Apparatus and method for providing security service of user interface
29448928454Computer room security

2014

29458925098Data security and access tracking in memory
29468925070Method and apparatus for providing user authentication based on user actions
29478925053Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities
29488925035System and method for document isolation
29498924735Managed biometric identity
29508924730Digital watermarking for secure transmission between a source component and a node device
29518924729Systems and methods for biometric E-signature
29528924727Technologies labeling diverse content
29538924726Robust message encryption
29548924725Authenticated file handles for network file systems
29558924723Managing security for computer services
29568924722Apparatus, method, system and program for secure communication
29578924713Method and system for state machine security device
29588924041Vehicle central lock antitheft method and system
29598923811Methods and apparatuses for dynamic management of security associations in a wireless network
29608923519Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
29618923511Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
29628918897Dispersed storage network data slice integrity verification
29638918842Utility grid command filter system
29648918648Digital signature and key agreement schemes
29658918643Authentication method, authentication system, in-vehicle device, and authentication apparatus
29668917870Methods and devices for computing a shared encryption key
29678917410Image forming system, image forming apparatus and print server
29688914905Access control system, communication terminal, server, and access control method
29698914867Method and apparatus for redirecting data traffic
29708914851Method and system for improved security
29718914647Method and system for protecting data
29728914646Information processing apparatus and information processing method for determining access permission
29738914643Anonymous authentication system and anonymous authentication method
29748914641Method for signing and verifying data using multiple hash algorithms and digests in PKCS
29758914640System for exchanging data between at least one sender and one receiver
29768914638Electronic watermark generating apparatus, electronic watermark verifying apparatus, method of generating electronic watermark, and method of verifying electronic watermark
29778914634Digital rights management system transfer of content and distribution
29788910244Method for establishing identity management trust, identification provider and service provider
29798909937Access control system and access control method thereof
29808909934Assisted certificate enrollment
29818909932Method and apparatus for security over multiple interfaces
29828909931Server authentication system, server authentication method, and program for server authentication
29838909929Stored public key validity registers for cryptographic devices and systems
29848909928Securing customer virtual machines in a multi-tenant cloud
29858909927Method for processing messages and message processing device
29868909918Techniques to classify virtual private network traffic based on identity
29878908909Watermark decoding with selective accumulation of components
29888908907Method and system for video transmission and processing with customized watermarking delivery
29898908871Mobile internet protocol system and method for updating home agent root key
29908904558Detecting web browser based attacks using browser digest compute tests using digest code provided by a remote source
29918904537Malware detection
29928904526Enhanced network security
29938904515System and method for controlling devices at a location
29948904510Authenticating a user for testing purposes
29958904501Method and system for automated emergency access to medical records
29968904488Managing online shop using instant messaging system
29978904482Techniques for securing a one-time passcode with an alteration code
29988904188Trusted storage systems and methods
29998904183Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
30008904182Method and system to provide fine granular integrity to digital data
30018904177Authentication for a multi-tier wireless home mesh network
30028904176Protecting the information encoded in a bloom filter using encoded bits of data
30038904012Client-server input method editor architecture
30048903094Cryptographic key distribution system
30058898798Systems and methods for medical information analysis with deidentification and reidentification
30068898757Authentication server with link state monitor and credential cache
30078898665System, method and computer program product for inviting other virtual machine to access a memory space allocated to a virtual machine
30088898479Integrated genomic and proteomic security protocol
30098898475Method, controller and system for detecting infringements of the authenticity of system components
30108898472Mechanism and method for managing credentials on IOS based operating system
30118898469Software feature authorization through delegated agents
30128898468Method for ensuring security and privacy in a wireless cognitive network
30138898466Secure block acknowledgement mechanism for use in communication networks
30148898465System and method for fuse enablement of a secure client hosted virtualization in an information handling system
30158898463Device
30168898462Method and device for authenticating components within an automatic teller machine
30178898461Battery authentication method and apparatus
30188898458Method for communicating certificates to computers
30198898023Biological information management system and biological information management method
30208896857Content receipt via email addresses
30218893266System and method for secure control of resources of wireless mobile communication devices
30228893248Methods, systems, and computer readable media for media session policy compliance auditing and enforcement using a media relay and session initiation protocol (SIP) signaling
30238893230System and method for proxying federated authentication protocols
30248893227System and method for providing privacy in smart meter deployment
30258892899System and method for enrolling in a biometric system
30268892895Integrated system for electronic tracking and control of documents
30278892894Computer-implemented method and system for embedding and authenticating ancillary information in digitally signed content
30288892893Systems and methods for watermarking software and other media
30298892891Method and system for establishing a communications pipe between a personal security device and a remote computer system
30308892887Method and apparatus for mutual authentication
30318892883Render service for remote access to applications
30328892880System and method for obtaining an authorization key to use a product
30338892873Verification of user communication addresses
30348892865Multiple authority key derivation
30358892697System and digital token for personal identity verification
30368891772Cloud key escrow system
30378891764Quarantine method for sellable virtual goods
30388890653Plant operation apparatus and plant operation training simulator apparatus
30398890650Fluid human-machine interface
30408887305Methods and devices for presenting email addresses
30418887258Apparatus and method of binding a removable module to an access terminal
30428887246Privacy preserving authorisation in pervasive environments
30438887153Digital signature server and user terminal
30448886950Apparatus, methods, and computer program products for facilitating secure password creation and management
30458886949Information processing apparatus and method therefor
30468886947Optimized integrity verification procedures
30478886945System and method for conveying session information for use in forensic watermarking
30488886944Watermark to identify leak source
30498886942Augmented reality based privacy and decryption
30508886939Secure authenticated distance measurement
30518886937PCI DSS compliant proxy service
30528886935Key management device, system and method having a rekey mechanism
30538886930DNS flood protection platform for a network
30548886718Providing personalized platform application content
30558886711File system adapted for use with a dispersed data storage network
30568885820Key expansion using seed values
30578885818Authentication of data streams
30588881271System and method for forensic identification of elements within a computer system
30598881254Method and system for managing virtual objects in a network
30608881239Method and apparatus for securing transactions using verified resource locations
30618881224Method and system for providing masking services
30628880906Storing encrypted contents in digital archives
30638880895Methods, systems, and computer program products for recovering a password using user-selected third party authorization
30648880894Public key infrastructure-based first inserted subscriber identity module subsidy lock
30658880891Method, system and apparatus for establishing communication
30668880888Privacy-enhanced E-passport authentication protocol
30678880885Mutual authentication schemes
30688880883Secure end-to-end permitting system for device operations
30698880882Securely performing programmatic cloud-based data analysis
30708880877Method for assembling authorization certificate chains
30718880875System, apparatus and method for decentralizing attribute-based encryption information
30728880869Secure wireless local area network (WLAN) for data and control traffic
30738880734Block floating point compression with exponent token codes
30748879725Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation
30758875310System and method of protecting digital media contents
30768875259On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service
30778875257Restricting mature content
30788875245Authority delegating system, authority delegating method, authentication apparatus, information processing apparatus, control method, and computer-readable medium
30798875237Private network access using IPv6 tunneling
30808875235Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems
30818875234Operator provisioning of a trustworthy workspace to a subscriber
30828875219Apparatus and method for controlled sharing of personal information
30838874924Methods and apparatus to identify media
30848874923Policy-based signature authentication system and method
30858874922Systems and methods for multi-layered authentication/verification of trusted platform updates
30868874921System and method for generating keyless digital multi-signatures
30878874920Verifying cryptographic signature from stored primitives of previously received signature
30888874919Apparatus and method of a portable terminal authenticating another portable terminal
30898874917Storage system in which fictitious information is prevented
30908874914Secure and automated credential information transfer mechanism
30918874913Secure communications between devices using a trusted server
30928874912Systems and methods for securely transferring personal identifiers
30938874911Terminal device, system, connection management server, and computer readable medium
30948874910Method for implementing encryption and device thereof
30958874900Direct anonymous attestation scheme with outsourcing capability
30968874794Block floating point compression with exponent difference and mantissa coding
30978874769Facilitating group access control to data objects in peer-to-peer overlay networks
30988874768Methods for providing security over untrusted networks
30998873754Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system
31008870067Identification device having electronic key stored in a memory
31018869307Mobile posture-based policy, remediation and access control for enterprise resources
31028869276Method and apparatus for whole-network anomaly diagnosis and method to detect and classify network anomalies using traffic feature distributions
31038869252Methods, apparatuses, and computer program products for bootstrapping device and user authentication
31048869251Remote provision of consistent one-time password functionality for disparate on-line resources
31058868933Persistent servicing agent
31068868924System and method for modifying a software distribution package
31078868920Method, system and device for securing a digital storage device
31088868915Secure authentication for client application access to protected resources
31098868914System and methods for distributing trusted time
31108868911Method for key generation, member authentication, and communication security in dynamic group
31118868904Information processing device, disc, information processing method, and program
31128868903Digital arbitration
31138867064Image forming apparatus having human-body communication function and method for authentication in image forming apparatus
31148863306Device and method for digital rights management
31158863265Remote sign-out of web based service sessions
31168863262Systems and methods to provide information and services to authorized users
31178863258Security for future log-on location
31188863249Push button configuration of multimedia over coax alliance (MoCA) devices
31198863248Method and apparatus to auto-login to a browser application launched from an authenticated client application
31208863244Communication abuse prevention
31218863237Remote-session-to-go method and apparatus
31228862888Systems and methods for three-factor authentication
31238862886Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes
31248862884Method of generation of a secret key for a wireless communication system
31258862883System and method for secure cloud service delivery with prioritized services in a network environment
31268862882Systems and methods for authenticating devices by adding secure features to Wi-Fi tags
31278862880Two-stage anonymization of mobile network subscriber personal information
31288862879Method and apparatus for efficient and secure creating, transferring, and revealing of messages over a network
31298862878Authentication and authorization of a device by a service using broadcast encryption
31308862877Data anonymity system
31318862870Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination
31328862753Distributing overlay network ingress information
31338862745Automatic network domain diagnostic repair and mapping
31348862718System, method and apparatus for troubleshooting an IP network
31358861737Trust establishment from forward link only to non-forward link only devices
31368856900Method for authorising a connection between a computer terminal and a source server
31378856894Always on authentication
31388856873Method, apparatus, and system for sending credentials securely
31398856539Universal secure registry
31408856538Secured flash programming of secondary processor
31418856537Method for protecting a telecommunication network and secure router implementing such a method
31428856534Method and apparatus for secure scan of data storage device from remote server
31438856533Device, system and method for determining authenticity of an item
31448856532Digital signatures of composite resource documents
31458856530Data storage incorporating cryptographically enhanced data protection
31468856529Systems and methods for providing security to different functions
31478856527Graphical user interface for digital certificate profile configuration
31488856525Authentication of email servers and personal computers
31498856517Access management system using trusted partner tokens
31508856515Implementation of robust and secure content protection in a system-on-a-chip apparatus
31518856513Programming on-chip non-volatile memory in a secure processor using a sequence number
31528856510Method for joining user domain and method for exchanging information in user domain
31538855604Roaming authentication method for a GSM system
31548855310System and method for exchanging encryption keys between a mobile device and a peripheral device
31558855305Methods and apparatus for protecting digital content
31568850561Associating operating system native authorizations with console roles
31578850553Service binding
31588850528Organizing permission associated with a cloud customer in a virtual computing infrastructure
31598850527Method of performing a secure application in an NFC device
31608850525Access control center auto configuration
31618850520Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data
31628850218OTP generation using a camouflaged key
31638850214Methods and systems for encoding and protecting data using digital signature and watermarking techniques
31648850210Authentication system, authentication device, terminal, and verifying device
31658850208Certificate crosschecking by multiple certificate authorities
31668850205Key distribution method and authentication server
31678850204Multi-band/multi-link secure key generation and delivery protocol
31688850203Secure key management in multimedia communication system
31698850202Method and system for authenticating peer devices using EAP
31708850201System, apparatus, and method for digital distribution
31718850199Hashing prefix-free values in a signature scheme
31728850198Method for validating a road traffic control transaction
31738850197Optical network terminal management control interface-based passive optical network security enhancement
31748850196Methods for authentication using near-field
31758850186Change in identification information causing request for new certificate issuance
31768848907Computer program product and method for processing information to obtain an HMAC
31778844007Systems and methods for processing and transmitting sensor data
31788844005Authentication based on user behavior
31798843995Generic access network (GAN) controller selection in PLMN environment
31808843915Signature-based update management
31818843769Microcontroller with embedded secure feature
31828843755User authentication
31838843752Multi-factor device authentication
31848843750Monitoring content transmitted through secured communication channels
31858843746Method and arrangement for sending and receiving confidential electronic messages in a legally binding manner
31868843745Methods of authorizing a computer license
31878843744Method and devices for distributing media contents and related computer program product
31888843741System and method for providing a certificate for network access
31898843740Derived certificate based on changing identity
31908843534Virtual session on a removable memory
31918842838Method and apparatus of securely processing data for file backup, de-duplication, and restoration
31928839457Image storage in electronic documents
31938839408Integration of cloud management systems with on-premise systems
31948839385Systems and methods for implementing device-specific passwords
31958839363Trusted hardware for attesting to authenticity in a cloud environment
31968839361Access control system and method with GPS location validation
31978839360Scope-limited action-specific authorization token
31988839356Methods and apparatuses for processing wake events of communication networks
31998839354Mobile enterprise server and client device interaction
32008839346Systems and methods for providing a smart group
32018838984Optimized hierarchical integrity protection for stored data
32028838982Systems and methods to secure user identification
32038838981Communication channel access based on channel identifier and use policy
32048838978Content access management using extracted watermark information
32058838977Watermark extraction and content screening in a networked environment
32068838976Web content access using a client device identifier
32078838972Exchange of key material
32088838971Management of public keys for verification of public warning messages
32098838970Identity verification for online education
32108838968System and method for virtual machine data protection in a public cloud
32118838967Uniquely identifying a mobile electronic device
32128838964Package audit tool
32138838954Media processing devices for adaptive delivery of on-demand media, and methods thereof
32148837725Communication system and communication method
32158837723Method and apparatus for use in a downloadable conditional access system
32168836817Data processing apparatus, imaging apparatus, and medium storing data processing program
32178832820Isolation and security hardening among workloads in a multi-tenant networked environment
32188832811Network access control for trusted platforms
32198832794Single-point-of-access cyber system
32208832791User authentication apparatus and method thereof
32218832790Fraud detection in adaptive authentication systems
32228832464Processor and method for implementing instruction support for hash algorithms
32238832451Packet source authentication method using single-buffered hash in multicast environment and apparatus for the same
32248832450Methods and apparatus for data hashing based on non-linear operations
32258832447System and method for using digital signatures to assign permissions
32268832446Secure data transfer in an automation network
32278832443Methods and systems for increasing the security of private keys
32288832442Method and device for securely distributing data in group communication
32298832440Data security system
32308832435Providing a real-time indication of platform trust
32318832430Remote certificate management
32328832180Function module dispatcher
32338831224Method and apparatus for secure pairing of mobile devices with vehicles using telematics system
32348827163Anti-fake identification system and method capable of automatically connecting to web address
32358826419Computer device with anti-tamper resource security
32368826410Device API for securely monitoring and managing mobile broadband devices
32378826397Secure remote authentication through an untrusted network
32388826392Device and method for authenticating biological information
32398826389Multi-media identity management system
32408826373Methods and systems for sharing digital assets
32418826368Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication
32428826269Annotating virtual application processes
32438826027Method for producing acknowledged transaction data and corresponding device
32448826026Systems and methods for tracking electronic files in computer networks using electronic signatures
32458826022Methods and systems for creating monetary accounts for members in a social network
32468826019Centralized authentication system with safe private data storage and method
32478826017Optimizing web landing page link access times through preliminary functions during page deployment
32488826016Apparatuses and a method for protecting a bootstrap message in a network
32498826015Portable system and method for remotely accessing data
32508826014Authentication of remote host via closed ports
32518826009Method of handling a certification request
32528826008Method and device for secure notification of identity
32538825996Platform that facilitates preservation of user privacy
32548825928Facilitating and authenticating transactions through the use of a dongle interfacing a security card and a data processing apparatus
32558825688Method for searching for an entity using a verifier device, and related devices
32568824859Adding watermarks to video content
32578819819Method and system for automatically obtaining webpage content in the presence of javascript
32588819802User authentication
32598819790Cooperation method and system between send mechanism and IPSec protocol in IPV6 environment
32608819780Information processing system, information processing apparatus, and information processing method
32618819775Secure method of accessing an information system of an aircraft
32628819441Long-term signature server, long-term signature terminal, and long-term signature verification server
32638819440Directed signature workflow
32648819438Method and device for issuing a digital residence certificate
32658819434Method and processing unit for secure processing of access controlled audio/video data
32668819433Message storage and retrieval
32678819432Method for authentication and signature of a user in an application service, using a mobile telephone as a second factor in addition to and independently of a first factor
32688819431Methods and device for electronic entities for the exchange and use of rights
32698819430Communication device, communicaton system, communication method, and program
32708819429Near field registration of home system audio-video device
32718819427Device specific secure licensing
32728819426Methods and apparatus for protecting digital content
32738819424Token-based authentication using middle tier
32748819423Optical transceiver with vendor authentication
32758819422System and methods for access control based on a user identity
32768819418Communication system, vehicle-mounted terminal, roadside device
32778819415Method and device for authenticating personal network entity
32788819414Threat mitigation in a vehicle-to-vehicle communication network
32798819410Private electronic information exchange
32808817990Kerberized handover keying improvements
32818817988Variable epoch scheduler for proactive cryptography systems
32828813202Mechanism to determine source device service tier based on the version of the HDCP key
32838813197Techniques for network process identity enablement
32848813187Affluent social networking website
32858812858Broadcast stenography of data communications
32868812856Methods and systems for state synchronization over a non-reliable network using signature processing
32878812854Firmware verified boot
32888812852Method and system for marking digital content
32898812849System and method for controlling the upload of data already accessible to a server
32908812843Device and authentication method therefor
32918812841Communications hub for use in life critical network
32928812829Information processing apparatus and start-up method
32938811655Circumvention of watermark analysis in a host content
32948806661Method and device for distributing electronic documents
32958806647Behavioral scanning of mobile applications
32968806646Detecting malware in mobile sites
32978806621Computer network security platform
32988806609Security for remote access VPN
32998806607Unauthorized data transfer detection and prevention
33008806602Apparatus and method for performing end-to-end encryption
33018806599Systems and methods for implementing multi-factor authentication
33028806592Method for secure user and transaction authentication and risk management
33038806591Authentication risk evaluation
33048806573Authentication control in low-power lossy networks
33058806558Unique watermarking of content objects according to end user identity
33068806473Managing software distribution for regulatory compliance
33078806215Method and system for robust watermark insertion and extraction for digital set-top boxes
33088806214Communication with non-repudiation and blind signatures
33098806195User interface generation in view of constraints of a certificate profile
33108806194Method for authenticating low performance device
33118806190Method of transmission of encrypted documents from an email application
33128804729IPv4, IPv6, and ARP spoofing protection method
33138804153Method for printing on an imaging device
33148800055Node controller for an endpoint in a cloud computing environment
33158800019Secure streaming container
33168800017Method and apparatus for copy protecting a digital electronic device
33178800015Apparatus and methods for selecting services of mobile network operators
33188800007VPN session migration across clients
33198799998Methods for controlling a traffic of an authentication server
33208799996Logical unit number management device, logical unit number management method, and program therefor
33218799887Information processing apparatus, method for controlling the same, and storage medium
33228799666Secure user authentication using biometric information
33238799662Method and apparatus for validating the integrity of installer files prior to installation
33248799659Advanced multi-channel watermarking system and method
33258799656Methods for anonymous authentication and key agreement
33268799655Mobile offline authentication using one-time passcodes
33278799654Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
33288799653Storage device and method for storage device state recovery
33298799652Method for activating a network node
33308799649One time passwords with IPsec and IKE version 1 authentication
33318799641Secure proxying using network intermediaries
33328799634Method and system for temporarily reconfiguring system settings of a computing device during execution of a software application
33338793807Controlling access to and manipulation of a data object by different data object users
33348793780Mitigation of application-level distributed denial-of-service attacks
33358793777Verification and authentication systems and methods
33368793771Image-display method, projector, image-display system, projector-control method, image-display program, and projector-control program
33378793768Relationship-based authorization
33388793495Method for authenticating a portable data carrier
33398793390Systems and methods for protocol detection in a proxy
33408792637Downloading of data to secure devices
33418792416Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station
33428789204Method and apparatus for secure cross-site scripting
33438789200Agent apparatus and method for sharing anonymous identifier-based security information among security management domains
33448789162Method and apparatus for making token-based access decisions
33458789153Method for secure user and transaction authentication and risk management
33468789152Method for managing authentication procedures for a user
33478789151Remote device communication platform
33488789037Compatible trust in a computing device
33498788832Virtual subscriber identity module
33508788830Method and apparatus for logging based identification
33518788829System and method for interapplication communications
33528788828Non-transferable anonymous digital receipts
33538788823System and method for filtering network traffic
33548788820Secure network access
33558788819System and method for a cloud-based electronic communication vault
33568788818Information processing apparatus and method, recording medium and program
33578788809Method and apparatus to create a secure web-browsing environment with privilege signing
33588788806General purpose distributed encrypted file system
33598788427Limiting data exposure in authenticated multi-system transactions
33608787615Methods and apparatus for embedding watermarks
33618787574Multicast key negotiation method suitable for group calling system and a system thereof
33628782768Systems and methods for accessing a virtual desktop
33638782762Building data security in a networked computing environment
33648782757Session sharing in secure web service conversations
33658782745Detection of unauthorized wireless access points
33668782435System and method for validating program execution at run-time using control flow signatures
33678782423Network based management of protected data sets
33688782421System and method for verification of personal identity
33698782420System and method for obfuscation initiation values of a cryptography protocol
33708782419Device and method for a backup of rights objects
33718782409Confidential message exchange using benign, context-aware cover message generation
33728782408Method and system for securing communication
33738782406Secure digital communications
33748782405Providing transaction-level security
33758782402System and method for secure communications
33768782397Compact attribute for cryptographically protected messages
33778782391Service activation using algorithmically defined key
33788781128Method and device for automatically distributing updated key material
33798781126Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network
33808776199Authentication of a server by a client to prevent fraudulent user interfaces
33818776186Obtaining a signed certificate for a dispersed storage network
33828776103Interactive service device metering systems
33838776043Service image notifications
33848776031Manipulating resources embedded in a dynamic-link library
33858775814Personalized biometric identification and non-repudiation system
33868775813ElGamal signature schemes
33878775811Simple non-autonomous peering environment, watermarking and authentication
33888775810Self-validating authentication token
33898775808System and method for performing a management operation
33908775805System and method for variable length encryption
33918775801Radio communication apparatus and radio communication method
33928775796Certificate authenticating method, certificate issuing device, and authentication device
33938775794System and method for end to end encryption
33948775316Wagering game with encryption and authentication
33958774409Method of handover
33968769704Method and system for managing and monitoring of a multi-tenant system
33978769686System and method for securing wireless transmissions
33988769655Shared registration multi-factor authentication tokens
33998769654Counterfeit prevention strategy for pluggable modules
34008769646System and method for associating a universal user identification and a domain specific user identification
34018769618Method and apparatus for secure authorization
34028769610Distance-modified security and content sharing
34038769308Home (e)Node-B with new functionality
34048769294Digital signatures
34058769289Authentication of a user accessing a protected resource using multi-channel protocol
34068769288Discovery of security associations
34078769287Method, system, and device for obtaining keys
34088769286Methods and systems for increasing the security of electronic messages
34098769284Securing communication
34108769282Localized network authentication and security using tamper-resistant keys
34118769280Authentication apparatus and method for non-real-time IPTV system
34128769279System and method for variable length encryption
34138769278Apparatus and method for efficiently and securely exchanging connection data
34148769276Method and system for transmitting and receiving user's personal information using agent
34158769275Batch settlement transactions system and method
34168769267Geothentication based on new network packet structure
34178769266Method for assembling authorization certificate chains
34188769262VPN connection system and VPN connection method
34198769261Subscriber-specific enforcement of proxy-mobile-IP (PMIP) instead of client-mobile-IP (CMIP)
34208766800Authenticity verification methods, products, and apparatuses
34218763139Origin and custody of copies from a stored electronic record verified page by page
34228763101Multi-factor authentication using a unique identification header (UIDH)
34238763088Distributed authentication, authorization and accounting
34248763079Accessory authentication for electronic devices
34258763026Flexible interface for secure input of pin code
34268762985User terminal device and service providing method thereof
34278762730System and method to establish and/or manage a trusted relationship between a host to storage array controller and/or a storage array to storage array controller
34288762729Group signature system and method providing controllable linkability
34298762726System and method for secure access
34308762720Method of mutual authentication between a communication interface and a host processor of an NFC chipset
34318762719Method and system for command authentication to achieve a secure interface
34328762717Authentication device
34338762716Image forming apparatus
34348762715Event triggered pairing of wireless communication devices based on time measurements
34358762714Protecting against counterfeit electronics devices
34368762709Cloud computing method and system
34378761744Mobile virtual communication invitations
34388761401System and method for secure key distribution to manufactured products
34398756700Custom data image building
34408756667Management of hardware passwords
34418756665Authenticating a rich client from within an existing browser session
34428756655Integrated physical access control and information technology (IT) security
34438756430Exploiting application characteristics for multiple-authenticator broadcast authentication schemes
34448756428Authentication method for an electronic document and verification method of a document thus authenticated
34458756424Load balancing hash computation for network switches
34468756423System and method for establishing a secure group of entities in a computer network
34478756422System and method for secure and/or interactive dissemination of information
34488756418System and method for automatically detecting and then self-repairing corrupt, modified or non-existent files via a communication medium
34498756416Checking revocation status of a biometric reference template
34508756413Method and device for ensuring information integrity and non-repudiation over time
34518755525Quantum key distribution involving moveable key device
34528754744Integrated real estate showing scheduling and key dispensing system
34538752208Detecting web browser based attacks using browser digest compute tests launched from a remote source
34548752200Devices, systems and methods for security using magnetic field based identification
34558752170Verification and validation of externally maintained profile attributes
34568752153Accessing data based on authenticated user, provider and system
34578752148Processorless token for producing a one-time password
34588751815Creating and verifying globally unique device-specific identifiers
34598751813Cross validation of data using multiple subsystems
34608751812Electronic signature authentication
34618751810Establishing shared information in a network
34628751809Method and device for securely sharing images across untrusted channels
34638751807Method and system for secure over-the-top live video delivery
34648751805Service providing client, wireless terminal and method for implementing binding
34658751803Auto provisioning method in wireless communication network
34668751802Storage device and method and for storage device state recovery
34678751801System and method for authenticating users using two or more factors
34688751794System and method for secure nework login
34698751791Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event
34708751781System and method for supporting secure subsystems in a client hosted virtualization system
34718750630Hierarchical and index based watermarks represented as trees
34728749386System and method for article authentication using signatures
34738746553Payment device updates using an authentication process
34748746363System for conducting remote biometric operations
34758745715Password-based authentication system and method in group network
34768745704Powerline communication device supporting secure data exchange
34778745694Adjusting the position of an endpoint reference for increasing security during device log-on
34788745585Meta-data for single development test environment
34798745415Multi-drive cooperation to generate an encryption key
34808745405Dynamic seed and key generation from biometric indicia
34818745404Pre-processed information embedding system
34828745403Enhanced content management based on watermark extraction records
34838745401Authorizing actions performed by an online service provider
34848745400Method for authenticating key information between terminals of a communication link
34858745396Method for implementing the real time data service and real time data service system
34868745395Enabling use of a certificate stored in a smart card
34878745394Methods and systems for secure electronic communication
34888745393Transmitting apparatus, communicating system
34898745392Two-way authentication between two communication endpoints using a one-way out-of band (OOB) channel
34908745390Mutual authentication and key exchange for inter-application communication
34918745389Avoiding padding oracle attacks
34928745388Systems and methods for securely streaming media content
34938745277Command portal for securely communicating and executing non-standard storage subsystem commands
34948745146Control and management of electronic messaging
34958744079Secure communication system
34968744074Method and device for countering fault attacks
34978743903Hybrid networking simple-connect setup using forwarding device
34988739294Reporting information about users who obtain copyrighted media using a network in an unauthorized manner
34998739271Network information collection and access control system
35008738933Archive system, management apparatus, and control method
35018738924Electronic system and digital right management methods thereof
35028738923Framework for notifying a directory service of authentication events processed outside the directory service
35038738921System and method for authenticating a person's identity using a trusted entity
35048738919Control of the integrity of a memory external to a microprocessor
35058738918Document evidence and article retrieval and identification system
35068738917Image data verification
35078738911Secure socket layer keystore and truststore generation
35088738910Method and arrangement for enabling play-out of media
35098738909Forwarding E-mail from a wireless device
35108738908System and method for web-based security authentication
35118738159System and method for accessing PLC data on demand
35128737964Facilitating and authenticating transactions
35138737623Systems and methods for remotely loading encryption keys in a card reader systems
35148737621Enabling users to select between secure service providers using a central trusted service manager
35158737617Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system
35168732859Apparatus and method for monitoring network equipment
35178732848File-distribution apparatus and recording medium having file-distribution authorization program recorded therein
35188732808Data plan activation and modification
35198732805Re-authentication in secure web service conversations
35208732803Automated entity verification
35218732796Addressing security in asymmetrical networks
35228732473Claim based content reputation service
35238732470Storage system in which fictitious information is prevented
35248732469Communication cutoff device, server device and method
35258732466Semiconductor memory device
35268732465Method and apparatus for source identification for key handling following a handover failure
35278732464Bidirectional entity authentication method with introduction of online third party
35288732462Methods and apparatus for secure data sharing
35298732461Client apparatus, server apparatus, and program using entity authentication and biometric authentication
35308732460System and method for providing a one-time key for identification
35318732292Network system
35328731236System and method for content protection in a content delivery network
35338731203Securing a secret of a user
35348731194Method of establishing security association in inter-rat handover
35358730004Method and system for permitting remote check-in and coordinating access control
35368726407Authentication of computing and communications hardware
35378726382Methods and systems for automated detection and tracking of network attacks
35388726369Trusted path, authentication and data security
35398726360Telecommunication method, computer program product and computer system
35408726356Authentication apparatus, authentication method, and authentication program implementing the method
35418726355Identity verification via selection of sensible output from recorded digital data
35428726351Systems and methods for controlling access to electronic records in an archives system
35438726033Context sensitive dynamic authentication in a cryptographic system
35448726032System and method for protecting secrets file
35458726024Authentication method
35468726023Authentication using GAA functionality for unidirectional network connections
35478726021Scalable RFID systems: a privacy-preserving protocol with constant-time identification
35488726020Updating configuration information to a perimeter network
35498726014System and method for securely updating license files in an automated licensing system
35508725995Systems and methods for updating system-level services within read-only system images
35518725536Establishing a patient-provider consent relationship for data sharing
35528724806Partial multiple encryption
35538724803Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
35548724135Printing device and method of controlling the same
35558719950Access control apparatus and storage medium
35568719920Arrangements for identifying users in a multi-touch surface environment
35578719912Enabling private data feed
35588719580Data verification method
35598719579Handling receipts in cross component message processing
35608719575Method of secure broadcasting of digital data to an authorized third party
35618719574Certificate generation using virtual attributes
35628719568Secure delivery of sensitive information from a non-communicative actor
35638713704Behavioral fingerprint based authentication
35648713700Access control method, information display device using the same, and information display system
35658713681System and method for detecting executable machine instructions in a data stream
35668713648Information processing apparatus capable of authentication processing with improved user convenience, control program for information processing apparatus, and recording medium having control program for information processing apparatus recorded thereon
35678713644System and method for providing security in browser-based access to smart cards
35688713633Security access protection for user data stored in a cloud computing facility
35698713329Authenticated secret sharing
35708713328Code conversion apparatus, code conversion method, and computer product
35718713326Software self-checking systems and methods
35728713323Codeword-enhanced peer-to-peer authentication
35738713321Method and apparatus for verifiable generation of public keys
35748713320Security authentication method, apparatus, and system
35758713315Content distribution system, mobile communication terminal device, and computer readable medium
35768713314Reoccuring keying system
35778713313Terminal device, system and computer readable medium
35788713303Method and system for establishing security connection between switch equipments
35798712036System for encrypting and decrypting a plaintext message with authentication
35808707446Enforcing alignment of approved changes and deployed changes in the software change life-cycle
35818707423Programmable display device, and control system
35828707418System and methods for web-application communication
35838707415Method for storing data, computer program product, ID token and computer system
35848707404System and method for transparently authenticating a user to a digital rights management entity
35858707054Establishing a secure memory path in a unitary memory architecture
35868707052Cryptographic device with resistance to differential power analysis and other external monitoring attacks
35878707043Split termination of secure communication sessions with mutual certificate-based authentication
35888707041Protecting a BSF entity from attack
35898707038Method for the encrypted data exchange and communication system
35908707037Cryptographic authentication apparatus, systems and methods
35918707035High privacy of file synchronization with sharing functionality
35928707032System and method for securing controllers
35938707025Communication apparatus mediating communication between instruments
35948701174Controlling access to a protected resource using a virtual desktop and ongoing authentication
35958701173System and method for providing silent sign on across distributed applications
35968700904Method for authentication in an automation system
35978700903Streamlined CSR generation, certificate enrollment, and certificate delivery
35988700902Methods and apparatus to certify digital signatures
35998700900Communicating admission decisions and status information to a client
36008700898System and method for multi-layered sensitive data protection in a virtual computing environment
36018700893Key certification in one round trip
36028700889System and method of sharing web page that represents health information
36038698605Determining the validity of a connection between a reader and a transponder
36048698597System and method for associating an electronic device with a remote device having a voice interface
36058698596Apparatus and method for accessing a secured storage space
36068695080Information terminal apparatus, information processing apparatus and information communication system
36078695074Pre-authenticated calling for voice applications
36088694789System and method for generating a non-repudiatable record of a data stream
36098694788Security system
36108694785Broadband certified mail
36118694784Secure client-side key storage for web applications
36128694783Lightweight secure authentication channel
36138694782Wireless authentication using beacon messages
36148694781Techniques for providing hardware security module operability
36158694779Monitoring based on client perspective
36168694778Enrollment of physically unclonable functions
36178694773Method of preventing unauthenticated viewing using unique information of secure micro
36188694577Providing personalized platform application content
36198689321Restricting access to the resources of a terminal
36208689290System and method for securing a credential via user and server verification
36218689286System and method for determining a security encoding to be applied to outgoing messages
36228689000Use of certified secrets in communication
36238688999Methods for identifying audio or video content
36248688997Using digital certificates in document distribution
36258688996Multipad encryption
36268688994Federation among services for supporting virtual-network overlays
36278688991Media player embodiments and secure playlist packaging
36288688990Method for personalizing an authentication token
36298688989Receiver non-repudiation via a secure device
36308688985Data security method and apparatus using a characteristic preserving encryption
36318688984Providing content to a user across multiple devices
36328688982Monitoring based on client perspective
36338687843Method and system for restricting access to sensitive contents of digital images
36348683606Navigation system
36358683561Fixed client identification system for positive identification of client to server
36368683560Techniques for credential generation
36378683492Verifying information stored on a managed network device
36388683228System and method for WORM data storage
36398683209Method and apparatus for pseudonym generation and authentication
36408683207Updating signature algorithms for strong name binding
36418683205Accessing data utilizing entity registration in multiple dispersed storage networks
36428681994Systems and methods for document control using public key encryption
36438681992Monitoring and controlling access to electronic content
36448681780Establishing electronically authenticated internet voice connections
36458681358Process coordinating system, information processing apparatus, and a computer-readable recording medium storing an information processing program
36468680965Electronics antitheft authorizing unit
36478677476Providing remotely defined security data to a local application extension
36488677470System, method, and computer program product for security verification of communications to tenants of an on-demand database service
36498677465Preventing inadvertent lock-out during password entry dialog
36508677450Systems and methods of controlling network access
36518677141Enhanced security and performance of web applications
36528677139Method to provide authentication using a universal identifier
36538677134HTTP signing
36548677133Systems and methods for verifying an electronic documents provenance date
36558677132Document security
36568677128Method and apparatus for efficient and secure creating, transferring, and revealing of messages over a network
36578677127Method and apparatus for secure setup of an encrypted connection between two communication devices
36588677126Method and system for digital rights management of documents
36598677120Communication between key manager and storage subsystem kernal via management console
36608676995System and method for enabling pairing of a companion device with a mate device for performing a companion service
36618676251Dual modem device
36628675878Interoperable keychest for use by service providers
36638675261Security elements and methods of manufacture
36648671456Accessing restricted resources in computer programming
36658671448Method and system for implementing mandatory file access control in native discretionary access control environments
36668671279Incremental secure backup and restore of user settings and data
36678671277Method for secure communication over heterogeneous networks
36688671273Method of performance-aware security of unicast communication in hybrid satellite networks
36698671030Electronic vouchers and a system and method for issuing the same
36708670563System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
36718667573Validating the origin of web content
36728667562Input to locked computing device
36738667291Unauthorized contents detection system
36748667286Host device, semiconductor memory device, and authentication method
36758667285Remote authentication and transaction signatures
36768667280Method and apparatus for applying a partial password in a multi-factor authentication scheme
36778667278Information processing apparatus and data transmission method of information processing apparatus
36788667275Economically secure digital mass media systems
36798667274System and method for WORM data storage
36808667270Securely upgrading or downgrading platform components
36818666072Method and a system for receiving a multimedia signal, a cryptograophic entity for said reception method and system, and a method and a black box for producing said cryptographic entity
36828666069Cryptographic processing apparatus and cryptographic processing method, and computer program
36838666065Real-time data encryption
36848666064Endecryptor capable of performing parallel processing and encryption/decryption method thereof
36858661559Software control flow watermarking
36868661539Intrusion threat detection
36878661531System and method for secure control of resources of wireless mobile communication devices
36888661509Solicited authentication of a specific user
36898661258Compact security device with transaction risk level approval capability
36908661257Generic bootstrapping architecture usage with Web applications and Web pages
36918661255Digital rights management of streaming contents and services
36928661252Secure network address provisioning
36938661251Method and device for creating a group signature and related method and device for verifying a group signature
36948661250Remote activation of covert service channels
36958661246System and method for protecting certificate applications using a hardened proxy
36968660295Watermarking of digital images using watermark-indicators
36978660270Method and arrangement in a telecommunication system
36988656485Projection display device and method for controlling projection display device
36998656182Security mechanism for developmental operating systems
37008656178Method, system and program product for modifying content usage conditions during content distribution
37018656176Simple visual authentication of documents exchanged in commerce
37028656168Information processing apparatus, recovery apparatus, and disk recovery method
37038656166Storage and authentication of data transactions
37048656164Authentication system
37058656163Method for establishing a secured communication without preliminary information share
37068656162Aeronautical security management over broadband air/ground network
37078656156Method and terminal for authenticating between DRM agents for moving RO
37088655312Wireless access point detection
37098654974Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
37108650653Trusted graphics rendering for safer browsing on mobile devices
37118650617Method and system for real-time insertion of services during a call session over a communication network
37128650610Systems and methods of controlling network access
37138650588End-to end proof of display
37148650403Crytographic method for anonymous authentication and separate identification of a user
37158650402General data hiding framework using parity for minimal switching
37168650401Network having quantum key distribution
37178650400Data processor, relay transmitter, and data transmission system
37188650397Key distribution to a set of routers
37198650391Systems and methods for securely providing and/or accessing information
37208650389Secure sockets layer protocol handshake mirroring
37218650221Systems and methods to associate invoice data with a corresponding original invoice copy in a stack of invoices
37228649509Systems and computer program products for generating and verifying randomized hash values
37238646105System, method and security device for authorizing use of a software tool
37248646103Method and system for securing online identities
37258646063Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
37268646037Portable identity rating
37278646022Methods and apparatus to configure broadband-enabled entertainment systems
37288646011Certification program for devices operating with an entertainment access system
37298645703Power analysis countermeasure for the ECMQV key agreement algorithm
37308645702Method and apparatus to use identity information for digital signing and encrypting content integrity and authenticity in content oriented networks
37318645701System and method for zone signing and key management in a DNS system
37328645700DNSSEC inline signing
37338645699Use of certificate authority to control a device's access to services
37348645698Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
37358645697Message authorization
37368645696Notifying users of server changes via SSL
37378645692Source-of-leakage detectable E-mail address forming, sending and detection
37388645689Stateless agent
37398645482Network coding with last modified dates for P2P web caching
37408644503Content server systems and methods
37418640260Methods, systems and products for distributing digital content
37428640256File system operation and digital rights management (DRM)
37438640254Process execution apparatus and phone number registration apparatus
37448640211System and methods for universal password control
37458640210Distributed computer systems with time-dependent credentials
37468640208Authentication enforcement at resource level
37478639940Methods and systems for assigning roles on a token
37488639934Radio channel metrics for secure wireless network pairing
37498639933Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program
37508639932Quantum key distribution
37518639931Acceleration of key agreement protocols
37528639930Automated entity verification
37538639929Method, device and system for authenticating gateway, node and server
37548639928System and method for mounting encrypted data based on availability of a key on a network
37558639927Method of user-authenticated quantum key distribution
37568639925Method for protecting a sensor and data of the sensor from manipulation and a sensor to that end
37578639062Ensuring image integrity using document characteristics
37588638943Communication device, communication method, communication system and service issuing method
37598638221Modular patient communicator for use in life critical network
37608635688Image processing apparatus, image processing method, and recording medium
37618635681Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection
37628635677Information processing apparatus, screen transmitting method, and non-transitory computer-readable recording medium encoded with screen transmitting program
37638635660Dynamic constraints for query operations
37648635456Remote secure authorization
37658635455Encrypted communication device with restricted rate of encryption key retrievals from memory
37668635452Method for generating a cipher-based message authentication code
37678635444System and method for distributing keys in a wireless network
37688635443Method, device and mobile terminal for challenge handshake authentication protocol authentication
37698631501Reporting function in gaming system environment
37708631480Systems and methods for implementing security services
37718631238Preventing race conditions in secure token exchange
37728631237Simplified login for mobile devices
37738631227Processing encrypted electronic documents
37748630620Method and apparatus for securing location information and access control using the location information
37758630450Client-side watermarking using hybrid I-frames
37768627507System and method for multimedia data validation
37778627492Image processing apparatus, image processing method, and recording medium
37788627431Distributed network name
37798627421Methods and apparatus for authenticating a user based on implicit user memory
37808627414Methods and apparatuses for user-verifiable execution of security-sensitive code
37818627407Systems and methods for preventing unauthorized modification of network resources
37828627108System and method for protecting data on a mobile device
37838627099System, method and computer program product for removing null values during scanning
37848627092Asymmetric cryptography for wireless systems
37858627091Generating a secure signature utilizing a plurality of key shares
37868627085Customizable public key infrastructure and development tool for same
37878627084Secure messaging systems
37888627083Online secure device provisioning with online device binding using whitelists
37898627080Systems and methods for mutual authentication using one time codes
37908627077Transparent authentication process integration
37918627076System and method for facilitating communications based on trusted relationships
37928627075Communication device that receives external device information from an external device using near field communication
37938627074Secure block acknowledgement mechanism for use in communication networks
37948627071Insuring integrity of remote procedure calls used in a client and server storage system
37958626122Un-ciphered network operation solution
37968625805Digital security bubble
37978625801Authentication associated suite discovery and negotiation method
37988625800Portable secure element
37998625793Resynchronization for push message security using secret keys

2013

38008621650Verification of content possession by an announcing peer in a peer-to-peer content distribution system
38018621600Non-intrusive background synchronization when authentication is required
38028621563Method and apparatus for providing recommendation channels
38038621560User authentication using personal objects
38048621553Model based security for cloud services
38058621227System and method for cryptographic key exchange using matrices
38068621226Self-signed certificates for computer application signatures
38078621223Data security method and system
38088621222Archiving electronic content having digital signatures
38098621221Method and system for event notification for wireless PDA devices
38108621218Method and apparatus for mutual authentication in downloadable conditional access system
38118621215Methods and systems for creating monetary accounts for members in a social network
38128621211NETCONF/DMI-based secure network device discovery
38138621209Confidence-based authentication
38148621203Method and apparatus for authenticating a mobile device
38158620269Defining a boundary for wireless network using physical access control systems
38168620020Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting
38178619986Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier
38188619980Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key
38198615788Method and apparatus for scalable integrity attestation in virtualization environments
38208615658Dynamic foreign agent--home agent security association allocation for IP mobility systems
38218615657Source-of-leakage detectable e-mail address forming, sending and detection
38228615656Secure remote peripheral encryption tunnel
38238615651Offline shared security key calculation
38248615085Encrypted communication system with limited number of stored encryption key retrievals
38258613101Software distribution service federation
38268613098Method and system for providing a dynamic image verification system to confirm human input
38278613097Methods and systems for detecting an access attack
38288613026Methods and systems for viewer interactivity and social networking in a mobile TV broadcast network
38298612772Security core using soft key
38308612765Security based on subliminal and supraliminal channels for data objects
38318612764Method for secure transmission using a fax server, system and computer program for implementing this method
38328612762Communications apparatus, communications system, and method of setting certificate
38338612761Method of executing a cryptographic protocol between two electronic entities
38348612759Communication system for communicating data utilizing challenge data
38358612757Method and apparatus for securely providing identification information using translucent identification member
38368612755Security policy in trusted computing systems
38378612751Method and apparatus for entitled data transfer over the public internet
38388612750Creating and using secure communications channels for virtual universes
38398612747System and method for establishing historical usage-based hardware trust
38408611689Three-dimensional wavelet based video fingerprinting
38418607360Data delivery apparatus and data delivery method
38428607343Ticket-based personalization
38438607331Captcha image authentication method and system
38448607317Automatic user authentication and identification for mobile instant messaging application
38458607065Trusted and confidential remote TPM initialization
38468607057Secure outsourced aggregation with one-way chains
38478607056Data processing apparatus and method
38488607053Smart card security feature profile in home subscriber server
38498607051Method and apparatus for binding multiple authentications
38508607050Method and system for activation
38518607049Network access device for a cargo container security network
38528607047Mobile system, service system, and service providing method to securely transmit private information for use in service
38538607046System and method for signing a message to provide one-time approval to a plurality of parties
38548605906Bluetooth.RTM. device and method of connecting Bluetooth.RTM. devices using a Bluetooth.RTM. channel
38558601606Computer recovery or return
38568601592Data management utilizing access and content information
38578601562Policy enforcement using ESSO
38588601554Home realm discovery in mixed-mode federated realms
38598601541Method and apparatus for session validation to access mainframe resources
38608601540Software license management
38618601539Systems and methods for managing user permissions
38628601283Method for versatile content control with partitioning
38638601276Managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow
38648601275Inter-vehicle communication system
38658601274Inter-vehicle communication system
38668601273Signed manifest for run-time verification of software program identity and integrity
38678601270Method for the preparation of a chip card for electronic signature services
38688601268Methods for securing transactions by applying crytographic methods to assure mutual identity
38698601267Establishing a secured communication session
38708601265Method and system for improving storage security in a cloud computing environment
38718600103Message encoding
38728600058Generation of self-certified identity for efficient access control list management
38738600054Method, apparatus, and system for preventing abuse of authentication vector
38748595832Masking mechanism that facilitates safely executing untrusted native code
38758595816User authentication system and method for the same
38768595811Systems and methods for providing a virtual world commodity device
38778595799Access authorization
38788595509Systems and methods for online identity verification
38798595505Apparatus and method for direct anonymous attestation from bilinear maps
38808595502Data management system
38818595499Method for identifying a patient for later access to an electronic patient record for the patient using a communication device belonging to an inquiring person
38828595498Method for authenticating access to a secured chip by test device
38838595497Electronic file sending method
38848595495System and method for secure communications
38858595494Method for managing access to protected resources in a computer network, physical entities and computer programs therefor
38868595493Multi-phase storage volume transformation
38878595491Combining a mobile device and computer to create a secure personalized environment
38888595490System and method for secure transaction
38898594332Key generating apparatus, encrypting apparatus and decrypting appatatus
38908594325Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
38918593252Electronic lock box proximity access control
38928590057Encryption and authentication of communications and content payload over existing networks
38938590035Network firewall host application identification and authentication
38948590026Method and system for generating a touch CAPTCHA
38958590004Method and system for dynamic security using authentication server
38968589693Method for two step digital signature
38978589692Method and apparatus for verifying CGA signature
38988589691Self-signed certificates for computer application signatures
38998589689Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems
39008589687Architecture for supporting secure communication network setup in a wireless local area network (WLAN)
39018589684Communication devices and methods
39028589682System and method for secure provisioning of an information handling system
39038589675WLAN authentication method by a subscriber identifier sent by a WLAN terminal
39048589590Selecting an address provider using a dynamic indicator
39058588946Portable devices for providing acoustic source information, apparatuses for providing acoustic source information, and methods of providing acoustic source information
39068588462Video watermarking with fast detection
39078588425Encryption key recovery in the event of storage management failure
39088587837Image processing apparatus embedding additional information in document data
39098587405Electronic access control device
39108584254Data access reporting platform for secure active monitoring
39118584224Ticket based strong authentication with web service
39128584222Secure pin reset process
39138584202Apparatus and method for determining environment integrity levels
39148584201Method and apparatus for session validation to access from uncontrolled devices
39158584118Terminal, method and computer program product for validating a software application
39168583932Signature device, signature verification device, anonymous authetication system, signing method, signature authentication method, and programs therefor
39178583931Electronic signing apparatus and methods
39188583929Encryption method for secure packet transmission
39198583928Portable security transaction protocol
39208583926System and method for anti-phishing authentication
39218583924Location-based feature enablement for mobile terminals
39228583921Method and system for identity authentication
39238583909Digital broadcast receiver and booting method of digital broadcast receiver
39248583317In-vehicle device, vehicle authentication system and data communication method
39258582767Cryptographic device sharing among a plurality of communication links
39268582762Method for producing key material for use in communication with network
39278582761Cryptographic method with elliptical curves
39288582471Wireless ad-hoc network configuration method and apparatus
39298581695Channel-switching remote controlled barrier opening system
39308579705Software verification and authentication
39318578464Secure streaming container
39328578463Method of collaborative computing
39338578461Authenticating an auxiliary device from a portable electronic device
39348578456Authentication in an IP multimedia subsystem network where an in-use line identifier (LID) does not match a registered LID
39358578448Identifying guests in web meetings
39368578444Systems and methods of controlling network access
39378578172Information processing device for obtaining an HMAC
39388578170Bundle verification
39398578168Method and apparatus for preparing and verifying documents
39408578167System, apparatus, method, and program product for authenticating communication partner using electronic certificate containing personal information
39418578165Key agreement and transport protocol
39428578163Communication method, mesh network system and communication terminal
39438578155Address generating method and broadcast receiving apparatus
39448577037Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
39458577033Method for partially encrypting program data
39468577028System and method for performing exponentiation in a cryptographic system
39478576049Document authentication and identification
39488572707Multiple authentication mechanisms for accessing service center supporting a variety of products
39498572701Authenticating via mobile device
39508572692Method and system for a platform-based trust verifying service for multi-party verification
39518572690Apparatus and method for performing session validation to access confidential resources
39528572689Apparatus and method for making access decision using exceptions
39538572686Method and apparatus for object transaction session validation
39548572685Consolidated data services apparatus and method
39558572684Authentication using one-time passwords and associated indicia for plural sequences
39568572681Methods and systems for identity verification
39578572402Method and device for detecting an attempt to substitute an original casing portion of an electronic system with a replacement casing portion
39588572395Information processing apparatus, authentication method, and computer program
39598572390Method for transmitting and receiving data, in particular for secure exchanges between an aircraft and a ground base, related devices and aircraft equipped with such devices
39608572389System and method for protecting master encryption keys
39618572388Electronic document management system
39628572386Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method
39638572385System and method for optimal verification of operations on dynamic sets
39648572382Out-of band authentication method and system for communication over a data network
39658572379Private access to hash tables
39668572376Decryption of electronic communication in an electronic discovery enterprise system
39678572375Device pairing based on graphically encoded data
39688572121Blocking of unlicensed audio content in video files on a video hosting website
39698571257Method and system for image registration
39708570281Method and apparatus for multi-touch surface interaction for a financial application within a bank branch
39718566907Multiple user login detection and response system
39728566598Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication
39738566597Digital signature program, digital signature apparatus, and digital signature method
39748566596Pre-association mechanism to provide detailed description of wireless services
39758566593Method and apparatus of deriving security key(s)
39768566591Source-of-leakage detectable E-mail address forming, sending and detection
39778566588Method of authentication and secure exchange of data between a personalised chip and a dedicated server, and assembly for implementing the same
39788566581Secure inter-process communications
39798566578Method and system for ensuring compliance in public clouds using fine-grained data ownership based encryption
39808565185Framework of media-independent pre-authentication support for PANA
39818561161Method and system for authentication in a heterogeneous federated environment
39828561158Providing certificate matching in a system and method for searching and retrieving certificates
39838561137Techniques for identity authentication of virtualized machines
39848561087Methods for enabling software in storage-capable devices
39858560858Secure session identifiers
39868560856Lightweight secure neighbor discovery protocol for low-power and lossy networks
39878560855Verification of dispersed storage network access control information
39888560854Device enabled verifiable stroke and image based workflows
39898560851Managing digital certificates
39908560850Establishment method and device for link between access point and repeater in wireless distribution system
39918560849Method and system for secure communication using hash-based message authentication codes
39928560848Galois/counter mode encryption in a wireless network
39938560841Request authentication token
39948560840Method and system for authenticating a widget
39958560655Methods and apparatus for controlling the transmission and receipt of email messages
39968555401Content provision system
39978555400Privacy-preserving aggregation of Time-series data
39988555375Configuration method for control units
39998555356Network-agnostic content management
40008555351Trusted database authentication through an untrusted intermediary
40018555344Methods and systems for fallback modes of operation within wireless computer networks
40028555340Method and apparatus for determining authentication capabilities
40038555339Identifying guests in web meetings
40048555077Determining device identity using a behavioral fingerprint
40058555074Method and apparatus for processing information, and computer program product
40068555072Attestation of computing platforms
40078555071Method of managing metadata
40088555070External interface access control for medical systems
40098555066Systems and methods for controlling access to encrypted data stored on a mobile device
40108555064Security system and method for wireless communication system
40118555063Method for establishing a wireless link key between a remote device and a group device
40128555062Protocol to prevent replay attacks on secured wireless transactions
40138555053System and method for adjusting to drive specific criteria
40148555052Data hiding based messages and advertisements
40158553888Generation of communication device signatures for use in securing nomadic electronic transactions
40168553887Method for generating dynamic group key
40178553672MAC multiplexing and TFC selection for enhanced uplink
40188552833Security system for managing information on mobile wireless devices
40198550339Utilization of digit sequences for biometric authentication
40208549659Non-volatile memory for anti-cloning and authentication method for the same
40218549605System and method for automatically establishing new session with interactive service after previous session expiration
40228549602System and method for handling permits for user authentication tokens
40238549600Systems, methods and analyzers for establishing a secure wireless network in point of care testing
40248549599Fingerprint authentication server, client computer and fingerprint authentication method
40258549588Systems and methods for obtaining network access
40268549310Method and apparatus for secure measurement certification
40278549309Asymmetric content fingerprinting with adaptive window sizing
40288549305Steganographic method and device
40298549304System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
40308549302Downloadable conditional access system, channel setting method and message structure for 2-way communication between terminal and authentication server in the downloadable conditional access system
40318549300Virtual single sign-on for certificate-protected resources
40328549298Secure online service provider communication
40338549296Simple authentication of messages
40348549291Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the same
40358549283System and method of transmitting/receiving security data
40368549198Communication protocol
40378549101Portable embedded local server for write-through cache
40388548172Secure dissemination of events in a publish/subscribe network
40398548166Method for partially encrypting program data
40408548165Method of compressing a cryptographic value
40418548163Simultaneous scalar multiplication method
40428547848Traffic control within a network architecture providing many-to-one transmission with denial-of-service protection
40438547202RFID tag and operating method thereof
40448547201Protective-control measuring system and device and data transmission method
40458544084System and method for secure control of resources of wireless mobile communication devices
40468544066Access right management system, access right management method, and access right management program
40478544061Object model for domain-based content mobility
40488543841Secure hosted execution architecture
40498543828Authenticating a user with hash-based PIN generation
40508543825Method and apparatus for input of coded image data
40518543823Digital watermarking for identification documents
40528543821Scalably displaying sensitive data to users with varying authorization levels
40538543820Tag generation apparatus, tag verification apparatus, communication system, tag generation method, tag verification method, and recording medium
40548543819Secure authenticated distance measurement
40558543816Secure, auditable file exchange system and method
40568543811Efficient identity-based ring signature scheme with anonymity and system thereof
40578542871Brand protection and product authentication using portable devices
40588542836System, apparatus and methods for highly scalable continuous roaming within a wireless network
40598542833Systems and methods to secure laptops or portable computing devices
40608542832System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm
40618542830Method for partially encrypting program data
40628539603System and method for secure communication
40638539544Method of optimizing policy conformance check for a device with a large set of posture attribute combinations
40648539497Method for organizing software so the set of extensions for an extendable application can be run securely
40658539252Method and system for protecting data
40668539244Server, authentication server, content delivery system, and program
40678539241Method and system for securing communication
40688539240Rights object authentication in anchor point-based digital rights management
40698539237Methods and systems for playing media
40708539235Method for operating a network, a system management device, a network and a computer program therefor
40718539233Binding content licenses to portable storage devices
40728539228Managing access to a resource
40738539226Certificate management and transfer system and method
40748538026Key distribution
40758537385Access control apparatus, method, and printing system in a multi-domain environment
40768533841Deriving remediations from security compliance rules
40778533815False reject mitigation using non-biometric authentication
40788533777Mechanism to determine trust of out-of-band management agents
40798533491Data security for digital data storage
40808533482Method for generating a key pair and transmitting a public key or request file of a certificate in security
40818533479Translating information between computing devices having different security management
40828533476System, method and computer readable medium for message authentication to subscribers of an internet service provider
40838533475Method for pairing and authenticating one or more medical devices and one or more remote electronic devices
40848533474Generating session keys
40858533473Method and apparatus for reducing bandwidth usage in secure transactions
40868533472Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium
40878533471Method and server for providing mobility key
40888533463Reduced computation for generation of certificate revocation information
40898533455Method and apparatus for combining internet protocol authentication and mobility signaling
40908531414Bump suppression
40918528103System for managing display and retrieval of image content on a network with image identification and linking to network content
40928528095Injection context based static analysis of computer software applications
40938528091Methods, systems, and media for detecting covert malware
40948528067Anytime validation for verification tokens
40958528055Processing performance of repeated device compliance update messages
40968528044Information processing apparatus and control method
40978527771Wireless video communication
40988527770System and method for provisioning device certificates
40998527769Secure messaging with read-undeniability and deletion-verifiability
41008527768Mobile station, access point, gateway apparatus, base station, and handshake method thereof for use in a wireless network framework
41018527767System and method for processing encoded messages for exchange with a mobile data communication device
41028527765Shared secret verification method and system
41038527764Method and system for secure communication
41048527762Method for realizing an authentication center and an authentication system thereof
41058527761System and method for fuse enablement of a secure client hosted virtualization in an information handling system
41068527760Determining trust data for devices in a network
41078527759IMS user equipment, control method thereof, host device, and control method thereof
41088527756Security device and building block functions
41098527751Systems and methods for secure and certified electronic messaging
41108527599System and method for regulating electronic messages
41118526614Method to manage members of at least one group of decoders having access to broadcast data
41128526608Printing system and printer with electronic signature capability and method thereof
41138522324Control of access to a secondary system
41148522316Connector and method for providing access to a data-processing network for a data-processing device
41158522311Authentication techniques
41168522310Psychometric keycard for online applications
41178522307Flexibly assigning security configurations to applications
41188522201Methods and apparatus for sub-asset modification
41198522046Method, apparatus and system for acquiring service by portable device
41208522039Method and apparatus for establishing a federated identity using a personal wireless device
41218522036Method for providing access control to media services
41228522035Assisted certificate enrollment
41238522034Systems and methods for transparent configuration authentication of networked devices
41248522032System and method to prevent audio watermark detection
41258522031Method and apparatus for establishing a trusted and secure relationship between two parties connected to a network
41268522030Verification and protection of genuine software installation using hardware super key
41278522029Secret-key exchange for wireless and sensor networks
41288522028Method for secure data exchange between two devices
41298522025Authenticating an application
41308522023Rural services platform
41318522021Communication channel of a device
41328522019Method and apparatus to create trust domains based on proximity
41338522018Method and system for implementing a mobile trusted platform module
41348522017Systems and methods for signal reduction in wireless communication
41358522015Authentication of binaries in memory with proxy code execution
41368522014Method and system for storing a key in a remote security module
41378516566Systems and methods for using external authentication service for Kerberos pre-authentication
41388516562Multi-channel multi-factor authentication
41398516561Methods and apparatus for determining user authorization from motion of a gesture-based control unit
41408516560Secure remote authentication through an untrusted network
41418516559Content processing system, content processing method, computer program, recording medium, and portable terminal
41428516555Method and system for authenticating pay-per-use service using EAP
41438516262Methods and apparatus for efficient computation of one-way chains in cryptographic applications
41448516257Secure media peripheral association in a media exchange network
41458516256Route optimization in mobile IP networks
41468516255Methods and apparatus for peer-to-peer transfer of secure data using near field communications
41478516254Method and apparatus for communicating information between a security panel and a security server
41488516253Self-keyed protection of anticipatory content
41498516250Lock administration system
41508516244System, apparatus and method for decentralizing attribute-based encryption information
41518516243Host identity protocol method and apparatus
41528515066Method, apparatus and program for establishing encrypted communication channel between apparatuses
41538510849Data protection systems and methods
41548510818Selective cross-realm authentication
41558510816Security device provisioning
41568510797Online user authentication
41578510795Video-based CAPTCHA
41588510565Bidirectional entity authentication method based on the credible third party
41598510564Automatic configuration and continuation of federation relationships
41608510561Methods and devices for computing a shared encryption key
41618510558Identity based authenticated key agreement protocol
41628510557Secure message and file delivery
41638510556Authentication method, system, server, and user node
41648510550Method for managing data in a wireless sensor network
41658510437Method and system for tracking screen activities
41668509443Rekey index generation method and rekey index generation apparatus
41678509427Hybrid mode cryptographic method and system with message authentication
41688505810Systems and methods for adding authenticating features to process molded parts and the resultant molded parts
41698505106Cross site request forgery mitigation in multi-domain integrations
41708505090Archive of text captures from rendered documents
41718505076Proactive authentication
41728505071Preventing automated programs and unauthorized users in a network
41738505070Separate script context to isolate malicious script
41748504836Secure and efficient domain key distribution for device registration
41758504835Method for secure remote backup
41768504834Method and system for activation of local content with legacy streaming systems
41778504833Relay device, wireless communications device, network system, program storage medium, and method
41788504832Mobile terminal for sharing resources, method of sharing resources within mobile terminal and method of sharing resources between web server and terminal
41798504831Systems, methods, and computer program products for user authentication
41808504587Content access and annotation system and method
41818503679Short message encryption
41828503657System, method and apparatus for authenticating and protecting an IP user-end device
41838502668System and method for article authentication using blanket illumination
41848499172Hardware-based key generation and recovery
41858499166Controlling access to a protected network
41868499162Non-transitory computer readable medium storing program, information processing apparatus, and information processing method
41878499158Anonymous authentication service method for providing local linkability
41888499155Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period
41898499154System and method for establishing a secure connection with a mobile device
41908499153System and method of authenticating a user to a service provider
41918499150Selectively trusting signed files
41928499053Segmenting access to electronic message boards
41938499045Systems and methods for protecting header fields in a message
41948498006Data processing apparatus including external memory storage of designation information
41958495752AV server device, TV receiver incorporating AV server and personal computer incorporating AV server
41968495381Authenticated remote PIN unblock
41978495377Enabling secure access to sensor network infrastructure using multiple interfaces and application-based group key selection
41988495376Apparatus and method for controlling use of broadcasting program using signature in program information
41998495372Authentication methods and apparatus using pairing protocols and other techniques
42008495370Information processing apparatus and authentication bypassing method
42018490204Selective protection of files on portable memory devices
42028490198Techniques for local personalization of content
42038490169Server-token lockstep systems and methods
42048490167Preventing password presentation by a computer system
42058490157Authentication--circles of trust
42068490151Method and apparatus for performing a multi-role communication using a memory tag
42078489883Virtual world embedded security watermarking
42088489880Remote execution of commands transmitted through an open network with decoupled feedback
42098489879Apparatus, method, program, and system for information processing
42108489878Communication across domains
42118489071System and method for assuring identity on a mobile device
42128488838Combined watermarking and fingerprinting
42138488785Secure storage and retrieval of confidential information
42148487739Television theft deterrence
42158484721Locked-down computing environment
42168484479Systems and methods for authenticating an electronic message
42178484478Instant messaging private tags
42188484477Document management system and method
42198484476Computer-implemented method and system for embedding and authenticating ancillary information in digitally signed content
42208484474Methods for firmware signature
42218484472System and method of filtering unsolicited messages
42228484471Multi-party distributed multiplication device, multi-party distributed multiplication system and method
42238484467Authentication in communications networks
42248479270Method for allocating authorization key identifier for wireless portable internet system
42258479261Implementing electronic chip identification (ECID) exchange for network security
42268479009Wearable time-bracketed video authentication
42278479008Providing security services on the cloud
42288479006Digitally signing documents using identity context information
42298479005Applet, archive file generation method, archive file generation program, and archive file generation device
42308479003Electronic signature validation systems and methods for asynchronous environments
42318479002Electronic certificate issuance system, electronic certificate issuing device, communication device, and program therefor
42328479000Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
42338478998Authenticated communication using a shared unpredictable secret
42348478995Method of encrypting and transferring data between a sender and a receiver using a network
42358478830Method and apparatus for processing digitally signed messages to determine address mismatches
42368474052User-administered license state verification
42378474027Remote management of resource license
42388474025Methods and apparatus for credential validation
42398474015System and method for managing feature enablement in an information handling system
42408474014Methods for the secure use of one-time passwords
42418474013Securely managing password access to a computer system
42428474011On-line centralized and local authorization of executable files
42438473754Hardware-facilitated secure software execution environment
42448473746Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
42458473744Methods and systems for unilateral authentication of messages
42468473743Mobile device management
42478473742Method of distributing a decryption key in fixed-content data
42488473740Method and system for secured management of online XML document services through structure-preserving asymmetric encryption
42498473737Authentication device and method using electronic certificate files having hierarchical relationship
42508471677Barrier movement system including a combined keypad and voice responsive transmitter
42518468587Binding activation of network-enabled devices to web-based services
42528468360Client terminal, server, server-client system, cooperation processing method, program and recording medium
42538468359Credentials for blinded intended audiences
42548468355Multi-dimensional credentialing using veiled certificates
42558468354Broker-based interworking using hierarchical certificates
42568468352Retrieving and using cloud based storage credentials
42578468343System and method for securing wireless transmissions
42588467525Steganographic method and device
42598466775Electronic label authenticating method and system
42608464352Techniques for detecting and preventing unintentional disclosures of sensitive data
42618464348Isolated computing environment anchored into CPU and motherboard
42628464324System and method for identity verification on a computer
42638464249Software installation package with digital signatures
42648464077Systems and methods for secure transaction management and electronic rights protection
42658464071Trusted storage systems and methods
42668464066Method and system for sharing segments of multimedia data
42678464063Trusted group of a plurality of devices with single sign on, secure authentication
42688464062Systems, devices, and methods for securely transmitting a security parameter to a computing device
42698464061Secure wireless link between two devices using probes
42708464056Method for secure dynamic bandwidth allocation in a TT ethernet
42718464055Method and apparatus of ensuring security of communication in home network
42728464054Measurement probe systems for co-ordinate positioning apparatus
42738463938Address couplet communication filtering
42748462953Communication system and method thereof
42758462939RNS-based cryptographic system and method
42768458795Event detection/anomaly correlation heuristics
42778458769Cloud based firewall system and service
42788458490System and method for supporting full volume encryption devices in a client hosted virtualization system
42798458481Using watermarking to reduce communication overhead
42808458480Method and apparatus for binding TPM keys to execution entities
42818458479Verification apparatus
42828458478Signature generating apparatus, signature verifying apparatus, and methods and programs therefor
42838458477Communication with non-repudiation
42848458469Secure communication between an electronic label and a reader
42858458462Verifying integrity of network devices for secure multicast communications
42868458458Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method
42878458456Method and system for verifying the identity of a communication partner
42888458254Peer-to-peer network system, proxy service peer, and method for peer interworking between overlay networks
42898457314Wireless video surveillance system and method for self-configuring network
42908457305Generating genus 2 curves from invariants
42918456670Printing device and printing system for controlling authentication print jobs
42928453224Single sign-on authentication
42938453050Method and apparatus for creating and editing electronic documents
42948452979Portable telecommunications apparatus
42958452974Image processing apparatus, electronic signature generation system, electronic signature key generation method, image processing method, and program
42968452973Digital signature method, program, and apparatus
42978452971Embedding and detection of watermark in a motion image signal
42988452969Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
42998452967Using flash storage device to prevent unauthorized use of software
43008452964Method for providing confidentiality protection of control signaling using certificate
43018452963Generating protected access credentials
43028452962Method and apparatus for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture
43038452961Method and system for authentication between electronic devices with minimal user intervention
43048452960System and method for content delivery
43058452016Interoperable keychest for use by service providers
43068452014Group key management for mobile ad-hoc networks
43078452013Secure message handling on a mobile device
43088452012Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
43098452007Security key generating method, device and system
43108448719Key exchange device
43118448222Method and apparatus for registering agents onto a virtual machine monitor
43128447986Accessing restricted content based on proximity
43138447985Watermarking apparatus, software enabling an implementation of an electronic circuit comprising a watermark, method for detecting a watermark and apparatus for detecting a watermark
43148447984Authentication system and method for operating the same
43158447980System and method for processing encoded messages for exchange with a mobile data communication device
43168447977Authenticating a device with a server over a network
43178447976Business to business secure mail
43188447158Repeater device
43198443432Method for calibrating a temperature float of a one time password token and a one time password token thereof
43208443430Remote registration for enterprise applications
43218443419Method, device, and system for pre-authentication
43228443418Method and apparatus for managing remote access authority in UpnP remote access service
43238443417Node authentication and node operation methods within service and access networks in NGN environment
43248443194Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system
43258443193State-maintained multi-party signatures
43268443192Network security method
43278443191System and method for accessing information resources using cryptographic authorization permits
43288443115Method and system for managing access to presence attribute information
43298443101Method for identifying and blocking embedded communications
43308438656Method and system for preventing unauthorized recording of media content on a macintosh operating system
43318438642Method of detecting potential phishing by analyzing universal resource locators
43328438397Watermarking for compressed scalable coded bitstreams
43338438391Credential generation management servers and method for communications devices and device management servers
43348438390Method and system for using neighbor discovery unspecified solicitation to obtain link local address
43358438388Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network
43368437474Public key encryption for groups
43378434156Method, access node, and system for obtaining data
43388434135Creating and launching a web application with credentials
43398433914Multi-channel transaction signing
43408433913Apparatus, method, and program for digital signature
43418433910Electronic signature method, apparatus, and recording medium having electronic signature program recorded thereon
43428433909One-to-many electronic signature process
43438433907Application server, control method thereof, program, and computer-readable storage medium
43448433906Method and system for microlocking web content
43458433903Asynchronous enhanced shared secret provisioning protocol
43468433899System and method for authenticating data using incompatible digest functions
43478433897Group signature system, apparatus and storage medium
43488433757Centralized management of applications and desktop preferences without requiring configuration of clientside operating systems
43498430301Document authentication using hierarchical barcode stamps to detect alterations of barcode
43508429755System and method for receiving digital content
43518429730Authenticating users and on-line sites
43528429719Interworking between first and second authentication domains
43538429419Method for securing authorized data entry and the device to perform this method
43548429414Apparatus and method of generating and detecting prevention and control data for verifying validity of data
43558429413Systems and methods for server aided processing of a signed receipt
43568429409Secure reset of personal and service provider information on mobile devices
43578429407Digital handshake between devices
43588429405System and method for human assisted secure information exchange
43598429404Method and system for secure communications on a managed network
43608429403Systems and methods for provisioning network devices
43618429235Apparatus and method for precluding e-mail distribution
43628428265Method and apparatus of securely processing data for file backup, de-duplication, and restoration
43638428262Method to connect wireless communication device, wireless communication device, and computer usable medium therefor
43648428261System and method for establishing authenticated wireless connection between mobile unit and host
43658424103Authenticated printing system and authenticated printing method
43668423782Method for authenticating a user accessing a remote server from a computer
43678423778Apparatus and method for transmitting secure and/or copyrighted digital video broadcasting data over internet protocol network
43688423775Circumvention of dynamic, robust, embedded-signal detection
43698423774Integrity protected smart card transaction
43708423773Method for receiving/sending multimedia messages
43718423760Method and system for reducing packet overhead for an LTE architecture while securing traffic in an unsecured environment
43728423471Protected document elements
43738417957Content distribution system, content distribution method, and client terminal
43748417954Installation image including digital signature
43758417952Method for Digital Rights Management in a mobile communications network
43768417941Apparatus and method to prevent man in the middle attack
43778417937System and method for securely transfering content from set-top box to personal media player
43788416949Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system
43798416463Printing of a position-coding pattern
43808416058Secure method for biometric verification of a person
43818413233Authorizing local application activity using remotely defined security data
43828413221Methods and apparatus for delegated authentication
43838412948Method and apparatus for digital signature generation and validation
43848412947System and method of secure encryption for electronic data transfer
43858412945Systems and methods for implementing security in a cloud computing environment
43868412942Method and system for seamless SSID creation, authentication and encryption
43878412937Method and system for authentication of a low-resource prover
43888411866Distribution of group cryptography material in a mobile IP environment
43898411858Dynamic foreign agent-home agent security association allocation for IP mobility systems
43908411857Partial multiple encryption
43918411328Print control apparatus, print control method, and program therefor
43928407770System and method for managing user token in client device on network
43938407762System for three level authentication of a user
43948407484Flash memory distribution of digital content
43958407479Data authentication and tamper detection
43968407478Control message signature for device control
43978407473Information processing apparatus and method, recording medium and program
43988407472Mobile content delivery optimization
43998407471Selecting a network service for communicating with a server
44008407469Protection against unintentional file changing
44018407466Controlling download and playback of media content
44028406735Method for pairing electronic equipment in a wireless network system
44038406733Automated device provisioning and activation
44048406459Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination
44058406456Methods and systems for image fingerprinting
44068406223Mechanism for protecting H.323 networks for call set-up functions
44078405862Printing managing apparatus, image forming apparatus, and printing managing method
44088402513Network access method of wireless local area network (WLAN) terminals and network system thereof
44098402509User authentication apparatus and method thereof
44108402285Method of encrypting and storing digital content using firmware regional code and apparatus therefor
44118402275Method and system for establishing a communications pipe between a personal security device and a remote computer system
44128402274System and method of sharing contents data in network
44138402272Master unit and slave unit
44148401196Method and apparatus for performing JRNSO in FDD, TDD and MIMO communications
44158401195Method of automatically populating a list of managed secure communications group members
44168400260System and method for securing authorized access by a mobile data device of a document processing device
44178397280Static packet address assignment for a wireless communication device by an authorization system
44188397082System and method for thwarting buffer overflow attacks using encrypted process pointers
44198397075Method and apparatus for access control to installation control systems of wind energy installations
44208397071Generation method and update method of authorization key for mobile communication
44218397069Methods and systems for protecting media content
44228397062Method and system for source authentication in group communications
44238397059Methods and apparatus for implementing authentication
44248397058System and method for communication between smart cards
44258396288Information processing apparatus and information processing method for image verification
44268396216Partial dual-encryption using program map tables
44278396211System and method for dynamic modification of allowable electronic message properties
44288393001Secure signature server system and associated method
44298392967Image forming system, image forming apparatus, and method for creating, maintaining, and applying authorization information
44308392717Authentication method, system, server, and client
44318392716Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method
44328392715Method and device for identifying objects or documents
44338392714Secure overlay manager protection
44348392711Staged establishment of secure strings of symbols
44358392710Entity bidirectional-identification method for supporting fast handoff
44368392708Auditing data integrity
44378392707Gaming network
44388392506Networked gaming system including a location monitor and dispatcher using personal data keys
44398391837Method, system and trusted service manager for securely transmitting an application to a mobile phone
44408391543Method and apparatus for preventing data leakage faciliated by steganography
44418391488Method and apparatus for using navigation signal information for geoencryption to enhance security
44428387152Attested content protection
44438387130Authenticated service virtualization
44448387129Method and apparatus for verifying data packet integrity in a streaming data channel
44458386800Verifiable, leak-resistant encryption and decryption
44468386793Method and apparatus for implementing electronic seal
44478386792Asymmetric content fingerprinting with adaptive window sizing
44488386791Secure data processing method based particularly on a cryptographic algorithm
44498386790Method of using ECDSA with winternitz one time signature
44508386787Hash function using a heap modeling process
44518386786File system authentication
44528386785Gaming machine certificate creation and management
44538386784Apparatus and method for securely submitting and processing a request
44548386781Unit using OS and image forming apparatus using the same
44558386779Role navigation designer and verifier
44568386774Logging system and method based on one-way hash function
44578386773Verification methods and apparatus for use in providing application services to mobile communication devices
44588386771Process and streaming server for encrypting a data stream with bandwidth based variation
44598386766Method and arrangement for deciding a security setting
44608386589System that provides embedded software to an embedded system
44618385553Portable secure element
44628385551Highly available cryptographic key storage (HACKS)
44638385207Method and apparatus for end-to-end network congestion management
44648384513Transmitter and method for transmitting an RF control signal
44658381191Intention based application customization
44668380993Method and system for robust watermark insertion and extraction for digital set-top boxes
44678380990Secure peer-to-peer messaging invitation architecture
44688380989System and method for second factor authentication
44698380979Methods, systems, and computer program products for invoking trust-controlled services via application programming interfaces (APIs) respectively associated therewith
44708380167LAN-based UMA network controller with proxy connection
44718379911Method and system for efficient watermarking of video content
44728379863Enabling users to select between secure service providers using a central trusted service manager
44738379862Method and device for automatically distributing updated key material
44748379852Processing video content
44758379847Data and control encryption
44768375432Methods, apparatus, and computer program products for subscriber authentication and temporary code generation
44778375428Password input system using alphanumeric matrices and password input method using the same
44788375425Password expiration based on vulnerability detection
44798375420Challenge-response system and method
44808375419Information processing apparatus, method for controlling information processing apparatus, and storage medium
44818375217Process and device for the packet-oriented transmission of security-relevant data
44828375216Document verification apparatus and method
44838375214Information processing apparatus, information processing method, and program therefor
44848375213Systems and methods for enabling trust in a federated collaboration
44858375212Method for personalizing an authentication token
44868375210Automatic configuration of devices upon introduction into a networked environment
44878375209Near field registration of home system audio-video device
44888375207Method and apparatus for authenticating a network device
44898375204Method and system to combine multiple digital certificates using the subject alternative name extension
44908375202Communications methods and appliances
44918370917Security bridging
44928370907Internet enabled monitoring and control device
44938370899Disposable browser for commercial banking
44948370896System and method for determining a security encoding to be applied to outgoing messages
44958370638Derivative seeds
44968370635Synchronization of digital watermarks
44978370634Systems and methods for watermarking software and other media
44988370633Apparatus, method, and computer instructions for generating a substitute signature key pair
44998370631Trusted identities on a trusted computing platform
45008370629Trusted hybrid location system
45018369526Device, system, and method of securely executing applications
45028369523Surrogate key generation using cryptographic hashing
45038365305E-mail with secure message parts
45048365281Determining whether method of computer program is a validator
45058365261Implementing organization-specific policy during establishment of an autonomous connection between computer resources
45068365248Data providing device, operation device, and data processing device
45078364985Buffer-caches for caching encrypted data via copy-on-encrypt
45088364978System for and method of auto-registration with cryptographic modules
45098364958Sharing a secret via linear interpolation
45108364957System and method of providing credentials in a network
45118364954Method and system for provisioning multiple digital certificates
45128364945Provisioning an unknown computer system
45138364138Remote locking arrangements for electronic devices
45148359642Restricting mature content
45158359641Multi-level secure information retrieval system
45168359631Portable identity rating
45178359480Scalable RFID systems: a privacy preserving protocol with constant-time identification
45188359476User authentication system and method for encryption and decryption
45198359472Document fingerprinting with asymmetric selection of anchor points
45208359465Enterprise security system
45218359394Tearing and conformal transformation human interactive proof
45228359273Secured authentication method for providing services on a data transmisson Network
45238358197Mesh network door lock
45248356351Method and device for verification of code module in virtual machine
45258356337Electronic permission slips for controlling access to multimedia content
45268356182Electronic signature system and electronic signature verifying method
45278356181Apparatus and method for a direct anonymous attestation scheme from short-group signatures
45288356180Multidimensional identification, authentication, authorization and key distribution system for patient monitoring
45298356179Entity bi-directional identificator method and system based on trustable third party
45308356176Method and system for authenticating peer devices using EAP
45318355805Systems and methods for activation and deactivation of appliances
45328353448Method and system for using machine-readable codes to perform automated teller machine transactions through a mobile communications device
45338353053Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption
45348353035Systems and methods for creating text signatures for identifying spam messages
45358353027System and method for enhanced protection and control over the use of identity
45368353018Automatic local listing owner authentication system
45378353007Systems and methods for identifying a network
45388352747Software self-checking systems and methods
45398352744Product authentication method
45408352743Client device, key device, service providing apparatus, user authentication system, user authentication method, program, and recording medium
45418352741Discovery of secure network enclaves
45428352738Method and apparatus for secure online transactions
45438351914Method and system for registration of licensed modules in mobile devices
45448351645Methods and apparatus for embedding watermarks
45458351603Random number generating device, random number generating method, and security chip
45468347406Image processing apparatus, image processing method, and storage medium
45478347400Document access management method and system
45488347393Method and system for detecting a state of a web application using a signature
45498347389System for protecting devices against virus attacks
45508347370Multi-channel multi-factor authentication
45518347367Techniques for entry of less than perfect passwords
45528347360Shared device identity manager
45538347353Addressing security in asymmetrical networks
45548347351Systems and methods of controlling network access
45558347350Systems and methods of controlling network access
45568347349Configuring browser policy settings on client computing devices
45578347100Methods for DNSSEC proxying and deployment amelioration and systems thereof
45588347099Playback apparatus and playback method
45598347095System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison
45608347093Privacy preserving name verification
45618347090Encryption of identifiers in a communication system
45628347087Support for multiple digital rights management systems for same content
45638347086System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium
45648347076System and method for building home domain using smart card which contains information of home network member device
45658347072Method and apparatus for secure execution using a secure memory partition
45668346667Distributed secure anonymous conferencing
45678346567Efficient and secure forensic marking in compressed domain
45688345994Image data transmission
45698345875System and method of creating and sending broadcast and multicast data
45708345869Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network
45718345862Method of sharing a strong secret between two parties, one of whom has little processing power
45728345313Image forming apparatus, method and control program, for enabling image formation of a valid print object while disabling image formation of an invalid print object on a page including a plurality of print objects
45738343235Theft prevention of media peripherals in a media exchange network
45748342400Systems controlled by data bearing records for maintaining inventory data

2012

45758341716Information processing device, information processing method, and storage media storing user certification program
45768341705Method, apparatus, and computer product for managing operation
45778341699Method and system to detect human interaction with a computer
45788341698Transforming static password systems to become 2-factor authentication
45798341421System and method for enrolling in a biometric system
45808341416Assertion message signatures
45818341415Phrase matching
45828341414License managing method and device
45838341409Content server apparatus, on-vehicle player apparatus, system, method, and program
45848341088Multipurpose electronic payment method and system
45858340344Method and system for video transmission and processing with customized watermarking delivery
45868340300Non-disruptive authentication administration
45878340299Key management system and method
45888336104Generation and use of digital contents
45898336091Multi-level authentication
45908336087Robust digest authentication method
45918336081Trusted network connect system for enhancing the security
45928335928Information providing system and method and storage medium
45938335925Method and arrangement for secure authentication
45948335924Systems and methods for watermarking software and other media
45958334757Controlling data access to and from an RFID device
45968332952Time window based canary solutions for browser security
45978332936Computer application pre-permissioning
45988332649Authentication system, signature creating device, and signature verifying device
45998332647System and method for dynamic multi-attribute authentication
46008332646On-demand watermarking of content
46018332640Storage apparatus, method for validating encrypted content and terminal apparatus
46028332635Updateable secure kernel extensions
46038332520Web server for managing session and method thereof
46048331568Efficient distribution of computation in key agreement
46058331560Distributed scalable cryptographic access control
46068331556Asymmetrical method of encryption or signature verification
46078330996Image forming apparatus
46088327157Secure encrypted email server
46098327149Efficient and secure data currentness systems
46108327148Mobile system, service system, and key authentication method to manage key in local wireless communication
46118327147Non-transferable anonymous digital receipts
46128327146Wireless communication using compact certificates
46138327144Authentication method, system, and apparatus thereof for inter-domain information communication
46148327143Techniques to provide access point authentication for wireless network
46158327141Centralized authentication system with safe private data storage and method
46168327139System and method for securely exchanging sensitive information with an implantable medical device
46178327134System, method and program product for checking revocation status of a biometric reference template
46188327131Method and system to issue trust score certificates for networked devices using a trust scoring service
46198327125Content securing system
46208325913System and method of authentication
46218321955Systems and methods for protecting against denial of service attacks
46228321949Managing software run in a computing system
46238321924Method for protecting software accessible over a network using a key device
46248321923Secure sharing of resources between applications in independent execution environments in a retrievable token (e.g. smart card)
46258321922Authenticating a user of a system using near field communication
46268321912Centralized identity authentication for electronic communication networks
46278321680Multisigning--a protocol for robust multiple party digital signatures
46288321678System and method to send a message using multiple authentication mechanisms
46298321673Method and terminal for authenticating between DRM agents for moving RO
46308321672Authentication system, information processing apparatus and method, program, and recording medium
46318321670Securing dynamic authorization messages
46328321669Electronic data communication system
46338320610Client-side watermarking using hybrid I-frames
46348320606Video watermarking with fast detection
46358319984Image forming system, apparatus, and method executing a process designated by a service request after token validation
46368319631Modular patient portable communicator for use in life critical network
46378316461Method for sharing rights objects between users
46388316429Methods and systems for obtaining URL filtering information
46398316416Securely using a display to exchange information
46408316238Method and system for providing image processing to track digital information
46418316236Determining security states using binary output sequences
46428316235Method and device for manipulation-proof transmission of data
46438316234Encoded attribute matching on communication devices
46448316233Systems and methods for accessing secure and certified electronic messages
46458316229Secure certificate installation on IP clients
46468315617Controlling mobile device functions
46478315592Voice messaging prioritization
46488312540System for slowing password attacks
46498312524Card management device and card management system
46508312512Secure file transfer method
46518312510Authentication terminal and network terminal
46528312285Global profile management method and system
46538312284Verifiable timestamping of data objects, and applications thereof
46548312282Information processing apparatus and method
46558312279Secure modem gateway concentrator
46568312278Access authentication method applying to IBSS network
46578312277Method and system for secure communication between computers
46588312276Method for sending and receiving an evaluation of reputation in a social network
46598312274Image processing apparatus and method for controlling the same
46608312273Privacy vault for maintaining the privacy of user profiles
46618312272Secure authentication token management
46628312270DHCP-based security policy enforcement system
46638312269Challenge and response access control providing data security in data storage devices
46648312263System and method for installing trust anchors in an endpoint
46658312261Method and system for verification of an endpoint security scan
46668312122Device management system, device, and computer readable medium
46678312097Segmenting access to electronic message boards
46688311218Rounding for security
46698310694Information processing apparatus and control method thereof
46708307436Transformative rendering of internet resources
46718307234Maintaining connectivity during low power operation
46728307211Data card verification system
46738307208Confidential communication method
46748307206Cryptographic policy enforcement
46758306393Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium
46768306217Cryptographic processing apparatus and cryptographic processing method, and computer program
46778305646Electronic document printing system, printing controller, printing control method, and computer-readable medium
46788302194Using file prevalence to inform aggressiveness of behavioral heuristics
46798302185System and method of owner control of electronic devices
46808301906Apparatus for writing information on a data content on a storage medium
46818301895Identity based network policy enablement
46828301892Secure instant messaging system
46838301891Localized network authentication and security using tamper-resistant keys
46848301889Secure messaging systems
46858301887Method and system for automated authentication of a device to a management node of a computer network
46868301885Time-controlled secure communication
46878301884Method of managing metadata
46888301803Block floating point compression of signal data
46898301658Site directed management of audio components of uploaded video files
46908300884Combined watermarking and fingerprinting
46918300878Blind wavelet-based watermarking method
46928299891Antitheft system for vehicle
46938296850Detecting global anomalies
46948296834Secure single-sign-on portal system
46958296830Management apparatus and control method of management apparatus
46968296829Providing certificate matching in a system and method for searching and retrieving certificates
46978296584Storage and retrieval of encrypted data blocks with in-line message authentication codes
46988296582Method and system for providing copy-protection on a storage medium and storage medium for use in such a system
46998296580System and method for protecting data on a mobile device
47008296566Method for session key derivation in an IC card
47018296564Communication channel access based on channel identifier and use policy
47028296563Method of handling a certification request
47038296559Peer-to-peer SMIME mechanism
47048295488Exchange of key material
47058295478Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure
47068291482System for restricting content access and storage
47078291472Real-time adjustments to authentication conditions
47088291235Method and system for controlling access of clients and users to a print server
47098291231Common key setting method, relay apparatus, and program
47108291230Method and system for signing JavaScript object notation (JSON) messages
47118291226Method and apparatus for securely booting from an external storage device
47128291225Communications apparatus, communications system, and method of setting certificate
47138291224Distributed cryptographic management for computer systems
47148291218Creating and using secure communications channels for virtual universes
47158291023System and method for regulating electronic messages
47168290871Systems and methods for a secure recording environment
47178290660Data access to electronic control units
47188290152Management system for web service developer keys
47198290146Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus
47208289936Seamless public wireless local area network user authentication
47218286256Method and system for restricted biometric access to content of packaged media
47228286236Manufacturing control system
47238286228Secure streaming container
47248286226Password protection system
47258286224Authentication device and network authentication system, method for authenticating terminal device and program storage medium
47268285999System and method for authenticating remote execution
47278285998Dynamic image content tamper detecting device and system
47288285995System and method for digitally marking a file with a removable mark
47298285994Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
47308285989Establishing a secured communication session
47318285988Method and system for command authentication to achieve a secure interface
47328284984Method and system for image registration
47338284944Unified and persistent system and method for automatic configuration of encryption
47348284942Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store
47358284930Simultaneous scalar multiplication method
47368284431Printing management system, printing management method, and program
47378281390Remotely defining security data for authorization of local application activity
47388281379Method and system for providing a federated authentication service with gradual expiration of credentials
47398281366Systems and methods for using guardian proximity to control computing activities of children
47408281364Method and system for performing secure logon input on network
47418281149Privacy-preserving flexible anonymous-pseudonymous access
47428281145Doing business without SSN, EIN, and charge card numbers
47438281143Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication
47448281141Method and apparatus for monitoring and analyzing degree of trust and information assurance attributes information in a data providence architecture workflow
47458281139System and method for monitoring unauthorized transport of digital content
47468281138Steganalysis of suspect media
47478281137Method and apparatus for determining whether or not a reference pattern is present in a received and possibly watermarked signal
47488281135Enforcing use of chipset key management services for encrypted storage devices
47498281134Methods and apparatus for layer 2 and layer 3 security between wireless termination points
47508281133Predictive real-time pairwise master key identification (PMKID) generation
47518281132Method and apparatus for security over multiple interfaces
47528281120Sending signed e-mail messages from a device
47538280745Systems and methods for applying secondary information to business addresses
47548280374Policy management in a roaming or handover scenario in an IP network
47558280349Communication system, storage medium having communication program stored thereon, and communication terminal
47568280103System reactions to the detection of embedded watermarks in a digital host content
47578280098Digital watermarking CMOS sensor
47588280059Method, system and device for generating group key
47598276204Relay device and relay method
47608276202Cloud-based gateway security scanning
47618276200Systems and methods for securely processing sensitive streams in a mixed infrastructure
47628276196Systems and methods for implementing device-specific passwords
47638276195Management of split audio/video streams
47648276194Methods and systems for user authentication
47658275998Encryption device, key distribution device and key distribution system
47668275991On-line membership verification
47678275990Method for receiving/sending multimedia messages
47688272052Method and system for filing and monitoring electronic claim submissions in multi-claimant lawsuits
47698272045System and method for secure remote desktop access
47708272038Method and apparatus for secure authorization
47718272032Multiple user login detection and response system
47728272031Policy-based virtualization method involving adaptive enforcement
47738271795Security based on subliminal and supraliminal channels for data objects
47748271793Dynamic multimedia fingerprinting system
47758271792Image processing apparatus, authentication package installation method, and computer-readable recording medium
47768271790Method and system for securely identifying computer storage devices
47778271789System and method for managing usage authorizations based on the use of smart cards
47788271788Software registration system
47798271784Communication between key manager and storage subsystem kernel via management console
47808271781System and method for authentication of a hardware token
47818271642System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input
47828270948Solving PANA bootstrapping timing problem
47838270605Location authentication
47848270598Highly secured method and device for distributing audio-visual streams
47858266687Discovery of the use of anonymizing proxies by analysis of HTTP cookies
47868266439Integrity verification of pseudonymized documents
47878266437Electronic vouchers and a system and method for issuing the same
47888266436Service providing system, service providing server and information terminal device
47898266435Method for generating an asymmetric cryptographic key pair and its application
47908266434System and method for providing an user's security when setting-up a connection over insecure networks
47918266421Private electronic information exchange
47928266327Identity brokering in a network element
47938264320Aftermarket keyless starter
47948261351DNS flood protection platform for a network
47958261336System and method for making accessible a set of services to users
47968261334System for performing web authentication of a user by proxy
47978261331Security management for an integrated console for applications associated with multiple user registries
47988261329Trust and identity in secure calendar sharing collaboration
47998261326Network intrusion blocking security overlay
48008261084Unauthorized contents detection system
48018261082Self-signing electronic documents
48028261078Access to services in a telecommunications network
48038261077System and method for performing authentication in a wireless mobile communication system
48048261076Method and device for agreeing shared key between first communication device and second communication device
48058261075Method for secure remote backup
48068261070Authentication of untrusted gateway without disclosure of private information
48078259950Method for secure key management using multi-threshold secret sharing
48088256011Media package, system comprising a media package and method of executing program code
48098256004Control transparency framework
48108255984Single sign-on system for shared resource environments
48118255703Atomic hash instruction
48128255695User-defined passwords having associated unique version data to assist user recall of the password
48138255694System and method using information based indicia for securing and authenticating transactions
48148255691Apparatus for batch verification and method using the same
48158255690Apparatus and method for group session key and establishment using a certified migration key
48168255688Systems and methods for mutual authentication using one time codes
48178255684Method and system for encryption of messages in land mobile radio systems
48188254578Process of manufacturing a handheld device, involving keys
48198253983Stamping system and method using a portable communication device
48208253957Printing data generating apparatus, method, and program for reissuing restriction ticket according to term of validity and term of reissue
48218253528Trainable transceiver system
48228251283Token authentication using spatial characteristics
48238250665Digital Broadcasting system and method of processing data in digital broadcasting system
48248250646Method, system, and device for filtering packets
48258250633Techniques for flexible resource authentication
48268250627Transaction authorization
48278250361Server certificate issuing system and person authentication method
48288250288Flash memory storage system and controller and data protection method thereof
48298249350Brand protection and product autentication using portable devices
48308245307Providing secure access to a secret
48318245295Apparatus and method for detection of malicious program using program behavior
48328245283Region access authorization in a virtual environment
48338245277Universally usable human-interaction proof
48348245048Authentication method, system, server, and client
48358245046Interconnect device to enable compliance with rights management restrictions
48368245044Payment transaction processing using out of band authentication
48378245042Shielding a sensitive file
48388245040Secret authentication system
48398245039Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization
48408245033Imparting real-time priority-based network communications in an encrypted communication session
48418245032Method to authenticate packet payloads
48428245031Content control method using certificate revocation lists
48438245029System and method for enhanced network entrance into a wireless network
48448244920Smart card set protocol optimization
48458244798Techniques for sharing content between portals
48468244404Modular and expandable irrigation controller
48478243985Bit pattern design for visible watermarking
48488243981Identifying embedded data in an image
48498243933Method for sharing secret information among cooperating parties
48508243927Digital video receiver, ECM extract equipment, EMM extract equipment, scramble key extract equipment, CCI extract equipment, digital video receiving system, ECM extract method, EMM extract method, scramble key extract method, CCI extract method, digital video receiving method, and recording medium
48518243703Communication system, management apparatus, control method therefor, storage medium, registration apparatus and base station
48528243338Providing privacy for electronic voting using encryption
48538239958Confirmation method of software and apparatus for executing software
48548239929Multiple tiered network security system, method and apparatus using dynamic user policy assignment
48558239920Authentication system and method
48568239683Method for producing acknowledged transaction data and corresponding device
48578239682Method and system for digital rights management of documents
48588239680Secret communication method and secret communication device thereof
48598239677Verification and authentication systems and methods
48608239556Policy-based cross-domain access control for SSL VPN
48618239331Auction verification
48628238944Disaster and emergency mode for mobile radio phones
48638238551Generation of perfectly secret keys in wireless communication networks
48648237542Key system
48658234715Activating streaming video in a blu-ray disc player
48668234713Enforcing alignment of approved changes and deployed changes in the software change life-cycle
48678234703Network firewall host application identification and authentication
48688234700System and method for authentication
48698234690Solicited authentication of a specific user
48708234503Method and systems for computer security
48718234502Automated password authentication
48728234492Method, client and system for reversed access to management server using one-time password
48738233197Pantograph methods, apparatus and systems based on UCR/GCR
48748230487Method and system for controlling access to a secondary system
48758230478Flexibly assigning security configurations to applications
48768230223Approach for managing access to messages using encryption key management policies
48778230218Mobile station authentication in tetra networks
48788230215Method for allocating multiple authentication certificates to vehicles in a vehicle-to-vehicle communication network
48798229857Secure pre-recorded digital medium
48808229742Transcription data security
48818229088Time authentication system, terminal device, time authentication method for conversation voice data for use therein, and program thereof
48828225401Methods and systems for detecting man-in-the-browser attacks
48838225391System and method for improving restrictiveness on accessing software applications
48848225384Authentication system for enhancing network security
48858225379System and method for securing networks
48868225103Controlling access to a protected network
48878225098Direct anonymous attestation using bilinear maps
48888225096System, apparatus, method, and program product for authenticating communication partner using electronic certificate containing personal information
48898225095Password-authenticated asymmetric key exchange
48908225093Providing secure inter-application communication for a mobile operating environment
48918225090Method and apparatus for inserting authentication code, and method and apparatus for using data through authentication
48928225089Electronic transaction systems utilizing a PEAD and a private key
48938224887System, method and computer program product for authenticating a client
48948224758Systems and methods for managing the transportation of dangerous materials
48958224017Method for identifying marked content
48968223968Image data verification program recorded on a recording medium, image data verification method, and image data verification system
48978223354Printing apparatus capable of performing confidential printing and printing method for use therein
48988222994Techniques to provide automatic reminders
48998220039Mass storage device with automated credentials loading
49008220030System and method for security in global computer transactions that enable reverse-authentication of a server by a client
49018219830Apparatus and method for management for file aggregates and file directories
49028219820Power analysis countermeasure for the ECMQV key agreement algorithm
49038219816IVR call routing using encrypted data
49048219815Information management system
49058219814System and method of user credential management
49068219812Methods and a device for associating a first device with a second device
49078219810Method and system for facilitating throttling of interpolation-based authentication
49088219809Method of optimizing data communication
49098219808Session-based public key infrastructure
49108218771Information processing apparatus and computer readable medium
49118218762Encrypting apparatus for common key cipher
49128218761Method and apparatus for generating random data-encryption keys
49138217753Electronics antitheft authorizing unit
49148214902Determination by circuitry of presence of authorized and/or malicious data
49158214876System and method for statistical analysis of border gateway protocol (BGP) configurations
49168214652Biometric identification network security
49178214651Radio frequency identification (RFID) based authentication system and methodology
49188214650Context sensitive dynamic authentication in a cryptographic system
49198214648Secure configuration of a computing device
49208214646Bundle verification
49218214644Method for installing rights object for content in memory card
49228214643Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
49238214642System and method for distribution of credentials
49248214637Public key certificate issuing system, public key certificate issuing method, digital certification apparatus, and program storage medium
49258214630Method and apparatus for controlling enablement of JTAG interface
49268214446Segmenting access to electronic message boards
49278213673Watermarking of motion pictures
49288213618Protecting content on client platforms
49298213614Distribution and printing of travel documents
49308209743CAPTCHA image scramble
49318209546Data-securing method of program tool
49328209544Trusted storage systems and methods
49338209543Watermarking of a processing module
49348209540Incremental secure backup and restore of user settings and data
49358209539Method for time-stamped watermarking, method and device for time stamp decoding use
49368209538Email policy manager
49378209537Secure information distribution between nodes (network devices)
49388208632Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
49398208471Apparatus and method for releasing local data contents for IP-based data access, associated communication system, digital storage medium, computer program product and computer program
49408205263Systems and methods for identifying an executable file obfuscated by an unknown obfuscator program
49418205248Local verification of trusted display based on remote server verification
49428205244Systems and methods for generating, managing, and displaying alarms for wireless network monitoring
49438205089System for controlling the distribution and use of rendered digital works through watermarking
49448205088Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine
49458205085Key update system, key management device, communication terminal, and key information construction method for multihop network
49468205084System and method for processing encoded messages for exchange with a mobile data communication device
49478205082Domain upgrade method in digital rights management
49488205081Systems and methods for verifying the authenticity of a remote device
49498205079Encryption/decryption system and method thereof
49508204992Presence detection using distributed indexes in peer-to-peer networks
49518203426Feed protocol used to report status and event information in physical access control system
49528201217Systems and methods for single sign-in for multiple accounts
49538201214Ad-hoc user account creation
49548200985Method and system for protecting data
49558200975Digital signatures for network forms
49568200972Encryption of security-sensitive data by re-using a connection
49578200969Data verification by challenge
49588200968Method and apparatus for communicating between a requestor and a user receiving device using a user device locating module
49598196205Detection of spyware threats within virtual machine
49608196194Method and network for securely delivering streaming data
49618195946Protection of data of a memory associated with a microprocessor
49628195944Automated method for securely establishing simple network management protocol version 3 (SNMPv3) authentication and privacy keys
49638195943Signaling with opaque UE identities
49648195941Authentication method for IC cards
49658195940Key updates in a mobile wireless system
49668195939Systems and methods for protecting sensitive data
49678195570Generation of receipts for check point of sale device
49688194858Chaotic cipher system and method for secure communication
49698191165Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity
49708191161Wireless authentication
49718191128Systems and methods for controlling access to a public data network from a visited access provider
49728190903Method and apparatus for verifying authenticity of digital data using trusted computing
49738190901Layered security in digital watermarking
49748190900Secure telemetric link
49758190898Portable electronic entity and communication method
49768190897Method and system for secure exchange of data in a network
49778190893Portable security transaction protocol
49788190892Message authentication code with blind factorization and randomization
49798189859Apparatus for inserting watermark and method therefor
49808189853Watermarked image generation apparatus, watermarked image analysis apparatus, watermarked image generation method, medium and computer readable medium
49818189790Developing initial and subsequent keyID information from a unique mediaID value
49828188837Method of finding a key to a mobile vehicle
49838185947System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network
49848185937Systems and methods for universal password control
49858185934Programmable data protection device, secure programming manager system and process for controlling access to an interconnect network for an integrated circuit
49868185749System and method for revising boolean and arithmetic operations
49878185746Method for generating data for detection of tampering, and method and apparatus for detection of tampering
49888185745Detection of frequent and dispersed invariants
49898185744Aggregate signature schemes
49908185743Systems and methods for application locking using an internal and external checksum
49918185741Converting transport level transactional security into a persistent document signature
49928185740Consumer computer health validation
49938185739Method and system for detecting successful authentication of multiple ports in a time-based roving architecture
49948185737Communication across domains
49958185733Method and apparatus for automatically publishing content based identifiers
49968185642Communication policy enforcement in a data network
49978185592Method and program product for preventing distribution of an e-mail message
49988184326Information dissemination multifunction device
49998181264Method and apparatus for deferred security analysis
50008181254Setting default security features for use with web applications and extensions
50018181248System and method of detecting anomaly malicious code by using process behavior prediction technique
50028181245Proxy-based malware scan
50038181238Systems and/or methods for streaming reverse HTTP gateway, and network including the same
50048181234Authentication system in client/server system and authentication method thereof
50058181034Secure data utilization
50068181027Compressed data scrambled distribution device and playback device thereof
50078181026Method and apparatus for input of coded image data
50088181025Method and apparatus for registering agents onto a virtual machine monitor
50098181024Data processing apparatus
50108181023Information processing device and information processing system
50118181019Systems and methods for managing CRLS for a multi-core system
50128181015System and method for establishing historical usage-based hardware trust
50138181006Method and device for securely configuring a terminal by means of a startup external data storage device
50148180060Telemedical system
50158180049Signature schemes using bilinear mappings
50168179227Employing external storage devices as media for access control panel control information
50178176544Network security system having a device profiler communicatively coupled to a traffic monitor
50188176542Validating the origin of web content
50198176540Resource based non-interactive entity application proxy method and system
50208176538Information processing system, recording medium storing control program, and computer data signal embodied in a carrier wave
50218176330Method, apparatus and article for off-line certification in mobile applications
50228176328Authentication of access points in wireless local area networks
50238176327Authentication protocol
50248176326Method of communications and communication network intrusion protection methods and intrusion attempt detection system
50258176324Method and system for a secure virtual keyboard
50268176106On-chip estimation of key-extraction parameters for physical tokens
50278175330Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
50288175322Method of digital watermark and the corresponding device, and digital camera which can append watermark
50298175037Method for updating a routing entry
50308171562System and methods for protecting against denial of service attacks
50318171549Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data, files and their transfer
50328171533Managing web single sign-on applications
50338171525Enabling users to select between secure service providers using a central trusted service manager
50348171456Method for auditing compliance of an electronic platform and/or a computer program present on said platform, and device and computer program corresponding thereto
50358171304Method, system and computer program product for multiple biometric template screening
50368171297System and method using information based indicia for securing and authenticating transactions
50378171293Receiver non-repudiation via a secure device
50388171292Systems, devices, and methods for securely transmitting a security parameter to a computing device
50398171288System and method for authenticating users in a computer network
50408171287Access control system for information services based on a hardware and software signature of a requesting device
50418171085Methods and apparatuses for authenticating electronic messages
50428170275Determining document authenticity in a closed-loop process
50438170206Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
50448169298Electric hand tool device and battery pack therefor
50458166565Encryption and access method and system for peer-to-peer distributed file storage
50468166532Decentralized access control framework
50478166308System and method for authenticating a gaming device
50488166306Semantic digital signatures
50498166305Set of metadata for association with a composite media item and tool for creating such set of metadata
50508166302Storage device with traceable watermarked content
50518166297Systems and methods for controlling access to encrypted data stored on a mobile device
50528166296User authentication system
50538165300System and method for generalized authentication
50548165294Rollback attack prevention system and method
50558164419Electronic lock box with time-related data encryption based on user-selected pin
50568161545Keyboard with programmable username and password keys and system
50578161531System and method for managing electronic communications
50588161284System, method and computer readable medium for message authentication to subscribers of an internet service provider
50598161283Method and device for establishing a secure route in a wireless network
50608161282System and method for requesting and issuing an authorization document
50618161278System and method for distributing keys in a wireless network
50628156548Identification and authentication system and method
50638156547Methods and systems for device-independent portable session synchronization
50648156545Method and apparatus for authorizing a communication interface
50658156540System and method for managing feature enablement in an information handling system
50668156537Method and system for access control using resource filters
50678156341Pattern recognition method and apparatus for data protection
50688156337Systems and methods for authenticating communications in a network medium
50698156332Peer-to-peer security authentication protocol
50708156330Terminal for exchanging electronic business cards
50718156329Network device management apparatus and control method thereof
50728156322Critical security parameter generation and exchange system and method for smart-card memory modules
50738155623System and method for obtaining information from a wireless modem
50748151349Masking mechanism that facilitates safely executing untrusted native code
50758151344Method and apparatus to authenticate a user
50768151332Digital identity management
50778151330System and method of using personal data
50788151317Method and system for policy-based initiation of federation management
50798151119Method and apparatus for secure data mirroring a storage system
50808151114Dynamic enabling of functionality in electronic document readers
50818150096Video fingerprinting to identify video content
50828150041Secure computation of private values
50838146156Archive of text captures from rendered documents
50848146139System and method of user authentication using handwritten signatures for an MFP
50858146134Scalable firewall policy management platform
50868145911System and method for the electronic management and execution of transaction documents
50878145910System and method to enforce collaboration rules for timestamps of a collaboration event
50888145909Digitally signing an electronic document using seed data
50898145908Web content defacement protection system
50908145897Direct anonymous attestation scheme with outsourcing capability
50918145707Sending digitally signed emails via a web-based email system
50928144870Encoding and detecting apparatus
50938144864Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems
50948141140Methods and systems for single sign on with dynamic authentication levels
50958141139Federated single sign-on (F-SSO) request processing using a trust chain having a custom module
50968141136Method and system of replacing smart card
50978140852Authenticating serialized commodities
50988140850Systems and methods for watermarking software and other media
50998140847Digital safe
51008140846System for managing program applications storable in a mobile terminal
51018140012Bluetooth security profile
51028136091Architectural support for software-based protection
51038135961Method and computing device for interfacing with a memory device in operations
51048135955Device and method for detecting a manipulation of an information signal
51058135953System and method for providing variable security level in a wireless communication system
51068135949Digital content distribution
51078135166Embedding geo-location information in media
51088135129Protection of a modular exponentiation calculation performed by an integrated circuit
51098134972Communication system and gateway apparatus
51108134729Image transfer system and image forming apparatus
51118132240Electric field unit and method for executing a protected function of an electric field unit
51128132235Method, system, and computer program product for providing e-token based access control for virtual world spaces
51138132228Electronic document conversion device and electronic document conversion method
51148132023Apparatus and method for performing transparent hash functions
51158132022Apparatus and method for employing configurable hash algorithms
51168132015Method and system for loading a secure firmware update on an adapter device of a computer system
51178132011System and method for authenticating at least a portion of an e-mail message
51188132009Authentication system
51198132008Method and apparatus for communicating information between a security panel and a security server
51208132007PANA authentication method and system
51218132006Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE)
51228131997Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel
51238131996Distributed management of a certificate revocation list
51248131644Formular update
51258130962Content protection method and apparatus
51268130771Packet-forwarding for proxy mobile IP
51278127340Communication apparatus
51288127151Hardware-based key generation and recovery
51298127150Data security
51308127140Group signature scheme
51318127139Handheld devices and methods for extracting data
51328127138Method for embedding information in sonar
51338127137Watermark payload encryption for media including multiple watermarks
51348127136Method for security association negotiation with extensible authentication protocol in wireless portable internet system
51358127124Remote configuration of computing platforms
51368125311Medical diagnostic imaging system, information processing method for medical diagnostic imaging system, ultrasonic imaging diagnostic apparatus, and operation device
51378122511Attribute information providing method
51388122487Method and apparatus for checking proximity between devices using hash chain
51398122485Authentication techniques
51408122255Methods and systems for digital authentication using digitally signed images
51418122252Cascaded digital signatures
51428122172Portable information security device
51438121343Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
51448121288Encrypting and decrypting a data stream
51458117666File system operation and digital rights management (DRM)
51468117645Systems and methods of controlling network access
51478117462Delivery point validation system
51488117457Trusted hardcopy document
51498117454Fast update message authentication with key derivation in mobile IP systems
51508117451Device controller, method for controlling a device, and program therefor
51518117450System and method for secure data transmission
51528117449Method to detect man-in-the-middle (MITM) or relay attacks
51538117448Information processing apparatus, information processing method, and program
51548117446Method and system for secured real time protocol in scalable distributed conference applications
51558117445Near field communication, security and non-volatile memory integrated sub-system for embedded portable applications
51568117444Host computer, mobile communication device, program, and recording medium
51578117442Data processor
51588117440Methods and apparatus for enabling unified (internet protocol version) IPV6/IPV4 routing services over IPv4-only interfaces
51598117325Policy-based cross-domain access control for SSL VPN
51608116514Water mark embedding and extraction
51618116457Methods, apparatuses, and products for a secure circuit
51628116454Method and apparatus for providing security in a radio frequency identification system
51638112801Method and apparatus for detecting malware
51648112790Methods and apparatus for authenticating a remote service to another service on behalf of a user
51658112788Systems and methods of controlling network access
51668112787System and method for securing a credential via user and server verification
51678112786Security policy generation
51688112632Security devices, systems and computer program products
51698112630Device, system, and method for reporting execution flow of program
51708112627System for self-service recharging and method for the same
51718112624Method and system for certificate revocation list compression
51728111413Approach for securely printing policy-enabled electronic documents based on print driver and printing device support
51738108939Method and apparatus to facilitate security-enabled content caching
51748108909Systems and methods of controlling network access
51758108907Authentication of user database access
51768108688Information processing apparatus, method, and program
51778108685Apparatus and method for indicating password quality and variety
51788108682Hash value generator
51798108681Selecting bit positions for storing a digital watermark
51808108680Preventing unauthorized poaching of set top box assets
51818108679Firewall system
51828108678Identity-based signcryption system
51838108677Method and apparatus for authentication of session packets for resource and admission control functions (RACF)
51848108676Link key injection mechanism for personal area networks
51858108675External signature device for a PC with wireless communication capacity
51868108674Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith
51878108673Configuring interfaces of a switch using templates
51888108672Transparent authentication process integration
51898108671Method and system for controlling presentation of computer readable media on a media storage device
51908108669Image forming apparatus for generating electronic signature
51918107627Temporal proximity to verify physical proximity
51928107626Method and system for enabling transfer of content between a storage device and a portable media player device
51938107622System and method to preclude message modification in data authentication systems through efficent use of feedback in cryptographic functions
51948104088Trusted operating environment for malware detection
51958104084Authorizing a user to a device
51968104073Exchange of network access control information using tightly-constrained network access control protocols
51978103883Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
51988103880Method for communication between computing devices using coded values
51998103879Processing audio or video content with multiple watermark layers
52008103878Control device, update method and control software
52018103877Content identification and electronic tickets, coupons and credits
52028103876System and method for checking digital certificate status
52038103875Detecting email fraud through fingerprinting
52048103874Object delivery authentication
52058103873Method and system for processing auditory communications
52068103872Contact-less tag with signature, and applications thereof
52078103501System and method for generation and authentication of a signed document using voice analysis
52088103069Registration apparatus, verification apparatus, registration method, verification method and program
52098103052Method of embedding informaton into image
52108099772Information terminal apparatus, information processing apparatus and information communication system
52118099767Secure agent-less enterprise infrastructure discovery
52128099764Secure push and status communication between client and server
52138099761Protocol for device to station association
52148099759System and method for determining a security encoding to be applied to outgoing messages
52158099604Communication system, method for transferring information, and information-communication device
52168099602Methods for integrating security in network communications and systems thereof
52178099599Controlling access to data streams
52188099598Secure messaging system with automatic recipient enrollment
52198099594Certificate processing
52208099593System and method for retrieving related certificates
52218098828Key distribution
52228098131Mobile terminal with a short-range communication unit
52238095987Software anti-piracy protection
52248095804Storing deleted data in a file system snapshot
52258095799Ticket authorized secure installation and boot
52268095798Systems and methods for media authentication
52278095797Systems and methods for authenticating an electronic message
52288095795Methods and apparatus for robust embedded data
52298095794System and method of watermarking a signal
52308095793Digital rights management apparatus and method
52318095792One way authentication
52328095660Method to enhance principal referencing in identity-based scenarios
52338095107Voice messaging prioritization
52348094872Three-dimensional wavelet based video fingerprinting
52358094869Fragile and emerging digital watermarks
52368094820Information recording/reproducing device
52378091138Method and apparatus for controlling the presentation of confidential content
52388091120Adaptive authentication methods, systems, devices, and computer program products
52398091116Communication system and method
52408090954Prevention of unauthorized forwarding and authentication of signatures
52418090953Information storage system
52428090952Counterfeit prevention system based on random positioning on a pattern
52438090951Systems and methods for transparent configuration authentication of networked devices
52448090950System and method for authenticating documents
52458090949Certificate assignment strategies for efficient operation of the PKI-based security architecture in a vehicular network
52468090948Image formation system having authentication function
52478090946Inter-system binding method and application based on hardware security unit
52488090945Systems and methods for multi-factor remote user authentication
52498090944Method and apparatus for authenticating users of an emergency communication network
52508090787Aggregation system for email and non-email messages
52518090663Automated banking machine system and method
52528090146Image watermarking

2011

52538087075Disconnected credential validation using pre-fetched service tickets
52548087074One time password
52558087072Provisioning of digital identity representations
52568087070Predictive method for multi-party strengthening of authentication credentials with non-real time synchronization
52578087065Method and system for implementing mandatory file access control in native discretionary access control environments
52588087064Security extensions using at least a portion of layer 2 information or bits in the place of layer 2 information
52598087062Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium
52608086867Secure identity and privilege system
52618086864Low power HMAC encryption apparatus
52628086863Method and a system for protecting path and data of a mobile agent within a network system
52638086862Program data file storage method in broadcast receiver and broadcast receiver
52648086861Information processing terminal and status notification method
52658086860Method for preventing and detecting hash collisions of data during the data transmission
52668086859Generation of electronic signatures
52678086858Secure method of termination of service notification
52688086857Identity-based-encryption messaging system
52698086855Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks
52708086854Content protection information using family of quadratic multivariate polynomial maps
52718086853Automatic centralized authentication challenge response generation
52728086839Authentication for resume boot path
52738085975Methods and apparatus for embedding watermarks
52748082591Authentication gateway apparatus for accessing ubiquitous service and method thereof
52758082580Session layer pinhole management within a network security device
52768082576Network-agnostic content management
52778082448System and method for user authentication using non-language words
52788082447Systems and methods for end-to-end resource reservation authentication
52798082446System and method for non-repudiation within a public key infrastructure
52808082445Secure NFC apparatus and method for supporting various security modules
52818082444System and method for adding new network devices to an existing network
52828082443Pedigrees for quantum cryptography
52838081754Key update method and apparatus thereof
52848079118Method for vehicle internetworks
52858079091Compliance processing of rights managed data
52868079086Malicious mobile code runtime monitoring system and methods
52878078891Method, device, and system for guaranteed minimum processor power state dwell time
52888078879Data certification method and apparatus
52898078878Securing documents with electronic signatures
52908078876Apparatus and method for direct anonymous attestation from bilinear maps
52918078875Verification of authenticity
52928078873Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
52938078871Apparatus and system for remotely verifying integrity of memory for mobile platform, and method therefor
52948078870HTTP-based authentication
52958078689Methods and apparatus for providing access to persistent application sessions
52968077910Digital watermark embedding and detection
52978077907System and method for the generation of correlation-based digital watermarks
52988077866Protecting against security attack
52998074284Device provided with rewritable circuit, updating system, updating method, updating program and integrated circuit
53008074269System and method for controlling devices at a location
53018074264Secure key distribution to internet clients
53028074258Obtaining digital identities or tokens through independent endpoint resolution
53038074080System and method for generating and utilizing organically grown content in a directory assistance environment
53048074074Compressed data scrambled distribution device and playback device thereof
53058074072Challenge response-based device authentication system and method
53068074070Method for fast, secure 802.11 re-association without additional authentication, accounting, and authorization infrastructure
53078073139Method of compressing a cryptographic value
53088069469Addressing security in asymmetrical networks
53098069467Privacy protection through restrictions on usernames and other online identifiers
53108069353Low-latency data decryption interface
53118069352Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
53128069351Remote control device
53138069350Communication protocol and electronic communication system, in particular authentication control system, as well as corresponding method
53148068812Method and mobile communication system with a security function for short messaging
53158068811Mobile communication terminal device
53168068614Methods and apparatus for batch bound authentication
53178065731System and method for malware containment in communication networks
53188065729Method and apparatus for generating network attack signature
53198065724Computer method and apparatus for authenticating unattended machines
53208065715Authenticating a user of a wireless data processing device
53218065533Reliable storage medium access control method and device
53228065527System and method for embedding a written signature into a secure electronic document
53238065525Device with built-in user authentication and method for user authentication and identity theft protection
53248065524Authentication processing apparatus and authentication processing method
53258064602Method and application for authentication of a wireless communication using an expiration marker
53268064468Method for providing function of registering in session initiation protocol and SIP load balancer of enabling the method
53278061589Electronic voting system
53288060941Method and system to authenticate an application in a computing platform operating in trusted computing group (TCG) domain
53298060939Method and system for securing wireless local area networks
53308060938Proprietary portable audio player system for protecting digital content copyrights
53318060924On-line centralized and local authorization of executable files
53328060918Method and system for verifying identity
53338060917System and method for hosting multiple kerberos service principal names
53348060914Anonymous selectable credential system and method therefor
53358060755Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
53368060754Cryptographic processing device and method for adapting to shared-cache attacks
53378060749Authenticated program execution method
53388060748Secure end-of-life handling of electronic devices
53398060747Digital signatures for embedded code
53408060746E-mail transfer method and device
53418060745Security for wireless transmission
53428060735Portable device and method for externally generalized starting up of a computer system
53438060596Methods and systems for normalizing data loss prevention categorization information
53448059860Steganographic encoding
53458059817Method and apparatus for encrypted communications using IPsec keys
53468059816Secret sharing technique with low overhead information content
53478056132Client-side technique for detecting software robots
53488056131Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data and files and their transfer
53498056129Validating active computer terminal sessions
53508056121Virtual universe account protection
53518056117Network and domain-creating method thereof
53528055913Systems and methods for secure transaction management and electronic rights protection
53538055911Method for backing up and restoring an encryption key
53548055901Optical signature to enable image correction
53558055898Tag authentication system
53568055894Process and streaming server for encrypting a data stream with bandwidth based variation
53578055708Multimedia spaces
53588055587Man in the middle computer technique
53598054971Free-hand mobile messaging-method and device
53608054968Method and apparatus for providing prepaid music card for deciphering recorded broadcast audio signals
53618051488Trial usage for encrypted subscription-based data
53628051461System and method for establishing secured connection between home network devices
53638051460Systems and methods of controlling network access
53648051300System and method for reducing latency on remotely-booted information handling systems
53658051295Benchmarks for digital watermarking
53668051293Data processing systems and methods
53678051291Unique block header patterns for media verification
53688051290Increasing integrity of watermarks using robust features
53698051289Electronic document management and delivery
53708051285Battery processor circuitry with separate public and private bus
53718051283Message security processing system and method for web services
53728050566System and methods for quantum key distribution over WDM links
53738050410Distributed encryption methods and systems
53748046834Method of polymorphic detection
53758046827Access control of interaction context of application
53768046589Renewable and private biometrics
53778046586Method and system for determining the compliance of encrypted and non-encrypted display outputs
53788046585Verifying authenticity of an attribute value signature
53798046584Message authentication device
53808046583Wireless terminal
53818046580Data processing apparatus and method for generation of protection compression encoded data
53828046571System-on-a-chip (SoC) security using one-time programmable memories
53838045709Digital broadcasting conditional access terminal and method
53848045705Simultaneous scalar multiplication method
53858045530Method and apparatus for authentication in a wireless telecommunications system
53868042190Pre-boot protected memory channel
53878042162Method and system for native authentication protocols in a heterogeneous federated environment
53888042159Website log in system with user friendly combination lock
53898041960Secure creation and management of device ownership keys
53908041953Identity-based-encryption message management system
53918041952Systems and methods for printing documents containing electronic signatures
53928041951Code-based communication connection management
53938041949Information processing scheme for realizing contents transfer and copyright protection
53948041939Addressing and routing mechanism for web server clusters
53958041073Decoding watermark information items of a watermarked audio or video signal using correlation
53968037542Team based row level security system and method
53978037514Method and apparatus for securely disseminating security server contact information in a network
53988037513Image processing system including plurality of image processing apparatuses used by plurality of users, image processing apparatus included in the image processing system
53998037491Data transmitting method, data transmitting system, data receiving method and receiving terminal
54008037314Replacing blinded authentication authority
54018037312Method and apparatus for digital signature authentication, and computer product
54028037311Digital watermark systems and methods
54038037310Document authentication combining digital signature verification and visual comparison
54048037309Portable data storage device with encryption system
54058037308Electronic certificate issuance system, electronic certificate issuing device, communication device, and program therefor
54068037307System and method for securing on-line documents using authentication codes
54078037305Securing multiple links and paths in a wireless mesh network including rapid roaming
54088037300Information processing apparatus with certificate invalidity determination
54098037193Virtual token
54108036387Method for the transmission of management data
54118036381Partial multiple encryption
54128036380Efficient data integrity protection
54138036133Efficient techniques for error detection and authentication in wireless networks
54148032942Configuration of virtual trusted platform module
54158032756Information processing system
54168032755Request linked digital watermarking
54178032754Systems and methods for embedding media forensic identification markings
54188032753Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same
54198032752Data transmission apparatus, data reception apparatus, and data transfer system
54208032751E-mail certification service
54218032746Tamper-resistant communication layer for attack mitigation and reliable intrusion detection
54228031866Cryptographic processing apparatus and cryptographic processing method, and computer program
54238031055Tag authentication method using rotation, and tag and reader performing the method
54248028333Method and system for the authentication of a public key certificate
54258028330System, apparatus, and program for biometric authentication
54268028172Systems and methods for updating a secure boot process on a computer with a hardware security module
54278028171Signature apparatus, verifying apparatus, proving apparatus, encrypting apparatus, and decrypting apparatus
54288028170Method of authenticating print media using a mobile telephone
54298028169Electronic document management program, electronic document management system and electronic document management method
54308028167Method and apparatus for certificate roll-over
54318028166Versatile secure and non-secure messaging
54328028161System for negotiating security association on application layer
54338027506Geographical encoding imagery and video
54348027472Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
54358027468Method and system for camera sensor fingerprinting
54368024783Modular agent architecture
54378024782Cumulative login credit
54388024776Relay device, authentication server, and authentication method
54398024770Techniques for managing security contexts
54408024724Firmware download
54418024578Systems and methods for online identity verification
54428024575System and method for creation and use of strong passwords
54438024574Unidirectional message masking and validation system and method
54448024572Data storage and removal
54458024570Method and system for communication via a computer network
54468024569Method for secure remote backup
54478024568Method and system for verification of an endpoint security scan
54488024567Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof
54498024559Security authentication system and method
54508024558Method and system for providing synchronous running encoding and encryption
54518024484Caching signatures
54528023693System and method for solving the "birthday problem" with watermarking
54538023652Apparatus and method for implementing digital rights management systems in low-efficiency storage device
54548023478System and method for securing mesh access points in a wireless mesh network, including rapid roaming
54558020211Network security system having a device profiler communicatively coupled to a traffic monitor
54568020204Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance
54578020197Explicit delegation with strong authentication
54588020196Secure transmission and exchange of standardized data
54598020008Microprocessor identity device
54608020004Forensic marking using a common customization function
54618020003Creation of electronically processable signature files
54628020002Method of authenticating print medium using printing mobile device
54638019999Wireless receiver device revocation management
54648019997Information processing apparatus and method, recording medium, and program
54658019996Method for encrypted communication with a computer system and system therefor
54668019995Method and apparatus for preventing internet phishing attacks
54678019994Authentication of a request to alter at least one of a BIOS and a setting associated with the BIOS
54688019333Apparatus and methods for product acceptance testing on a wireless device
54698015615Determining advertising activity
54708015600Employing electronic certificate workflows
54718015597Disseminating additional data used for controlling access
54728015417Remote access system, gateway, client device, program, and storage medium
54738015412Authentication of an object
54748015411Active watermarks and watermark agents
54758015409Authentication for licensing in an embedded system
54768015408Trust evaluation for a mobile software agent on a trusted computing platform
54778015407Pre-control of a program in an additional chip card of a terminal
54788015405Proving apparatus and verification apparatus applied to deniable zero-knowledge interactive proof
54798015404System and method for collecting traffic data using probe vehicles
54808015400Certificate management and transfer system and method
54818014527Apparatus and method for reusing pair of public and private keys
54828014524Scaling independent technique for watermarking images with recorder shut-off
54838012015Verifying whether a gaming device is communicating with a gaming server
54848011002Forcing a mobile browser to access web content through a proxy
54858011001Method for managing security in a mobile communication system using proxy mobile internet protocol and system thereof
54868010999Cable installation support and management system
54878010998Techniques for limiting remote control of a computer system
54888010805Secure porting of information from one device to another
54898010804Method to protect secrets against encrypted section attack
54908010800Search engine and digital rights management
54918010796System and method for digitally signing an electronic document
54928010795Secure information transfer using dedicated public key pairs
54938010792Content transmission apparatus, content reception apparatus and content transmission method
54948010782Method and system for mediated secure computation
54958010688Content use management system, content use management method, and client device
54968009831Method and system for hiding the decryption key in a dispersive way
54978009829Method and system for deploying advanced cryptographic algorithms
54988006314System for identifying content of digital data
54998006309Information processing device and communication method
55008006307Method and apparatus for distributing secure digital content that can be indexed by third party search engines
55018006301Method and systems for computer security
55028006291Multi-channel multi-factor authentication
55038006283Method and system for triggering internet applications using messages
55048006103TPM device for multi-processor systems
55058006101Radio transceiver or other encryption device having secure tamper-detection module
55068006100Enhancing trusted platform module performance
55078006095Configurable signature for authenticating data or program code
55088006094Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes
55098006093Instant messaging private tags
55108006092Digital watermarks for checking authenticity of printed objects
55118006089Multiple PANA sessions
55128005904Electronic business card exchange system and method
55138005258Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
55148001593Authentication method and unit, and electronic apparatus having authentication unit
55158001588Secure single sign-on authentication between WSRP consumers and producers
55168001584Method for secure device discovery and introduction
55178001388Software self-checking systems and methods
55188001383Secure serial number
55198001382System for and method of monitoring an item
55208001380System and method for providing unique encryption key
55218001379Credential generation system and method for communications devices and device management servers
55228001378Method and system for protecting data of a mobile agent within a network system
55238001376Fixed client identification system for positive identification of client to server
55248000704Fast network attachment
55258000680Security management method and apparatus in multimedia middleware, and storage medium therefor
55268000478Key handshaking method and system for wireless local area networks
55277999685Deterministic key pre-distribution and operational key management for moblie body sensor networks
55287996910Techniques for detecting and preventing unintentional disclosures of sensitive data
55297996885Password application
55307996861Flexible interface for secure input of pin code
55317996686Branch trace methodology
55327996681Methods for implementing color change frequency as image signature
55337996680Secure data log management
55347996677Digitally certified stationery
55357996674LDAP user authentication
55367996672Support for multiple digital rights management systems for same content
55377996569Method and system for zero copy in a virtualized network environment
55387995760Method for ensuring data transmission security, communication system and communication device
55397992216Message service indication system and method
55407992215Annotation system for creating and retrieving media and methods relating to same
55417992202Apparatus and method for inputting graphical password using wheel interface in embedded system
55427992198Unified authentication for web method platforms
55437992196Apparatus and method for performing hosted and secure identity authentication using biometric voice verification over a digital network medium
55447992195Efficient browser-based identity management providing personal control and anonymity
55457992193Method and apparatus to secure AAA protocol messages
55467992191System and method for controlling a websphere portal without the requirement of having the administrator credential ID and password
55477992177Point-to-multipoint high definition multimedia transmitter and receiver
55487992004Digital watermarked imagery, video, maps and signs
55497992000Session initial protocol identification method
55507991995Method and apparatus for protecting information and privacy
55517991188Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
55527987502Secure streaming container
55537987494Method and apparatus providing end to end protection for a document
55547987375Communication apparatus, control method thereof and computer readable medium
55557987370Digital watermark systems and methods
55567987369Using watermarking to reduce communication overhead
55577987368Peer-to-peer networks with protections
55587987367Method and apparatus for key agreement between devices using polynomial ring
55597987366Key management for network elements
55607987364Method of detecting and authenticating connection target for wireless communication apparatus
55617987363Secure wireless communications system and related method
55627987362Method and apparatus for using imperfections in computing devices for device authentication
55637987359Information communication system, information communication apparatus and method, and computer program
55647987351Method and system for enhanced boot protection
55657984510Terminal device and computer readable medium
55667984507Document access management method and system
55677984486Using GAA to derive and distribute proxy mobile node home agent keys
55687984483System and method for working in a virtualized computing environment through secure access
55697984479Policy-based security certificate filtering
55707984303Flash memory devices with security features
55717984301Bi-processor architecture for secure systems
55727984300System and method of authenicating a digitally captured image
55737984298Method, system and authentication centre for authenticating in end-to-end communications based on a mobile network
55747984297System and method of spam proof e-mail bounce tracking
55757984295Method and apparatus for transmitting message to wireless devices that are classified into groups
55767984286Apparatus and method for secure boot environment
55777983444Client-side watermarking using hybrid I-Frames
55787983440Selection of I-frames for client-side watermarking
55797979910Data reproducing apparatus and transmitter authenticating data reproducing apparatus
55807979897System and article of manufacture for bidirectional data transfer
55817979894Electronic verification service systems and methods
55827979731Time authentication device, time authentication method, computer program, recording medium, integrated circuit, and time authentication system
55837979722Flash memory distribution of digital content
55847979720Data security for digital data storage
55857979711System and method for privacy preserving query verification
55867979710Film fingerprinting
55877979708Digital rights management
55887979707Secure seed generation protocol
55897979706Systems and methods for queuing an action in industrial automation systems
55907979705Conditional suppression of card holder verification
55917979704Authentication system
55927979703Determining the reputation of a sender of communications
55937979693Relay apparatus for encrypting and relaying a frame
55947978875Signal processing utilizing host carrier information
55957978856Methods of managing a key cache
55967975293Authentication system, authentication method and terminal device
55977975290Verifying authenticity of instant messaging messages
55987975287System and method for validating a user of an account using a wireless device
55997975144Systems and methods for server aided processing of a signed receipt
56007975143Method, system, and program product for generating and validating digital signatures
56017975142Ring authentication method for concurrency environment
56027975141Method of sharing bus key and apparatus therefor
56037975139Use and generation of a session key in a secure socket layer connection
56047975138Systems and methods for mutually authenticated transaction coordination messages over insecure connections
56057975137Method and system for securely extending a path of a mobile agent within a network system
56067974603Authentication vector generating device, subscriber authentication module, mobile communication system, and authentication vector generation method
56077974412Communication system, transmission device, reception device, and communication scheme
56087971247Methods and apparatus for prevention of excessive control message traffic in a digital networking system
56097971242Printing system
56107971240Session key security protocol
56117971228System and method for providing application-specific on-line charging in a communications environment
56127971072Secure exchange of IP cores
56137971069Security system for replicated storage devices on computer networks
56147971063Method and device for safeguarding of a document with inserted signature image and biometric data in a computer system
56157971062Token-based encryption key secure conveyance
56167971061E-mail system and method having certified opt-in capabilities
56177971060System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems
56187970165System and method for watermarking data
56197969285Management of badge access to different zones
56207966662Method and system for managing authentication and payment for use of broadcast material
56217966653Method and data processing system for determining user specific usage of a network
56227966652Mashauth: using mashssl for efficient delegated authentication
56237966649System and method for login resistant to compromise
56247966644Method, apparatus, and computer program for managing access to documents
56257966637Hardware module for adding functionality to television
56267966495Conserving file system with backup and validation
56277966493Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database
56287966492System and method for allowing an e-mail message recipient to authenticate the message
56297966491Protection of the distribution of digital documents in a peer to peer network
56307966487Communication-efficient real time credentials for OCSP and distributed OCSP
56317965864Data transmission by extracted or calculated identifying data
56327962964Watermarking and transferring material
56337962963Multimodal resource management system
56347962760Method and apparatus for selectively enabling a microprocessor-based system
56357962753Method and a circuit for SHA operation with power saved
56367962751Method for portability of information between multiple servers
56377962750System for tracking end-user electronic content usage
56387962749Method and system for creating a non-repudiable chat log
56397962748Methods and systems for securing a computer network
56407962747Information processing, apparatus and method, recording medium, and program
56417962742Internet secure terminal for personal computers
56427962737Methods, media and apparatus for booting diskless systems
56437962417System and method for distributing protected information
56447958553Information storage device, security system, access permission method, network access method and security process execution permission method
56457958548Method for provision of access
56467958542Methods and devices for counting user equipment units in a mobile radio telecommunication network
56477958541Method, system and apparatus for preventing media access control address counterfeiting
56487958540Method for conducting real-time execution of transactions in a network
56497958367Authentication system and apparatus
56507958364System and method for digitally signing electronic documents
56517958363Toolbar signature
56527958362User authentication based on asymmetric cryptography utilizing RSA with personalized secret
56537958361Information processing apparatus and method
56547958359Access control systems
56557958358Scanned image disclosure apparatus, method and storage medium; electronic mail transmission apparatus, method and storage medium; and internet facsimile transmission apparatus
56567958356System and method for establishing a shared secret among nodes of a security appliance
56577958355Keytote component
56587958347Methods and apparatus for implementing authentication
56597957552Optimized digital watermarking functions for streaming data
56607954163Method and apparatus for providing network security using role-based access control
56617954146Implicit population of access control lists
56627954136Self-management network access using localized access management
56637953982Method of authenticating digital signature
56647953980Signed manifest for run-time verification of software program identity and integrity
56657953979Systems and methods for enabling trust in a federated collaboration
56667953978Key generation and retrieval using key servers
56677953977Security and ticketing system control and management
56687953975Method of generating anti-collusion fingerprint codes using (n.sup.a,n.sup.2a-2,n.sup.a-1,n,0,1) GD-PBIBD
56697953974Authentication method, authentication system, and tag device thereof, data reference client, authentication server, and data server
56707953973Systems, methods, and computer program products for passively routing secure socket layer (SSL) encoded network traffic
56717953972System and method for managing files
56727953969Reduction of false positive reputations through collection of overrides from customer deployments
56737953391Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method
56747953221Method for processing multiple operations
56757950044Centrally managed proxy-based security for legacy automation systems
56767949881Mobil terminal device, personal identification number verification program, and method of verifying personal identification number
56777949877Rights enforcement and usage reporting on a client device
56787949876Method and nodes for optimized and secure communication between routers and hosts
56797949873Secure instant messaging
56807949870Method and apparatus for downloading information content to a wireless terminal
56817948360Write-protection module and method for storage device
56827945960Dynamic conditional security policy extensions
56837945945System and method for address block enhanced dynamic network policy management
56847945943Retrieving an access token via a coded surface
56857945792Tamper reactive memory device to secure data from tamper attacks
56867945790Low-cost pseudo-random nonce value generation system and method
56877945784Method and system to perform secret sharing
56887945783Customizable instant messaging private tags
56897945780Apparatus for dynamically configurable interleaver scheme using at least one dynamically changeable interleaving parameter
56907945779Securing a communications exchange between computers
56917945778Information processing apparatus, information processing method, information processing system and recording medium
56927945777Identification information protection method in WLAN inter-working
56937945704Smart card set protocol optimization
56947945044Method and system for performing an untraceable secret matching
56957944354System and method for shopping cart security
56967942742Accessing identification information to verify a gaming device is in communications with a server
56977942740Verifying a first device is in communications with a server by storing a value from the first device and accessing the value from a second device
56987942739Storing information from a verification device and accessing the information from a gaming device to verify that the gaming device is communicating with a server
56997942738Verifying a gaming device is in communications with a gaming server
57007941831Dynamic update of authentication information
57017941826Enforcing access control on multicast transmissions
57027941668Method and system for securely managing application transactions using cryptographic techniques
57037941667Electronic document authenticity guarantee method, and electronic document disclosure system
57047941665Device pairing
57057941664Account-based digital signature (ABDS) system using biometrics
57067941663Authentication of 6LoWPAN nodes using EAP-GPSK
57077941662Data transfer efficiency in a cryptography accelerator system
57087941579Communication system for authenticating authority of host device for accessing storage medium set to periphery device
57097941376System and method for customer authentication of an item
57107940932Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
57117940184Integrated circuit and method to secure a RFID tag
57127937749Method and system for managing network
57137937745Voice-capable system and method for user-directed network interaction monitoring for authentication and confidentiality designation
57147937594Apparatus and method for a programmable security processor
57157937593Storage device content authentication
57167937584Method and system for key certification
57177937436Validating routing of client requests to appropriate servers hosting specific stateful web service instances
57187937089Method, apparatus, and program product for provisioning secure wireless sensors
57197936869Verifying digital signature based on shared knowledge
57207934197Maintaining code integrity in a central software development system
57217934104Systems and methods for verifying a licensed installation at time of update
57227934099Device and method for generating digital signatures
57237934098System and method for capturing and applying a legal signature to documents over a network
57247934097Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network
57257934096Integrity protected smart card transaction
57267934095Method for exchanging messages and verifying the authenticity of the messages in an ad hoc network
57277934094Method, system and apparatus to support mobile IP version 6 services
57287934088Method of secure communication between endpoints
57297934087Techniques for secure event recording and processing
57307933950Secure control of features of a digital device
57317933611Disabling operation of features on a handheld mobile communication device based upon location
57327933413Key exchange verification
57337930734Method and system for creating and tracking network sessions
57347930729Performing presence service in a wireless communication system
57357930703System and method for providing access to multimedia content via a serial connection
57367930562Method of and apparatus for reproducing information, and security module
57377930558Data recorder restoring original data allowed to exist only uniquely
57387930557Framework for embedding graphical processing unit programs in computer software
57397930556Fingerprint system and method for access control
57407930551Method and system for reusing an MMH function to perform a fast MMH-MAC calculation
57417930548Image verification system, image verification apparatus, and image verification method
57427930547High accuracy bloom filter using partitioned hashing
57437930544Data processing apparatus and its method
57447930543Secure telemetric link
57457930541E-mail communication apparatus
57467930540Cryptographic policy enforcement
57477930428Verification of DNS accuracy in cache poisoning
57487926102Confidential content search engine method
57497926100Method for preventing unauthorized connection in network system
57507926087Centralizing access request authorizations for storage systems
57517925886Encryption output data generation method and system
57527925882Data application method
57537925878System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials
57547925045Determining document authenticity in a closed-loop process
57557925027Secure address proxying using multi-key cryptographically generated addresses
57567925016Method and apparatus for descrambling content
57577924470Document processing method, document processing apparatus and program
57587924156Electronically switchable RFID tags
57597921455Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
57607921300Apparatus and method for secure hash algorithm
57617921295Service mobility management system using XML security and the method thereof
57627921292Secure messaging systems
57637921291Method and communication system for releasing a data processing unit
57647920702Digital rights management system and method
57657917949Voice controlled portable memory storage device
57667917946Method and network for securely delivering streaming data
57677917940Inheritance of controls within a hierarchy of data processing system resources
57687917771Method for selective encryption within documents
57697917770Configurable data masking for software testing
57707917767Method and apparatus for adding signature information to electronic documents
57717917765Modular signature verification architecture
57727917763Device and method for detecting a manipulation of an information signal
57737917762Secure execution environment by preventing execution of unauthorized boot loaders
57747917761Digitally signing an electronic document with a user-entered signature image
57757917759Identifying an application user as a source of database activity
57767917758TLS tunneling
57777917757Method and system for authentication of electronic communications
57787917756E-mail stamping with from-header validation
57797917755Identification of localized web page element
57807917754Method and apparatus for linking businesses to potential customers through a trusted source network
57817917749Systems and methods for secure transaction management and electronic rights protection
57827917638Transparent reconnection
57837916870Systems and methods for document control using public key encryption
57847916861System and method for establishing secondary channels
57857913301Remote feature activation authentication file system
57867913298Method and apparatus for end-to-end identity propagation
57877913295Method and apparatus to enable a securely provisioned computing environment
57887913293Method and communication unit for communicating between communication apparatuses
57897913093Method and system for providing access to information on an article to which a tag is coupled
57907913091Authentication system, consolidation apparatus and program
57917913090Authentication systems and authentication method
57927913087Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
57937913085System and method of per-packet keying
57947913084Policy driven, credential delegation for single sign on and secure access to network resources
57957913083Secret-key-controlled reversible circuit and corresponding method of data processing
57967913080Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program
57977912906Generating PKI email accounts on a web-based email system
57987912762Customizable sign-on service
57997911322Information processing apparatus and method, and non-contact IC card device
58007908664Data delivery apparatus and data delivery method
58017908663Abstractions and automation for enhanced sharing and collaboration
58027908662System and method for auditing software usage
58037908648Method and system for enabling remote access to a computer system
58047908647Aggregation system
58057908644Adaptive multi-tier authentication system
58067908642Policy store
58077908489Method for managing external storage devices
58087908487Systems and methods for public-key encryption for transmission of medical information
58097908484Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack
58107908483Method and apparatus for binding TPM keys to execution entities
58117908482Key confirmed authenticated key exchange with derived ephemeral keys
58127908480Authenticating an endpoint using a STUN server
58137908479Information processing device and method, recording medium and program
58147908478Data processing method and data reading method
58157908472Secure sockets layer cut through architecture
58167907747Device, method, and recording medium for embedding/detecting a digital watermark
58177907729Rollback attack prevention system and method
58187904959Systems and methods for detecting and inhibiting attacks using honeypots
58197904949Apparatus, systems and methods to provide authentication services to a legacy application
58207904944Image forming apparatus, control method, and computer-readable storage medium therefor
58217904731Integrated circuit that uses a dynamic characteristic of the circuit
58227904726Systems and methods for securing event information within an event management system
58237904725Verification of electronic signatures
58247904723Method and apparatus for enhancing security of wireless communications
58257904720System and method for providing secure resource management
58267904717Method, apparatus, and manufacture for decryption of network traffic in a secure session
58277904716Processing device and processing method
58287904715Method for authenticating dual-mode access terminals
58297904568Systems and methods for managing the distribution of electronic content
58307903623Server based technique for optimizing call setup latency for geographically dense groups
58317900263Content recording/reproducing apparatus and content recording/reproducing method
58327900253Systems and methods for authorization credential emulation
58337900249Method, system and software for maintaining network access and security
58347900247Trusted third party authentication for web services
58357900245Method and system for non-repeating user identification in a communication system
58367900062Unauthorized contents detection system
58377900058Methods and arrangements for remote communications with a trusted platform module
58387900053User-defined passwords having associated unique version data to assist user recall of the password
58397900051Secure multimedia data transmission method
58407900050Digital document management system, digital document management method, and digital document management program
58417900049Method for recognizing audio-visual data in transmission networks, in particular internet
58427900047Method and apparatus for encrypting data transmitted over a serial link
58437900032Method and system for NAND flash support in autonomously loaded secure reprogrammable system
58447899183Random number generating and sharing system, encrypted communication apparatus, and random number generating and sharing method for use therein
58457898384System for checking the single crossing of a controlled passage
58467895666Data structure representation using hash-based directed acyclic graphs and related method
58477895638Protocol for entering, disabling and/or erasing scrambled data access rights and the corresponding access control module
58487895445Token-based remote data access
58497895443Secure authentication using hardware token and computer fingerprint
58507895442Interconnect device to enable compliance with rights management restrictions
58517895441LDAP grouping for digital signature creation
58527895440Method of encrypting digital data, a method of masking a biometric print, and application to making a security document secure
58537895439Watermarked material processing
58547895438Method and apparatus for generating and verifying digital signature
58557895436Authentication system and remotely-distributed storage system
58567895432Method and apparatus for using a third party authentication server
58577891012Method and computer-usable medium for determining the authorization status of software
58587891004Method for vehicle internetworks
58597890997Remote feature activation authentication file system
58607890995System and method for remote management of communications networks
58617890993Secret file access authorization system with fingerprint limitation
58627890767Virtual smart card system and method
58637890765Generating and verifying trusted digital time stamp
58647890764System, apparatus, program and method for obtaining time stamp
58657890763Method of identifying invalid digital signatures involving batch verification
58667890760Secure method of termination of service notification
58677890759Connection assistance apparatus and gateway apparatus
58687890758Apparatus and method for generating keys in a network computing environment
58697890757Receiver non-repudiation
58707889050System and method for training a trainable transmitter
58717886342Distributed environment controlled access facility
58727886338System and method for controlling access to local services without losing failover capibilty
58737886334System and method for social network trust assessment
58747886163Authentication protocol with memory integrity verification
58757886159Data providing system and apparatus and methods of same
58767886157Hand geometry recognition biometrics on a fob
58777886152Method and device for embedding watermark information and method and device for extracting embedded watermark information
58787886151Temporal synchronization of video and audio signals
58797886150System debug and trace system and method, and applications thereof
58807886149Method and apparatus for assigning network addresses based on connection authentication
58817885639Method and apparatus for authenticating a wireless access point
58827885427System and method for solving the "birthday" problem with watermarking
58837882551Techniques for entry of less than perfect passwords
58847882549Systems for authenticating a user's credentials against multiple sets of credentials
58857882541Authentication system in information processing terminal using mobile information processing device
58867882359Method and system for user attestation-signatures with attributes
58877882358Reversible hashing for E-signature verification
58887882356UPnP authentication and authorization
58897882349Insider attack defense for network client validation of network management frames
58907882347Image printing device, verifying device, and printed material
58917882346Method and apparatus for providing authentication, authorization and accounting to roaming nodes
58927882255Method and apparatus for maintaining local area network ("LAN") and wireless LAN ("WLAN") security associations
58937882227Mechanism for implementing file access control across a network using labeled containers
58947881478Method for controlling access to an encrypted programme
58957881473Quantum key distribution system and method
58967881470Network mobility security management
58977880584Lockbox key with callback feature
58987877801Method and system to detect malicious software
58997877797Non-intrusive background synchronization when authentication is required
59007877791System, method and program for authentication and access control
59017877790System and method of using personal data
59027877788Method and apparatus for securing a peripheral data interface
59037877784Verifying authenticity of webpages
59047877782Method and apparatus for configuration management of computer system
59057877608Secure inter-process communications
59067877607Tamper-evident data management
59077877606Method of authorizing network publishing
59087877604Proof of execution using random function
59097877600Method and apparatus for distributing root certification
59107877482Efficient application hosting in a distributed application execution system
59117874015Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity
59127874012Privileged access to encrypted data
59137873986Communication apparatus, and display terminal
59147873853Data storage apparatus, power control, method, and communication apparatus
59157873834Image forming apparatus, storage medium storing program for acquiring time stamp, digital data management system, and method for acquiring time stamp
59167873833Detection of frequent and dispersed invariants
59177873832Mechanism for secure participation in a transaction by a third party
59187873831Digests to identify elements in a signature process
59197873830Methods for coordinating access to memory from at least two cryptography secure processing units
59207870615Information terminal with function of playing back contents
59217870598Policy specification framework for insider intrusions
59227870597Method and apparatus for managing digital identities through a single interface
59237870393Steganographic method and device
59247870392Digital fingerprinting for management and recovery of data objects
59257870391Method of managing multimedia data and mobile communication terminal equipped with function of managing multimedia data
59267870385Method and system for controlling presentation of computer readable media on a media storage device
59277869604System for an encryption key path diagnostic
59287869603Encryption key path diagnostic
59297869593Software for providing based on shared knowledge public keys having same private key
59307868739Method and system for improving function of reading information from RFID tag
59317865957Apparatus and methods for updating mobile device virus pattern data
59327865952Pre-emptive application blocking for updates
59337865943Credential vault encryption
59347865937Methods and systems for authenticating users
59357865933Authentication agent apparatus, authentication method, and program product therefor
59367865876Multiple trusted computing environments
59377865734Write accessibility for electronic paper
59387865733Secure processor and a program for a secure processor
59397865732Method and communications and communication network intrusion protection methods and intrusion attempt detection system
59407865729Bidirectional authentication for HTML form processing
59417861918Voting system and method

2010

59427861314Interactive key control system and method of managing access to secured locations
59437861313Information managing apparatus and method, recording medium, and program
59447861312MP3 player with digital rights management
59457861306Method and system for limiting the use of user-specific software features
59467861293Mobile terminal and authentication method
59477861287System and method for utilizing audit information for challenge/response during a password reset process
59487861283User position utilization system
59497861282Information processing apparatus, printing apparatus and printing system including thereof apparatuses
59507861090Electric conference system and control method thereof
59517861088Method and system for verifiably recording voice communications
59527861086Digital signing method, digital signing apparatus, portable information processing apparatus, digital signing system, and recording medium
59537861085Systems and methods providing distributed management of electronic signatures in industrial automation systems
59547861083Hybrid encoding of data transmissions in a security system
59557861082Validating client-receivers
59567861078Password-authenticated asymmetric key exchange
59577861077Secure authentication and transaction system and method
59587860797Method for documenting property or possession and transfer of property or possession of a merchandise
59597860268Object authentication using encoded images digitally stored on the object
59607860248Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
59617860247Identity based encryption
59627859401Addressing scheme for smart wireless medical sensor networks
59637856658Method and system for incorporating trusted metadata in a computing environment
59647856657Secure access of resources at shared appliances
59657856655System and method for improved network security
59667856560Digital information recording apparatus and recording/reproducing apparatus
59677856557Authentication of data in a digital transmission system
59687856556Codeword-enhanced peer-to-peer authentication
59697856555Write accessibility for electronic paper
59707856554Method of authenticating an object
59717856553System and method for platform activation
59727856103Microcontroller and authentication method between the controllers
59737855956Method and system for controlling the multicast source
59747853999Trusted operating environment for malware detection
59757853994Computer system and method of updating authentication information of computer system
59767853986Document distribution system and method
59777853803System and method for thwarting buffer overflow attacks using encrypted process pointers
59787853802Information processing system, method, and apparatus, and program
59797853801System and method for providing authenticated encryption in GPON network
59807853800Systems and methods for a secure recording environment
59817853796Method, system and computer program for polynomial based hashing and message authentication coding with separate generation of spectrums
59827853795System, method and computer program product for guaranteeing electronic transactions
59837853794Efficient method for providing secure remote access
59847853792Authenticity verification methods, products and apparatuses
59857853791System and method for certificate based redirection
59867853790Enhancement to volume license keys
59877853789Method and system for establishing a communications pipe between a personal security device and a remote computer system
59887853788Localized network authentication and security using tamper-resistant keys
59897853787Peripheral device for programmable logic controller
59907853781Load balancing secure sockets layer accelerator
59917853016Signature schemes using bilinear mappings
59927849511Determining authorized use of a software application
59937849319Method and device for incorporating additional information into main information through electronic watermarking technique
59947849318Method for session security
59957849315Method for managing operability of on-chip debug capability
59967849313Secure peer-to-peer messaging invitation architecture
59977849312Method and system for secure external TPM password generation and use
59987849307System and method for establishing historical usage-based hardware trust
59997849101Method and system for enabling an electronic signature approval process
60007848513Method for transmitting security context for handover in portable internet system
60017845016Methods and apparatus for verifying modules from approved vendors
60027845014Method and apparatus for implementing digital rights management
60037845007Method and system for intrusion detection in a computer network
60047844998Apparatus and method for autonomic email access control
60057844835Systems and methods for secure transaction management and electronic rights protection
60067844832System and method for data source authentication and protection system using biometrics for openly exchanged computer files
60077844831Secure memory device for smart cards
60087844821System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state
60097844820Set of metadata for association with a composite media item and tool for creating such set of metadata
60107844819Application authentication system
60117844817Ensuring quality of service in a communications network
60127844816Relying party trust anchor based public key technology framework
60137844674Architecture for general purpose trusted personal access system and methods therefor
60147844369Modular and expandable irrigation controller
60157844074Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
60167843848Methods and apparatus for round trip time measurements
60177841940Human test based on human conceptual capabilities
60187840816Identifying material stored using a signature as a retrieval index
60197840815Digital signature computer, system, method, and storage medium storing program for collectively affixing signature to plurality of messages
60207840814Method for managing an executable code downloaded in a reprogrammable on-board system
60217840813Method and system with authentication, revocable anonymity and non-repudiation
60227840812Authentication of digital certificates used by portable computing devices
60237840811Network system and communication methods for securely bootstraping mobile IPv6 mobile node using pre-shared key
60247840810Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key
60257840808Authentication system, device, and program
60267840806System and method of non-centralized zero knowledge authentication for a computer network
60277840804Attribute certificate validation method and device
60287836509Recording medium, apparatus for reproducing data and method thereof
60297836507Contents transmitter apparatus, contents receiver apparatus and contents transmitting method
60307836502Scheduled gateway scanning arrangement and methods thereof
60317836488Authentic device admission scheme for a secure communication network, especially a secure IP telephony network
60327836487Apparatus and method for authenticating a user when accessing to multimedia services
60337836485System and method for enrolling in a biometric system
60347836482Information management system
60357836310Security system that uses indirect password-based encryption
60367836308Apparatus and method for multiple function authentication device
60377836307Communication relay device, information processing system, control method and program
60387836306Establishing secure mutual trust using an insecure password
60397836305Method of and system for storage of I-WLAN temporary identities
60407836179Content validation for digital network
60417835526Method and system for restricting mobility using unique encrypted chargers
60427834743RFID tag and RFID tag communication distance modification method
60437831996Authentication techniques
60447831839Methods and apparatus for providing a secure booting sequence in a processor
60457831833System and method for key recovery
60467831831Authentication communication system, authentication communication apparatus, and authentication communication method
60477831829Identity-based encryption system
60487831828System and method for securely authenticating a data exchange session with an implantable medical device
60497831822Real-time stateful packet inspection method and apparatus
60507831517Single binary software license distribution
60517831060Method for protecting content of vector graphics formats
60527831045Security module revocation method used for securing broadcasted messages
60537831039AES encryption circuitry with CCM
60547830923Interval centroid based watermark decoder
60557828654Location based gaming system
60567827602Network firewall host application identification and authentication
60577827601Method and apparatus for firewall traversal
60587827598Grouped access control list actions
60597827596Authenticating computed results in a public distributed computing environment
60607827592Implicit authentication to computer resources and error recovery
60617827551Real-time threading service for partitioned multiprocessor systems
60627827409Remote secure authorization
60637827408Device for and method of authenticated cryptography
60647827406System and method for processing encoded messages for exchange with a mobile data communication device
60657827405Mechanism for utilizing kerberos features by an NTLM compliant entity
60667827401Efficient certificate revocation
60677827400Security certificate management
60687827398Method for offloading encryption and decryption of a message received at a message server to remote end devices
60697827397Gaming machine having a secure boot chain and method of use
60707827313Addressing method and method and apparatus for establishing host identity protocol (HIP) connections between legacy and HIP nodes
60717826749Method and system for quantum key distribution over multi-user WDM network with wavelength routing
60727826637Digital watermark embedding apparatus, digital watermark detecting apparatus, digital watermark embedding method, digital watermark detecting method and computer program product
60737823207Privacy preserving data-mining protocol
60747823193Method and system for ordering, loading and using admission tickets
60757823192Application-to-application security in enterprise security services
60767823188Network access system which is adapted for the use of a simplified signature method, and server used to implement same
60777823187Communication processing method and system relating to authentication information
60787822989Controlling access to an area
60797822988Method and system for identity recognition
60807822987Data card verification system
60817822985Real-time electronic signature validation systems and methods
60827822983Physical device bonding
60837822982Method and apparatus for automatic and secure distribution of a symmetric key security credential in a utility computing environment
60847822981Communication apparatus and authenticating method
60857822973Authentication key device having media content storage and rendering capabilities
60867822205Multiple matching control method
60877818812Article and system for decentralized creation, distribution, verification and transfer of valuable documents
60887818811Off-line economies for digital media
60897818798Software system with controlled access to objects
60907818785System and method for secure information handling system memory
60917818784Communication control apparatus and communication control system
60927818783System and method for global access control
60937818782Authentication medium, authenticable substrate, authentication medium label, authentication medium transfer sheet, authenticable sheet, and authenticable information recording medium
60947818780Method and compiler for routing policy
60957818583Personal authentication apparatus
60967818578Method and apparatus for uniquely and authoritatively identifying tangible objects
60977818577Identifying material using a watermark and a signature
60987818575Efficient retrieval of cryptographic evidence
60997818574System and method for providing dynamically authorized access to functionality present on an integrated circuit chip
61007818573Remote control of a security system using e-mail
61017818571Securing wireless communications between devices
61027818570Exclusive set system constructions including, but not limited to, applications to broadcast encryption and certificate revocation
61037818562Method and apparatus for time synchronization in a network data processing system
61047817986Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices
61057817802Cryptographic key management in a communication network
61067814334Method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content
61077814329MACSec implementation
61087814328Digital signatures for embedded code
61097814327Document registration
61107814326Signature schemes using bilinear mappings
61117814324Method of making a patient monitor
61127814323Program, classification method and system
61137814322Discovery and authentication scheme for wireless mesh networks
61147814321System and method for protecting disk drive password when BIOS causes computer to leave suspend state
61157814320Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks
61167814318Scalable file system configured to make files permanently unreadable
61177814315Propagation of certificate revocation information
61187810163Secure media path methods, systems, and architectures
61197810139Remote authorization for operations
61207810091Mechanism to check the malicious alteration of malware scanner
61217809959Countermeasure method in a microcircuit, microcircuit therefore and smart card comprising said microcircuit
61227809951System and method for automated border-crossing checks
61237809949Configuration of a computing device in a secure manner
61247809948Cellular telephone device having authenticating capability
61257809947User certificate system and method for data broadcasting
61267809944Method and apparatus for providing information for decrypting content, and program executed on information processor
61277805757Control of communication session attributes in network employing firewall protection
61287805616Generating and interpreting secure and system dependent software license keys
61297805614Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
61307805612Use of global clock to secure and synchronize messages in XM and SMS messages to a vehicle
61317805611Method for secure communication from chip card and system for performing the same
61327805610System for registration of sensing device with printer
61337805607Method for the anonymous authentication of a data transmitter
61347805606Computer system for authenticating a computing device
61357804978Method and device for reading digital watermark, computer software package and corresponding storage means
61367804774Scalable filtering and policing mechanism for protecting user traffic in a network
61377802306Multiple watermarks for digital rights management (DRM) and content tracking
61387802104Context sensitive dynamic authentication in a cryptographic system
61397802102Method for efficient and secure data migration between data processing systems
61407802099Method and apparatus for establishing a secure connection
61417802098Cryptography method and smart cards microcircuit
61427802097Secure method of termination of service notification
61437802095Method and system for preventing unauthorized recording of media content on a Macintosh operating system
61447801325Watermarking a chip design based on frequency of geometric structures
61457801302Cryptographic method and apparatus
61467797754Dynamic control of authorization to access internet services
61477797736System and method for authentication
61487797734Systems and methods for user interface control
61497797731Centralized identity authentication for electronic communication networks
61507797730Downline transcription system using automatic tracking and revenue collection
61517797728Mechanism to generate restricted and unrestricted execution environments
61527797726Method and system for implementing privacy policy enforcement with a privacy proxy
61537797549Secure method and system for biometric verification
61547797544Attesting to establish trust between computer entities
61557797543Systems and methods for authenticating an electronic message
61567797542Watermark signal generating apparatus
61577797541Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device
61587797540Predictive support system for software
61597797538Broadband certified mail
61607797537Mobile terminal, data communication method, and computer program
61617797535Authentication method and system, and information processing method and apparatus
61627796762Communication system, common key control apparatus, and general communication apparatus
61637796011Water treatment apparatus
61647794325Dynamic in-game soundtrack for a console game machine
61657793355System and method of owner control of electronic devices
61667793352Sharing network access capacities across internet service providers
61677793340Cryptographic binding of authentication schemes
61687793336Method and apparatus for communicating credential information within a network device authentication conversation
61697793107Document verification apparatus and control method thereof
61707793105Method and apparatus for local domain management using device with local authority module
61717793103Ad-hoc network key management
61727793101Verifiable virtualized storage port assignments for virtual machines
61737792336Signature capture aesthetic/temporal qualification failure detection
61747792303Method of delivering direct proof private keys to devices using a distribution CD
61757792290Gathering randomness in a wireless smart card reader
61767792286Signature generation device and signature verification device
61777792285Method and system for securely exchanging encryption key determination information
61787791452Wireless access control and event controller system
61797791451Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security
61807788801Method for manufacturing a tamper-proof cap for an electronic module
61817788730Secure bytecode instrumentation facility
61827788715Authentication for transmission control protocol
61837788709Mobile host using a virtual single account client and server system for network access and management
61847788708Systems and methods for delegating information technology authorization to at least one other person
61857788700Enterprise security system
61867788698Pre-negotiation and pre-caching media policy
61877788494Link key injection mechanism for personal area networks
61887788493Authenticating users
61897788492Facilitating 802.11 roaming by pre-establishing session keys
61907788491Use of encryption for secure communication exchanges
61917788271Content distribution server, content distribution method, and program
61927787661Method, system, personal security device and computer program product for cryptographically secured biometric authentication
61937787652Lossless embedding of data in digital objects
61947784091Data processing system
61957784089System and method for providing a multi-credential authentication protocol
61967784086Method for secure packet identification
61977783894Monolithic semiconductor integrated circuit and method for selective memory encryption and decryption
61987783891System and method facilitating secure credential management
61997783890Multimedia recording apparatus, object-specifying information providing apparatus, server apparatus, verification apparatus, multimedia recording method, object-specifying information providing method, server method, verification method, and multimedia recording system
62007783887Method and apparatus for providing television services using an authenticating television receiver device
62017783886Multi-level boot hierarchy for software development on an integrated circuit
62027783885Hybrid digital signature workflow
62037783884Content providing system, information processing device and memory card
62047783881Gaming device verification system and method using a file allocation structure
62057783040Encryption in a secure computerized gaming system
62067779476Active defense against wireless intruders
62077779456System and method for enhanced protection and control over the use of identity
62087779452Computer access security
62097779422System, method, and computer program product for compatibility among hooking applications
62107779420Verifying information stored on a managed network device
62117779271Watermark embedding
62127779267Method and apparatus for using a secret in a distributed computing system
62137779262Security method using electronic signature
62147779261Method and system for digital watermarking
62157779260Information processing apparatus and method
62167779258Method for controlling security function execution with a flexible, extendable, and non-forgable block
62177779257System and method for constraint resolution
62187779251Information communication apparatus and method, information communication system, and memory medium
62197778931Method and a system for securing processing of an order by a mobile agent within a network system
62207778414Encryption method based on factorization
62217774832Systems and methods for implementing protocol enforcement rules
62227774830Access control policy engine controlling access to resource based on any of multiple received types of security tokens
62237774829Computer access control using password reset
62247774823System and method for managing electronic communications
62257774610Method and apparatus for verifiably migrating WORM data
62267774606Write accessibility for electronic paper
62277774604Verifying captured objects before presentation
62287774602Secure modem gateway concentrator
62297773972Functionality and policies based on wireless device dynamic associations
62307773770Substituting or replacing components in media objects based on steganographic encoding
62317770225Method and apparatus for auditing network security
62327770220System and method for securing documents using an attached electronic data storage device
62337770214Apparatus, system, and method for establishing a reusable and reconfigurable model for fast and persistent connections in database drivers
62347770209Method and system to detect human interaction with a computer
62357770174Client-based resource manager with network-based rights acquisition
62367770031Data protection systems and methods
62377770024Security message authentication instruction
62387770023Exclusive encryption
62397770020Face image obtaining method and apparatus
62407770017Method and system for digital watermarking
62417770016Systems and methods for watermarking software and other media
62427770014Randomized signal transforms and their applications
62437770012System and computer program product for secure authentication using digital certificates
62447770011Secure authentication using digital certificates with individual authentication data
62457770010Dynamically configurable interleaver scheme using at least one dynamically changeable interleaving parameter
62467770009Digital signing method
62477770007Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication
62487770006Method and apparatus for authorizing a database operation
62497770002Multi-factor authentication
62507769873Dynamically inserting filters into forwarding paths of a network device
62517769166Dual mode AES implementation to support single and multiple AES operations
62527765602Storage on-demand system, and method for processing data in the same
62537765593Rule set-based system and method for advanced virus protection
62547765588System and method for identity verification
62557765585Credential delegation using identity assertion
62567765582Identity-based-encryption messaging system with public parameter host servers
62577765409Modular BIOS update mechanism
62587765408Systems and methods for online identity verification
62597765405Receive side scaling with cryptographically secure hashing
62607765404Providing content in a communication system
62617765403System for controlling the distribution and use of rendered digital works through watermarking
62627765402System and methods for the wireless delivery of a message
62637765398Method of promulgating a transaction tool to a recipient
62647764949Method of preventing replay attack in mobile IPv6
62657764790Scaling independent technique for watermarking images
62667764785Method for communicating securely over an insecure communication channel
62677761919Intrusion detection with automatic signature generation
62687761910System and method for assigning an identity to an intelligent electronic device
62697761712Steganographic method and device
62707761709Media receiving apparatus, media system having the same, and control methods thereof
62717761703System and method for checking digital certificate status
62727760877Protection of data on media recording disks
62737757299Conditional access to digital rights management conversion
62747757296Method of managing software components that are integrated into an embedded system
62757757272Method and apparatus for dynamic mapping
62767757269Enforcing alignment of approved changes and deployed changes in the software change life-cycle
62777757101Data processing apparatus, data processing system, and data processing method therefor
62787757100Protected volume on a data storage device with dual operating systems and configurable access and encryption controls
62797757091Method and apparatus for the creation of a self-authenticating document
62807757089Apparatus, method and computer program for distributing and rendering content
62817757087Information processing apparatus and information processing method
62827757086Key transportation
62837757085Method and apparatus for encrypting data transmitted over a serial link
62847757083Integrated circuit that uses a dynamic characteristic of the circuit
62857756955Information processing apparatus, information processing method, and program thereof
62867756510Authentication method for wireless distributed system
62877756073Method for updating a routing entry
62887752676Encryption of data in storage systems
62897752661Method and system for server support of pluggable authorization systems
62907752660Transmission error resistant reader station
62917752466Systems and methods for secure transaction management and electronic rights protection
62927752457Method and apparatus for secure data mirroring a storage system
62937752455Trusted storage systems and methods
62947752452Dynamic cache lookup based on dynamic data
62957752451System and method for virtual entity access
62967752449System and method for generating a non-repudiatable record of a data stream
62977752446System and method for digital watermarking of data repository
62987752445System and method for authentication of a hardware token
62997752442Virtual distributed security system
63007752441Method of cryptographic synchronization
63017751608Model-based synthesis of band moire images for authenticating security documents and valuable products
63027751587Data production method and apparatus
63037751584Method to provide transparent information in binary drivers via steganographic techniques
63047751570Method and apparatus for managing cryptographic keys
63057751567Local authentication of mobile subscribers outside their home systems
63067751561Partial encryption
63077748043Method for authenticating, in particular, software components that can be loaded into a control unit of a motor vehicle
63087748034Strong anti-replay protection for IP traffic sent point to point or multi-cast to large groups
63097748031Mass storage device with automated credentials loading
63107748029Authentication query strategizer and results compiler
63117748028Authentication method, terminal device, relay device and authentication server
63127748027System and method for dynamic data redaction
63137747873Method and apparatus for protecting information and privacy
63147747869Process for detecting defective component exchanges
63157747866System and method providing improved error detection related to transmission of data over a communication link
63167747865Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols
63177747864DVD identification and managed copy authorization
63187747863Image processing apparatus and its method
63197747862Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks
63207747861Method and system for redundant secure storage of sensitive data by using multiple keys
63217747860System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison
63227747857Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates
63237747856Session ticket authentication scheme
63247747540Account linking with privacy keys
63257747024System and method for generalized authentication
63267747012Process of security of an electronic unit with cryptoprocessor
63277743425Security restrictions on binary behaviors
63287743424Method for protecting data in a hard disk
63297743409Methods used in a mass storage device with automated credentials loading
63307743407Using permissions to allocate device resources to an application
63317743406System and method of preventing alteration of data on a wireless device
63327743404Method and system for single signon for multiple remote sites of a computer network
63337743261Unauthorized contents detection system
63347743258Method for interacting with a memory device in cryptographic operations
63357743255Trust model for a database management system supporting multiple authorization domains
63367743253Digital signature for network coding
63377743252Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates
63387743248System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components
63397743088Synchronization identifier generating method and apparatus for synchronizing digital contents
63407742619Image watermarking based on sequency and wavelet transforms
63417742605Method and system for authentification of a mobile user via a gateway
63427742597Exclusive encryption system
63437741951Method and apparatus for a rolling code learning transmitter
63447739747Dynamic control of authorization to access internet services
63457739722System for supporting security administration and method of doing the same
63467739519Secure device
63477739514Software application integrity verification method and device
63487739511Systems and methods for watermarking software and other media
63497739510Alert options for electronic-paper verification
63507739509Authentication of an object using a signature part
63517739508Secure instant messaging system
63527739507Hardware multimedia endpoint and personal computer
63537739503Authenticating method for short-distance radio devices and a short-distance radio device
63547739499Check anti-fraud security system
63557739498Method and apparatus for multi-table accessing of input/output devices using target security
63567739495Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method
63577739402Locating devices in a data network
63587738676Client-side watermarking using hybrid I-frames
63597738675Decoding apparatus for controlling sequence of operations for a plurality of copyright information detection sections
63607738660Cryptographic key split binding process and apparatus
63617735143System and method for secure document processing
63627735132System and method for encrypted smart card PIN entry
63637735131Endoscope device for measuring an object using an image, by setting login qualifiers according to examination environment
63647735130Image data transmission system, process and program, image data output device and image display device
63657735126Certificate based authentication authorization accounting scheme for loose coupling interworking
63667735116System and method for unified threat management with a relational rules methodology
63677734926System and method for applying security to memory reads and writes
63687734925System and method for the electronic management and execution of transaction documents
63697734924System and method for transparently providing certificate validation and other services within an electronic transaction
63707734922Method, system and terminal apparatus for enabling content to be reproduced in multiple terminals
63717734921System and method for guaranteeing software integrity via combined hardware and software authentication
63727734910Managed device, management system, method for controlling a managed device and medium
63737734280Method and apparatus for authentication of mobile devices
63747734051Key distribution
63757734046Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit
63767730490System with user access-control information having signature and flow setting information for controlling order of performance of functions
63777730325Verification system and method
63787730323Controlling database copyrights
63797730318Integration of high-assurance features into an application through application factoring
63807730317Linear predictive coding implementation of digital watermarks
63817730313Tracing content usage
63827730309Method and system for key management in voice over internet protocol
63837730308System and method for providing an user's security when setting-up a connection over insecure networks
63847730306Information processing apparatus with use-restricted functions, and system and method for canceling use restriction
63857730304Device authentication information installation system
63867730296Method and system for providing synchronous running encoding and encryption
63877729496Efficient key updates in encrypted database systems
63887727070Method and apparatus for authenticating and verifying communication on a network of gaming devices
63897725947Methods and systems for providing benchmark information under controlled access
63907725946Program, system and method for authenticating permission to use a computer system and inhibiting access to an unauthorized user
63917725945Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients
63927725935Detecting worms
63937725930Validating the origin of web content
63947725925Enforcing access control on multicast transmissions
63957725924Network system, use permission determining method, network device, and recording medium
63967725731System and method for managing access to functions supported by a multi-function port
63977725730Cryptographic methods and apparatus for secure authentication
63987725728Apparatus and method for dynamically auditing data migration to produce metadata
63997725725User-selectable signatures
64007725724Digital signature method based on braid groups conjugacy and verify method thereof
64017725723Data certification method and apparatus
64027725722Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system
64037725720Method for generating and managing a local area network
64047725718Authenticating images identified by a software application
64057725717Method and apparatus for user authentication
64067725715System and method for three-phase data encryption
64077725710Authentication system for networked computer applications
64087725567Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
64097724782Interval centroid based watermark
64107724126Movable barrier operator operating parameter transfer method and apparatus
64117721330Utility computing firewall
64127721326Automatic authentication selection server
64137721113Data alteration detecting method, data alteration detecting device and data alteration detecting program
64147721106Transitive authentication authorization accounting in the interworking between access networks
64157721103System and method for providing global media content delivery
64167721102System and method for detecting exposure of OCSP responder's session private key
64177721101Communication apparatus and authentication apparatus
64187721099Securing access to documents within multi-function devices
64197721098System and method for guaranteeing software integrity via combined hardware and software authentication
64207721097Information recording medium, and information recording apparatus and method
64217721096Self-authenticating blade server in a secure environment
64227721095Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon
64237721094Systems and methods for determining if applications executing on a computer system are trusted
64247721093Authenticated exchange of public information using electronic mail
64257721092Authenticating device, authenticated device and key updating method
64267721088Terminal device, server device, and content distribution system
64277720253Visual perception model for hi-fidelity image watermarking
64287720250Method and apparatus for watermarking stream data
64297720227Encryption method for SIP message and encrypted SIP communication system
64307719996Encoding timestamps
64317717349Semiconductor device for IC tag, IC tag and control method for IC tag for detecting and executing command from radio wave
64327716720System for providing secure and trusted computing environments
64337716718Electronic device network system and data receiver search method using electronic device network system
64347716496Encryption/decryption management method in computer system having storage hierarchy
64357716492Method and apparatus to obtain service capability credentials
64367716489Access control method for disconnected automation systems
64377716487License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
64387716486Controlling group access to doors
64397716485Systems and methods for media authentication
64407716483Method for establishing a communication between two devices
64417716482Conference session key distribution method in an ID-based cryptographic system
64427716480Property-based data authentication mechanism
64437716477Data processing method, program of the same, and device of the same
64447716470Active verification of boot firmware
64457716469Method and system for providing a circle of trust on a network
64467716352Method and system for retrieving information using an authentication web page
64477716331Method of gaining secure access to intranet resources
64487716140Methods and systems for controlling access to relationship information in a social network
64497715565Information-centric security
64507715563Rapid acquisition of state vectors in an encrypted data communication system
64517712675Physical items for holding data securely, and methods and apparatus for publishing and reading them
64527712141Determining advertising activity
64537712139Data transmission method
64547711959Method for transmitting encrypted user data objects
64557711958Method and system for encoding signatures to authenticate files
64567711956Information processing apparatus, information system, proxy processing method, and program and recording medium therefor
64577711955Apparatus and method for cryptographic key expansion
64587711952Method and system for license management
64597711122Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
64607710289Portable communication apparatus with an anti-theft mode and implementing method thereof
64617707625Credential processing device event management
64627707622API for a system having a passcode authenticator
64637707430Digital content protection system
64647707422Method for embedding watermark into an image and digital video recorder using said method
64657707421Method of accessing or sharing a digital document in a peer-to-peer communication network
64667707418Communication system, communication method, base station apparatus, controller, device, and recording medium storing control program
64677707417Secure transmission of data between clients over communications network
64687707416Authentication cache and authentication on demand in a distributed network environment
64697707415Tunneling security association messages through a mesh network
64707707413Systems and methods for protecting private information in a mobile environment
64717707412Linked authentication protocols
64727707405Secure installation activation
64737707403Authentication method, communication apparatus, and relay apparatus
64747707402Quantum cipher communication system
64757707241Determining type of signal encoder
64767703145Data update authorization
64777703142Software license authorization system
64787702921Loading media data into a portable data carrier
64797702912Secure systems management
64807702911Interfacing with a system that includes a passcode authenticator
64817702910Message authentication
64827702909Method and system for validating timestamps
64837702903License re-allocation system and method
64847702898Method for authenticating and verifying SMS communications
64857702221Unified control and memory for a combined DVD/HDD system
64867702108Use of communication equipment and method for authenticating an item, unit and system for authenticating items, and authenticating device
64877702107Server-based encrypted messaging method and apparatus
64887702102Method for encoded data transmission via a communication network
64897701956Method and system for using a transfer agent for translating a configuration file
64907698747Applet download in a communication system
64917698743Authentication server, method and system for detecting unauthorized terminal
64927698736Secure delegation using public key authentication
64937698735Method and system of integrating third party authentication into internet browser code
64947698732Method and apparatus for exchanging information between computer systems from different computer networks
64957698570Digital content distribution system and method
64967698568System and method for using DRM to control conditional access to broadband digital content
64977698565Crypto-proxy server and method of using the same
64987698562Authenticated program execution method
64997698561Method and system for detection of aliases in a network
65007698560Information storage system
65017698559Dynamic enabling of functionality in electronic document readers
65027698558System for, and method of, providing the transmission, receipt and content of an e-mail message
65037698557System and method for generating a digital certificate
65047698556Secure spontaneous associations between networkable devices
65057698554Controlling transmission of broadcast content
65067698372System for publishing messages from identified, authorized senders to subscribers
65077698324Distributed confidential contextual querying
65087697716Watermarking different areas of digital images with different intensities
65097697690Windowed backward key rotation
65107697688Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
65117697685Data dependent scrambler with reduced overhead
65127694341Run-time code injection to perform checks
65137694336Aggregated authenticated identity apparatus for and method therefor
65147694333Communication apparatus, communication system, certificate transmission method, anomaly detection method and a program therefor
65157694329Secure delegation using public key authentication
65167694328Systems and methods for secure client applications
65177694143Method of and system for collecting an electronic signature for an electronic record stored in a database
65187694142Digital content distribution systems
65197694140Web service client extensions
65207694139Securing executable content using a trusted computing platform
65217694138Secure authentication with voiced responses from a telecommunications terminal
65227694137Image processing system and authentication method of the same
65237694136Method for distributing and authenticating public keys using hashed password protection
65247694132Secure intermediary communications system
65257694126Method and system for recovering the validity of cryptographically signed digital data
65267693286Method of delivering direct proof private keys in signed groups to devices using a distribution CD
65277693277Generating digital signatures using ephemeral cryptographic key
65287689836Encryption device
65297689835Computer program product and computer system for controlling performance of operations within a data processing system or networks
65307689833Method and apparatus for electro-biometric identity recognition
65317689829Method for the encryption and decryption of data by various users
65327689825Systems and methods for device registration using optical transmission
65337689824Data management apparatus, data management system, and method of data management
65347689658Method for publishing messages from identified, authorized senders to subscribers
65357689654Email address verification
65367688996Adaptive prediction filtering for digital watermarking
65377687750Multi-party missile firing control system
65387685642System and method for controlling rights expressions by stakeholders of an item
65397685639Using inserted e-mail headers to enforce a security policy
65407685637System security approaches using sub-expression automata
65417685631Authentication of a server by a client to prevent fraudulent user interfaces
65427685629Methods and systems for authenticating users
65437685626Information management system
65447685433Recognition of live object in motion
65457685429Signature-generation method, signature-verification method, public-key distribution method, and information-processing apparatus
65467685428Transmission of event markers to data stream recorder
65477685427System and method for loading digital watermarks automatically
65487685426Managing and indexing content on a network with image bookmarks and digital watermarks
65497685425Server computer for guaranteeing files integrity
65507685424Validating untrusted objects and entities
65517685423Validation protocol and system
65527685421System and method for initializing operation for an information security operation
65537685420Cookie-based mechanism providing lightweight authentication of layer-2 frames
65547685247System for publishing and converting messages from identified, authorized senders
65557685246Control of an instant message system that allows multiple clients with identical credentials
65567684569Electronic device control system and method and electronic device, and control apparatus
65577681242Allocation of network resources
65587681240Trusted storage systems and methods
65597681228Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions
65607681044Secure processor and system
65617681040Method for embedding security codes into film during printing
65627681039Collusion-resistant watermarking and fingerprinting
65637681038Method and system for facilitating packet-based communications
65647681037Network connection system
65657681035Digital rights management handler and related methods
65667681032System and method for monitoring unauthorized transport of digital content
65677680269Method for ciphering a compressed audio or video stream with error tolerance
65687676846Binding content to an entity
65697676843Executing applications at appropriate trust levels
65707676833Login screen with identifying data
65717676831Role-based access control management for multiple heterogeneous application components
65727676680Systems and methods for distributing private placement documents
65737676679Method for self-synchronizing time between communicating networked systems using timestamps
65747676677Digital signature method and apparatus
65757676676Method and apparatus for performing mutual authentication within a network
65767676675Architecture for connecting a remote client to a local client desktop
65777676037Cryptographic method capable of protecting elliptic curve code from side channel attacks
65787674298Method and apparatus for implementing a handheld security system
65797673333Flexible method of security data backup
65807673332Method and system for access authentication
65817673329Method and apparatus for encrypted communications to a secure server
65827673328Network authentication system using individual services providers and an authentication server
65837673327Aggregation system
65847673288Bypassing execution of a software test using a file cache
65857673155Microprocessor with improved task management and table management mechanism
65867673143JXTA rendezvous as certificate of authority
65877673141Client authentication using a challenge provider
65887673139Protecting administrative privileges
65897673135Request authentication token
65907672474Electronic watermark embedding device, electronic watermark detection device, method thereof, and program
65917672457Computer-readable recording medium recording a wireless communication authentication program
65927669243Method and system for detection and neutralization of buffer overflow attacks
65937669233Methods and systems for secure transmission of identification information over public networks
65947669230Secure switching system for networks and method for securing switching
65957669229Network protecting authentication proxy
65967669227Information management system
65977669226Generic declarative authorization scheme for Java
65987669059Method and apparatus for detection of hostile software
65997669056Method and apparatus for measuring presentation data exposure
66007669053System and method for using acoustic digital signature generator as oracle
66017668945Network booting using a platform management coprocessor
66027668920Electronic message and data tracking system
66037668335Communication device, digital signature verification method and digital signature generation method
66047665141Origin and custody of copies from a stored electronic record verified page by page
66057665125System and method for distribution of security policies for mobile devices
66067665124Authentication device
66077664964Electronic media communication apparatus
66087664960Password enhancing device
66097664959Method, apparatus and article for off-line certification in mobile applications
66107664957Digital signatures including identity-based aggregate signatures
66117664954Providing apparatus, providing method, communication device, communication method, and program
66127664953Data processing device, method of same, and program of same
66137664952Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method
66147664951Transmitting apparatus for providing information by effective use of bands
66157664947Systems and methods for automated exchange of electronic mail encryption certificates
66167664264Utilizing data reduction in steganographic and cryptographic systems
66177664262Playback apparatus and playback control method
66187664261Encryption processor
66197664021Recording and reproducing apparatus and file transfer method
66207661589Security management software, print control device, and security management method of print control device
66217661132Tag privacy protection method, tag device, backend apparatus, updater, update solicitor and record medium carrying such programs in storage
66227661129Secure traversal of network components
66237661128Secure login credentials for substantially anonymous users
66247661126Systems and methods for authenticating a user interface to a computer user
66257660992Electronic data storage system and method thereof
66267660991Embedding, processing and detection of digital content, information and data
66277660989System for, and method of, authenticating an electronic message to a recipient
66287660988Electronic notary
66297660986Secure control of security mode
66307660981Verifiable chain of transfer for digital documents
66317660429Error diffusion halftone watermarking
66327660418Cryptographic system and method for geolocking and securing digital information
66337657945Systems and arrangements to adjust resource accessibility based upon usage modes
66347657932Extendible security token management architecture and secure message handling methods
66357657926Enabling network communication from role based authentication
66367657756Secure memory caching structures for data, integrity and version values
66377657755Modular cryptographic device providing status determining features and related methods
66387657751Efficient and secure data currentness systems
66397657749Communication scheme using outside DTCP bridge for realizing copyright protection
66407657746Supporting statements for credential based access control
66417657745Secure electronic transfer without requiring knowledge of secret data
66427657743Information viewing/listening system
66437657742Content reproducing apparatus authenticating detachable recording medium and authentication control method
66447657738List signature method and application to electronic voting
66457656794Method and apparatus for authenticated quality of service reservation
66467653945Interactive key control system and method of managing access to secured locations
66477653931System and method for user login and tracking
66487653818System and method for user authentication with enhanced passwords
66497653816E-mail certification service
66507653815System and method for processing encoded messages for exchange with a mobile data communication device
66517653814System and method for securely hyperlinking graphic objects
66527653813Method and apparatus for address creation and validation
66537653812Method and system for evaluating confidence in a sending domain to accurately assign a trust that a communication is not unwanted
66547650643Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network
66557650638Network security monitoring system employing bi-directional communication
66567650632Password management
66577650631Method for verifying authorization with extensibility in AAA server
66587650629Enhanced trust relationship in an IEEE 802.1.times.network
66597650628Transcription data security
66607650511Information processing method, falsification verification method and device, storage medium, and program
66617650509Encoding data in a password
66627650508Time stamping system
66637650507Small memory footprint fast elliptic encryption
66647650505Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies
66657650504System and method of verifying the authenticity of dynamically connectable executable images
66667650503Memory card
66677650502Method of communications and communication network intrusion protection methods and intrusion attempt detection system
66687649990Apparatus to implement dual hash algorithm
66697649641Printing medium, image forming apparatus, and printing method
66707647644Entitlement designation in web services for remote portlets environment
66717647643Template access control lists
66727647642System and method for managing copyrighted electronic media
66737647639Methods for detecting executable code which has been altered
66747647504Method and system for efficiently retrieving secured data by securely pre-processing provided access information
66757647501Communications apparatus, communications system, and method of setting certificate
66767647499Apparatus and method for ownership verification
66777647496Process-mode independent driver model
66787647494Name transformation for a public key infrastructure (PKI)
66797646883Digital watermark detection method and apparatus
66807646882Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program
66817646874Establishing mutual authentication and secure channels in devices without previous credentials
66827646873Key manager for QKD networks
66837644444Communication device, program and recording media
66847644433Authentication system and method based upon random partial pattern recognition
66857644422Interactive service device metering systems
66867644290System and method for seal tamper detection for intelligent electronic devices
66877644285Recovery access to secure data
66887644281Character and vector graphics watermark for structured electronic documents security
66897644280Method and system for linking certificates to signed files
66907644279Consumer product distribution in the embedded system market
66917644278Method for securely creating an endorsement certificate in an insecure environment
66927644274Methods of protecting against spam electronic mail
66937644269Method of controlling access
66947644163Plug and play mobile services
66957644042Managing transaction accounts
66967643652Method and apparatus for embedding watermarks
66977643636Managing multiple cryptographic periods in a single cryptographic group

2009

66987640594Secure storage in a file system
66997640579Securely roaming digital identities
67007640575System and method for determining a security encoding to be applied to outgoing messages
67017640573Generic security claim processing model
67027640435System, method, and apparatus for securely providing content viewable on a secure device
67037640434Identification of undesirable content in responses sent in reply to a user request for content
67047640433MILS network using COTS switches
67057640432Electronic cash controlled by non-homomorphic signatures
67067640431Method and apparatus for digital watermarking
67077640430System and method for achieving machine authentication without maintaining additional credentials
67087640004Wireless LAN system, wireless terminal, wireless base station, communication configuration method for wireless terminal, and program thereof
67097639947System and methods for quantum key distribution over WDM links
67107639835Information processing apparatus and its control method, computer program and storage medium
67117639808Elliptic curve cryptosystem apparatus, elliptic curve cryptosystem method, elliptic curve cryptosystem program and computer readable recording medium storing the elliptic curve cryptosystem program
67127639806Fingerprinting digital devices using electromagnetic characteristics of their communications
67137639799Cryptographically processing data based on a Cassels-Tate pairing
67147636939Endpoint identification and security
67157636937Method and apparatus for comparing access control lists for configuring a security policy on a network
67167636935Method of enforcing a policy on a computer network
67177636854Security device for online transaction
67187636848Method, system, network and computer program product for securing administrative transactions over a network
67197636846Global conditional access system for broadcast services
67207636843Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium
67217636840Secure communications and control in a fueling environment
67227636451Digital watermark embedding apparatus and method, and digital watermark detection apparatus and method
67237636440Digital watermark with variable location
67247636439Encryption method, encryption apparatus, data storage distribution apparatus and data delivery system
67257636438Data medium authentication method
67267636032Active RFID tag with new use automatic updating
67277636030Security layers for wireless industrial control user interface
67287634804Information providing system and method thereof
67297634802Secure method and system for creating a plug and play network
67307634661Manifest-based trusted agent management in a trusted operating system environment
67317634659Roaming hardware paired encryption key generation
67327634658Method for logically binding and verifying a subassembly in equipment
67337634657Reducing the probability of undetected collisions in hash-based data block processing
67347634656Method and apparatus for identifying a voice caller
67357634655Efficient hash table protection for data transport protocols
67367634653Event-ordering certification method
67377634579Method and system for interpreting and displaying time data received from a server management device
67387633375Information security system, its server and its storage medium
67397631346Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment
67407631345Relay device, authentication server, and authentication method
67417631344Distributed authentication framework stack
67427631343Down-line transcription system using automatic tracking and revenue collection
67437631193Tokenless identification system for authorization of electronic transactions and electronic transmissions
67447631192Network apparatus for accessing services over a network
67457631191System and method for authenticating a web page
67467631190Use of variant and base keys with two entities
67477631189Information recording device, information reproducing device, information recording medium, method, and computer program
67487631188Hierarchical open security information delegation and acquisition
67497631186Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofing
67507631185File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
67517631184System and method for imposing security on copies of secured items
67527631183System and method for retrieving related certificates
67537630512Method for performing recoverable video and image watermarking which survives block-based video and image compression
67547630386Method for providing broadband communication service
67557627901Systems and methods for improved media access control
67567627895Trust tokens
67577627892Multiple methods for transacting, publishing and purchasing copyrighted digital content
67587627765Document management apparatus and document management method, and storage medium storing program
67597627761System for authentication of JPEG image data
67607627760Extended authenticated key exchange
67617627758Method and system for performing a security check
67627627757Message service indication system and method
67637627753Secure digital data format and code enforced policy
67647627126Systems and methods for implementing path length control for quantum cryptographic systems
67657626940System and method for integrated header, state, rate and content anomaly prevention for domain name service
67667624441CA in a card
67677624439Authenticating resource requests in a computer system
67687624435Method and apparatus for managing digital assets
67697624431802.1X authentication technique for shared media
67707624428Apparatus and method for platform-independent identity manageability
67717624425Method and apparatus for generating a security document for a farm in a utility computing environment
67727624424Access control system, access control method, and access control program
67737624275Disk drive, control method thereof and disk-falsification detection method
67747624274Decreasing the fragility of duplicate document detecting algorithms
67757624271Communications security
67767624267SIM-based authentication method capable of supporting inter-AP fast handover
67777624265Methods and apparatus for establishing communications with a data storage system
67787624264Using time to determine a hash extension
67797623022Securing electronic annotations
67807620977System and method for improved managing of profiles in a web portal environment
67817620824Data communicating apparatus, data communicating method, and program
67827620823Smart cards having protection circuits therein that inhibit power analysis attacks and methods of operating same
67837620815Credential production using a secured consumable supply
67847620814System and method for distributing data
67857620813Method to authenticate a data processing apparatus having a recording device and apparatuses therefor
67867620198Watermark coding method and recording medium thereof
67877617538Configuration information protection using cost based analysis
67887617521Charging via policy enforcement
67897617402Copyright protection system, encryption device, decryption device and recording medium
67907617397Systems and methods for generation and validation of isogeny-based signatures
67917617396Method and apparatus for watermarking binary computer code with modified compiler optimizations
67927617394Authentication system
67937614558Document correction detection system and document tampering prevention system
67947614078Threshold access based upon stored credentials
67957614047Change indication for a service offering
67967613924Encrypted and other keys in public and private battery memories
67977613919Single-use password authentication
67987613448Web access providing system
67997613299Cryptographic techniques for a communications network
68007612680First aid information for cellular telephones and electronic devices
68017612651Communication system, communication method and program
68027610629Access control apparatus, access control method, and access control program
68037610617Authentication system for networked computer applications
68047610612Data transmission method, a data transmission program and a data transmission server
68057610611Prioritized address decoder
68067610493System and methods for adapting to attacks on cryptographic processes on multiprocessor systems with shared cache
68077610488Data processing device and method and program of same
68087610487Human input security codes
68097609848Multi-stage watermarking process and system
68107607147Interactive service device metering systems
68117607139Quiescence mode for a portal
68127607026Standalone memory device and system and method using such device
68137607019Small memory footprint fast elliptic encryption
68147607017Embedding data in material
68157607016Including a metric in a digital watermark for media authentication
68167607014Authenticating maintenance access to an electronics unit via wireless communication
68177607012Method for securing a communication
68187606389Digital watermarking apparatus and computer-readable medium
68197606361Sending a message securely over an insecure channel
68207603702Method and device for identifying user-selected equipment
68217603701Tools for access to databases via internet protocol networks
68227603700Authenticating a client using linked authentication credentials
68237603698Image forming apparatus and image forming method
68247603697Method and system for securely delivering authentication-related data
68257603567Information processing system and information processing method
68267603566Authenticated process switching on a microprocessor
68277603565Apparatus and method for authenticating access to a network resource
68287603562System and method for reducing memory requirements of firmware
68297603561Methods and apparatus for input of coded image data
68307603560Method and apparatus for digital signature authentication
68317603559Real-time signature embedding in video
68327603558Montgomery transform device, arithmetic device, IC card, encryption device, decryption device and program
68337603557Communication device, communication system and authentication method
68347603556Challenge response-based device authentication system and method
68357603554Encryption communication system
68367603550Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path
68377602817Low deviation field modulation for transfer of information
68387602731System and method for integrated header, state, rate and content anomaly prevention with policy enforcement
68397600263Access controlled search results
68407600258Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using fictitious buddies
68417600255Preventing network denial of service attacks using an accumulated proof-of-work approach
68427600253Entity correlation service
68437600251Universal peer-to-peer game download
68447600134Theft deterrence using trusted platform module authorization
68457600130Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks
68467600129Controlling access using additional data
68477600128Two-factor computer password client device, system, and method
68487600127System and method for ISO image update and ISO image deconstruction into modular components
68497600126Efficient processing of time-bounded messages
68507600125Hash-based data block processing with intermittently-connected systems
68517600124Method of and system for associating an electronic signature with an electronic record
68527600123Certificate registration after issuance for secure communication
68537600121Message security
68547600119Data update system, data update method, data update program, and robot system
68557600113Secure network channel
68567599515Wireless communication method and apparatus for generating, watermarking and securely transmitting content
68577599495Content delivery service providing apparatus and content delivery service terminal unit
68587599289Electronic communication control
68597597265Method and system for vascular scan recognition with a smartcard
68607596703Hidden data backup and retrieval for a secure device
68617596700Method and system for establishing trusting environment for sharing data between mutually mistrusting entities
68627596699Battery authentication system
68637596698Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium
68647596697Technique for providing multiple levels of security
68657596222Encrypting data for access by multiple users
68667594273Network security system having a device profiler communicatively coupled to a traffic monitor
68677594265System for preventing unauthorized access to sensitive data and a method thereof
68687594263Operating a communication network through use of blocking measures for responding to communication traffic anomalies
68697594261Cryptographic applications of the Cartier pairing
68707594236Thread to thread communication
68717594124Cross validation of data using multiple subsystems
68727594122Method of determining whether a test subject is a specific individual
68737594120User-defined passwords having associated unique version data to assist user recall of the password
68747594116Mediated key exchange between source and target of communication
68757594115Contents information output system and contents information output method
68767594113Identification information protection method in WLAN inter-working
68777594108Operator root certificates
68787593717Authenticating access to a wireless local area network based on security value(s) associated with a cellular system
68797593529Scramble methods and apparatus for packetized digital video signal in conditional access system
68807593527Providing digital signature and public key based on shared knowledge
68817593343Method and apparatus for monitoring and the prevention of call storms in a communications network
68827591013System and method for client initiated authentication in a session initiation protocol environment
68837591008Client authentication using multiple user certificates
68847591006Security for external system management
68857591005Method and apparatus for user log-in name mapping
68867591004Using trusted communication channel to combat user name/password theft
68877591001System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection
68887590865Method and apparatus for restriction use of storage medium using user key
68897590859System and method for accomplishing two-factor user authentication using the internet
68907590858Authentication apparatus, user authentication method, user authentication card and storage medium
68917590855Steganographically authenticated packet traffic
68927590854Hierarchical identity-based encryption and signature schemes
68937590850Digital signature method based on identification information of group members, and method of acquiring identification information of signed-group member, and digital signature system for performing digital signature based on identification information of group members
68947590849Method and control program for operating a communication terminal for packet-oriented data transmission
68957590846Public key cryptographic method of protecting an electronic chip against fraud
68967590844Decryption system and method for network analyzers and security programs
68977590842Service providing system and authentication system, as well as signature generating apparatus, service utilizing apparatus and verification apparatus
68987590247System and method for reusable efficient key distribution
68997590241Receiver and receiving method
69007590236Identity-based-encryption system
69017587750Method and system to support network port authentication from out-of-band firmware
69027587617Data repository and method for promoting network storage of data
69037587614Encryption algorithm optimized for FPGAs
69047587613Method and apparatus for selectively enabling a microprocessor-based system
69057587603Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
69067587600Loading data onto an electronic device
69077587599System and method for providing services
69087587598Interlayer fast authentication or re-authentication for network communication
69097587596Method and apparatus for updating information stored in multiple information handling systems
69107587062Watermarking
69117587045System and method for securing document transmittal
69127586641System for certifying whether printed material corresponds to original
69137584510Network service processing method and system
69147584504Embedding a security support provider interface in a communication class library
69157584500Pre-fetching secure content using proxy architecture
69167584482System and method for authenticating transactions
69177584362Systems and methods for providing signatures
69187584361Encoding and detecting apparatus
69197584357Control device for creating one-time password using pre-input button code, home server for authenticating control device using one-time password, and method for authenticating control device with one-time password
69207584355Authentication service schemes
69217583801Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data
69227581242Authenticating products
69237581117Method for secure delivery of configuration data for a programmable logic device
69247581116Device control support information acquisition
69257581113System and method for generating and authenticating a computer password
69267581110Key distribution for encrypted broadcast data using minimal system bandwidth
69277581108Method and system for generating time-based identifiers
69287581107Anonymity revocation
69297581104Image watermaking method using human visual system
69307581103Software self-checking systems and methods
69317581102Certificate confirmation method, certificate confirmation program and certificate that can readily and more positively confirm authenticity of certificate
69327581100Key generation method for communication session encryption and authentication system
69337581096Method, apparatus, and program product for automatically provisioning secure network elements
69347581012Virtual communication channel and virtual private community, and agent collaboration system and agent collaboration method for controlling the same
69357580859Intelligent transaction router and process for handling multi-product point of sale transactions
69367577990Method and system for resolving disputes between service providers and service consumers
69377577987Operation modes for user authentication system based on random partial pattern recognition
69387577985Trusted handler and data association
69397577845Information matrix cryptogram
69407577842Methods of scrambling and unscrambling a video signal, a system, an encoder, a decoder, a broadcast server, and a data medium for implementing the methods
69417577838Hybrid systems for securing digital assets
69427577834Message authentication using message gates in a distributed computing environment
69437577272Digital fingerprinting using synchronization marks and watermarks
69447574747Proximity detection employed in connection with rights management system or the like
69457574744System and method for securely duplicating digital documents
69467574739Password authenticating apparatus, method, and program
69477574733System and method of using the public switched telephone network in providing authentication or authorization for online transaction
69487574732Object location based security using RFID
69497574731Self-managed network access using localized access management
69507574607Secure pipeline processing
69517574602Information-processing device, information-processing method, and information-processing program product
69527574601Securely inspecting electronic messages
69537574535Prevention of inadvertent data synchronization to and from removable memory sources on a handheld connected device
69547571472Methods and apparatus for credential validation
69557571471Secure login using a multifactor split asymmetric crypto-key with persistent key security
69567571469Method for communication control in a communication network, communication control entity, key management entity, terminal and gateway entity
69577571466Parental consent service
69587571464Secure bidirectional cross-system communications framework
69597571462Information processing apparatus, transfer program product, and transfer control method
69607571461Personal website for electronic commerce on a smart Java card with multiple security check points
69617571326Relative latency dynamics for identity authentication
69627571325Remote identification of blocked websites while maintaining user privacy
69637571321Identity-based-encryption messaging system
69647571314Method of assembling authorization certificate chains
69657571313Authentication for Ad Hoc network setup
69667571311Scheme for sub-realms within an authentication protocol
69677570762Content delivery service providing apparatus and content delivery service terminal unit
69687570759System and method for secure encryption
69697568237Access control list with convolution-weakened authorization
69707568235Controlling data access using security label components
69717568226Data processing system and method
69727568222Standardized transmission and exchange of data with security and non-repudiation functions
69737568221Information processing system, information processing apparatus and method
69747568218Selective cross-realm authentication
69757568113Reliable storage medium access control method and device
69767568101Digital signatures with an embedded view
69777567670Verification information for digital video signal
69787565699System and method for detecting computer port inactivity
69797565552Method for protecting against manipulation of a controller for at least one motor vehicle component and controller
69807565551Enhancing software integrity through installation and verification
69817565550Automatic registration of a virus/worm monitor in a distributed network
69827565547Trust inheritance in network authentication
69837565545Method, system and program product for auditing electronic transactions based on biometric readings
69847565538Flow token
69857565536Method for secure delegation of trust from a security device to a host computer application for enabling secure access to a resource on the web
69867565532Secure file system server architecture and methods
69877565529Secure authentication and network management system for wireless LAN applications
69887565528Method for generating asymmetrical cryptographic keys by the user
69897565464Programmable transaction initiator architecture for systems with secure and non-secure modes
69907565297Method and apparatus for the secure identification of the owner of a portable device
69917564976System and method for performing security operations on network data
69927562384Method and apparatus for providing a secure name resolution service for network devices
69937562232System and method for providing manageability to security information for secured items
69947562229Codeword-based auditing of computer systems and methods therefor
69957562221Authentication method and apparatus utilizing proof-of-authentication module
69967559090Memory, information apparatus for access to the memory, and method for the information apparatus
69977559085Detection for deceptively similar domain names
69987559084Authentication information processing method
69997559083Method and apparatus for generating secured attention sequence
70007559081Method and apparatus for authenticating a user at an access terminal
70017558968Information processing apparatus and method
70027558966Notifying remote administrator of platform integrity determination
70037558963Communication device and program
70047558959Collusion-resistant watermarking and fingerprinting
70057558387Gathering randomness in a wireless smart card reader
70067558253Method and system for disrupting undesirable wireless communication of devices in computer networks
70077555787IC intrusion detection
70087555784Method and system for safely disclosing identity over the internet
70097555783Wireless network credential provisioning
70107555781Security component for a computing device
70117555780Information security method and system
70127555779Copyright protection system, recording device, and reproduction device
70137555775Recovering from device failure
70147555771System and method for grouping device or application objects in a directory service
70157555770Method and system for controlling access to database information
70167555657Communication device, software update device, software update system, software update method, and program
70177555654Apparatus, transponder, computer program product and method for enabling an active part of a computer program
70187555652Method for user attestation signatures with attributes
70197555126Game apparatus managing system, game apparatus, controlling method, computer program and recording medium
70207555121Methods and apparatus for implementing a cryptography engine
70217552470Generic security infrastructure for COM based systems
70227552468Techniques for dynamically establishing and managing authentication and trust relationships
70237552467Security systems for protecting an asset
70247552465Method and apparatus for time-based communications port protection
70257552341Licensing the use of software on a particular CPU
70267552332Java based electronic signature capture method, device and system
70277552331Secure media path methods, systems, and architectures
70287552325Methods, systems, and products for intrusion detection
70297551913Methods and apparatus for anonymous user identification and content personalization in wireless communication
70307549172Data processing apparatus for digital copyrights management
70317549170System and method of inkblot authentication
70327549062Organization-based content rights management and systems, structures, and methods therefor
70337549061Unauthorized contents detection system
70347549058Method and apparatus for encrypting and decrypting digital data
70357549047Method and system for securely sharing files
70367549046Method and system for vehicle authorization of a service technician
70377549043Providing certificate matching in a system and method for searching and retrieving certificates
70387548665Method, systems, and media for identifying whether a machine readable mark may contain sensitive data
70397548633Data processing apparatus and method, data processing program, and storage medium
70407546641Conditional access to digital rights management conversion
70417546640Fine-grained authorization by authorization table associated with a resource
70427546639Protection of information in computing devices
70437546634Encryption removable storage system
70447546633Role-based authorization management framework
70457546632Methods and apparatus to configure a network device via an authentication protocol
70467546631Embedded management system for a physical device having virtual elements
70477546630Methods, systems, and media to authenticate a user
70487546453Certificate management and transfer system and method
70497545943Apparatus, method, and computer program product for playing back content
70507543337System and method for automatic verification of the holder of an authorization document and automatic establishment of the authenticity and validity of the authorization document
70517543317Service activation of set-top box functionality using broadcast conditional access system
70527543160System and method for generating a secure state indicator on a display
70537543154Method and device for determining an access code
70547543153Digital signature generating apparatus, method, computer program and computer-readable storage medium
70557543145System and method for protecting configuration settings in distributed text-based configuration files
70567543141Method and apparatus for user authentication using infrared communication of a mobile terminal
70577542570Information encryption transmission/reception method
70587542468Dynamic host configuration protocol with security
70597540028Dynamic network security apparatus and methods or network processors
70607540021System and methods for an identity theft protection bot
70617540017Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor
70627540014Automated policy change alert in a distributed enterprise
70637539877Data management apparatus, data management method and computer program
70647539869System and methods for using a signature protocol by a nonsigning client
70657539864Methods and portable device for digitally signing data
70667539857Cooperative processing and escalation in a multi-node application-layer security system and method
70677539855Server-based cryptography
70687536722Authentication system for two-factor authentication in enrollment and pin unblock
70697536721Low cost secure ID card and system
70707536718Method and system for controlling software loads on a third-party mobile station
70717536713Knowledge broadcasting and classification system
70727536712Flexible electronic message security mechanism
70737536710Application-backed groups in a common address book
70747536559Method and apparatus for providing secure programmable logic devices
70757536558Flash memory distribution of digital content
70767536550Image forming apparatus and control method for same
70777536543System and method for authentication and authorization using a centralized authority
70787536436Reliable messaging using clocks with synchronized rates
70797536016Encrypted content data structure package and generation thereof
70807533422Platform independent zero footprint decompression
70817533418Tokens for contact information
70827533411Order-based human interactive proofs (HIPs) and automatic difficulty rating of HIPs
70837533408Portable computing system, apparatus and method
70847533273Method and system for controlling an encryption/decryption engine using descriptors
70857533257Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access
70867532720Utilizing SIMD instructions within montgomery multiplication
70877530117Method and apparatus for preventing unauthorized use of software
70887530113Security system and method for an industrial automation system
70897530112Method and apparatus for providing network security using role-based access control
70907530110System and method for fuzzy multi-level security
70917530101Method and system for managing network access device using a smart card
70927530094Method and apparatus for facilitating single sign-on of an application cluster
70937529946Enabling bits sealed to an enforceably-isolated environment
70947529945Installing software in a system
70957529944Support for multiple login method
70967529925System and method for distributing keys in a wireless network
70977526811Methods for detecting executable code which has been altered
70987526804Hardware assist for pattern matches
70997526799Method for tracking security attributes along invocation chain using secure propagation token
71007526798System and method for credential delegation using identity assertion
71017526793Method for authenticating database connections in a multi-tier environment
71027526789System for the transmission of audiovisual signals between source nodes and destination nodes
71037526658Scalable, distributed method and apparatus for transforming packets to enable secure communication between two stations
71047526654Method and system for detecting a secure state of a computer system
71057526649Session key exchange
71067526084Secure classifying of data with Gaussian distributions
71077523498Method and system for monitoring personal computer documents for sensitive data
71087523495Methods and systems for IC card application loading
71097523490Session key security protocol
71107523489Smart card application system and method
71117523488Method for performing data access transformation with request authorization processing
71127523487Decentralized virus scanning for stored data
71137523484Systems and methods of controlling network access
71147523307Method for ensuring content protection and subscription compliance
71157523302Electronic recipe management
71167523281Authenticating hardware for manually enabling and disabling read and write protection to parts of a storage disk or disks for users
71177523069Assessing and/or determining of user authorizations using a transponder, a finger print recognition routine or the like
71187520002Method for manipulation identification on a sensor
71197519992Access control system, device, and program
71207519988Method and apparatus for authenticated network address allocation
71217519987Method, system, and apparatus to allow for credential vault usage in templated portal applications
71227519986Method and apparatus for network security using a router based authentication system
71237519834Scalable method and apparatus for transforming packets to enable secure communication between two stations
71247519831High speed cryptographic system with modular architecture
71257519826Near real-time multi-party task authorization access control
71267519822Method and apparatus for processing descriptive statements
71277519820Image forming system and image forming method
71287519813System and method for a sidecar authentication mechanism
71297516496Identifying unauthorized communication systems based on their memory contents
71307516484Reader adapted for a portable computer
71317516483System and method for accomplishing two-factor user authentication using the internet
71327516479Data communicating apparatus and method for managing memory of data communicating apparatus
71337516475Method and apparatus for managing security policies on a network
71347516331Tamper-resistant trusted java virtual machine and method of using the same
71357516227Method and apparatus for network deception/emulation
71367515710Federated digital rights management scheme including trusted systems
71377512989Data loader using location identity to provide secure communication of data to recipient devices
71387512985System, method, and computer program product for implementing search-and retrieval-compatible data obfuscation
71397512984Distributed and scalable instant multimedia communication system
71407512975Hardware-assisted credential validation
71417512973Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content
71427512971Method and system for enabling remote access to a computer system
71437512970Host credentials authorization protocol
71447512969System and method for detecting and reporting cable network devices with duplicate media access control addresses
71457512967User authentication in a conversion system
71467512812Method of securely erasing data and hard disk drive using the same
71477512810Method and system for protecting encrypted files transmitted over a network
71487512808Anti-computer viral agent suitable for innoculation of computing devices
71497512807Method and apparatus for biometric verification with data packet transmission prioritization
71507512805Machine readable medium and method for data storage security
71517512804Data storage security apparatus and system
71527512800Key management technique for establishing a secure channel
71537512799System and method for accessing a remote server from an intranet with a single sign-on
71547512796Authentication in a packet data network
71557512786Client-side boot domains and boot rules
71567510474Location based mobile wagering system
71577509687Remotely authenticated operation method
71587509686Method for providing computer-based authentication utilizing biometrics
71597509683System and method for authenticating digital content
71607509677Pattern discovery in a network security system
71617509501Cryptographic apparatus for supporting multiple modes
71627509500Random number generation for encrypting cellular communications
71637508938Method and apparatus for generating and using a tamper-resistant encryption key
71647508936Hardware accelerator for elliptic curve cryptography
71657506376Copy protection method for digital media
71667506366Integrating workstation computer with badging system
71677506364Integrated access authorization
71687506360Tracking communication for determining device states
71697506359Method for preventing parasitic usage of web page embedded files
71707506177Tamper resistant software encoding and analysis
71717506176Encryption mechanism on multi-core processor
71727506162Methods for more flexible SAML session
71737506158Certificate reissuance for checking the status of a certificate in financial transactions
71747505586Method for computer-based encryption and decryption of data
71757503074System and method for enforcing location privacy using rights management
71767503073Information managing apparatus and method, recording medium, and program
71777503067Preset security levels
71787503065Method and system for gateway-based authentication
71797503061Secure resource access
71807502942System and method for authentication of embedded raid on a motherboard having input/output processor
71817502467System and method for authentication seed distribution
71827502466System and method for secure communication of electronic documents
71837501946Electronic control system used in security system for cargo trailers
71847500267Systems and methods for disabling software components to protect digital media
71857500263Methods and systems for accessing networks, methods and systems for accessing the Internet
71867500108Metered execution of code
71877500107Log-in security device
71887500106Method for identifying, authenticating and authorizing a user of protected data
71897499999Security apparatus and method for local area networks
71907499550System and method for protecting a title key in a secure distribution system for recordable media content
71917496965Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system, and data communication system
71927496961Methods and apparatus to provide network traffic support and physical security support
71937496959Remote collection of computer forensic evidence
71947496952Methods for authenticating a user's credentials against multiple sets of credentials
71957496951Network apparatus and control method therefor
71967496950Secure remote management appliance
71977496949Network system, proxy server, session management method, and program
71987496948Method for controlling access to a target application
71997496768Providing secure input and output to a trusted agent in a system with a high-assurance execution environment
72007496767Secure content objects
72017496766Apparatus, method, and program product for secure data formatting and retriving, and computer readable transportable data recording medium storing the program product
72027496765System, method and program product to prevent unauthorized access to portable memory or storage device
72037496764Data transmission method between a local server and local peripherals
72047496762Security architecture for modified segregated environment for federal telecom services
72057496761Method and system for batch task creation and execution
72067496752System and method for controlling communication using device ID
72077496198Partial dual encrypted stream utilizing program map tables
72087493659Network intrusion detection and analysis system and method
72097493656Drive security session manager
72107493652Verifying location of a mobile node
72117493495Biometrics interface
72127492747Secure patch installation for WWAN systems
72137490250Method and system for detecting a tamper event in a trusted computing environment
72147490246Method for encryption of data based on an iteration of a stored encryption key
72157490245System and method for data processing system planar authentication
72167490237Systems and methods for caching in authentication systems
72177490149Security management apparatus, security management system, security management method, and security management program
72187487550Methods, apparatus and computer programs for processing alerts and auditing in a publish/subscribe system
72197487540Method of, and system for, replacing external links in electronic documents
72207487537Method and apparatus for pervasive authentication domains
72217487536Apparatus and method for applying revision information to software
72227487535Authentication on demand in a distributed network environment
72237487363System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage
72247487361Dynamic cache lookup based on dynamic data
72257487357Virtual smart card system and method
72267487350Fixed client identification system for positive identification of client to server
72277484247System and method for protecting a computer system from malicious software
72287484242Enabling user control over automated provisioning environment
72297484241Secure single sign-on to operating system via power-on password
72307484238Method and apparatus for configuration management of computer system
72317484107Method for selective encryption within documents
72327484106Pre-login data access
72337484105Flash update using a trusted platform module
72347484098Data non repudiation
72357484097Method and system for communicating data to and from network security devices
72367483950System and method for providing secure message signature status and trust status indication
72377483943Reliable messaging using clocks with synchronized rates
72387480937Agent device, image-forming-device management system, image-forming-device management method, image-forming-device management program, and storage medium
72397480935Method for protecting subscriber identification between service and content providers
72407480932Authentication information processing method, program, and device
72417480931Volume mount authentication
72427480806Multi-token seal and unseal
72437478421System and method for role based access control of a document processing device
72447478420Administration of protection of data accessible by a mobile device
72457478250System and method for real-time detection of computer system files intrusion
72467478237System and method of allowing user mode applications with access to file data
72477478236Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure
72487478235Methods and systems for protecting data in USB systems
72497475430Data recording apparatus
72507475420Detecting network proxies through observation of symmetric relationships
72517475353World wide web receiving display station with a web browser generating a graphical user interface with a universal web site logoff button enabling a browser routine for user logoff from selected web sites
72527475257System and method for selecting and using a signal processor in a multiprocessor system to operate as a security for encryption/decryption of data
72537475252System, method and program to filter out login attempts by unauthorized entities
72547475244Wireless communication device, portable terminal, communication control program and communication system
72557475242Controlling the distribution of information
72567475239Pluggable trust adapter architecture, method and program product for processing communications
72577474748Modular inversion that is protected against espionage

2008

72587472417System for detection and indication of a secure status of appliances
72597472412Network configuration manager
72607472286Selectively authorizing software functionality after installation of the software
72617472269System and method for strong authentication achieved in a single round trip
72627471479System for protection against copying on magnetic tape recorders
72637469420Key transport tamper protection
72647469339Secure multiple application card system and process
72657469338System and method for cryptographic control of system configurations
72667469337System and method for computer storage security
72677469263Content management system for archiving data, managing histories, validity of content registration certification wherein the management device encrypts the content in response to a content storage, encrypts the encryption key with the media ID
72687469049Data dependent scrambler with reduced overhead
72697467417Active verification of boot firmware
72707467413Method and apparatus for accessing session data
72717467412Data transfer system, data transfer program and video server system
72727467411Protecting a service provider from abuse
72737467404System and method for distributing software licenses
72747467403Techniques for entry of less-than-perfect-passwords
72757467402Automated login session extender for use in security analysis systems
72767467401User authentication without prior user enrollment
72777467304System, device, and method of selectively allowing a host processor to access host-executable code
72787467302Secure connection mechanism capable of automatically negotiating password between wireless client terminal and wireless access terminal
72797466826Method of secure transmission of digital data from a source to a receiver
72807464402Authentication of network users
72817464401Secure web access via an original CD
72827464400Distributed environment controlled access facility
72837464398Queuing methods for mitigation of packet spoofing
72847464270Application identification and license enforcement
72857464162Systems and methods for testing whether access to a resource is authorized based on access information
72867461407Debugging port security interface
72877461400Methods, systems, and computer program products for providing authentication in a computer environment
72887461398Methods, systems, and computer program products for dynamic management of security parameters during a communications session
72897461396System and method for providing a secure environment for performing conditional access functions for a set top box
72907461270Methods and systems for promoting security in a computer system employing attached storage devices
72917461268E-fuses for storing security version data
72927461265System and method for single sign on process for websites with multiple applications and services
72937461264Method for automatic identification control and management
72947461261Method to generate, verify and deny an undeniable signature
72957461257System for detecting spoofed hyperlinks
72967461254Broadband certified mail
72977461253Method and apparatus for providing a key for secure communications
72987461252Authentication method, program for implementing the method, and storage medium storing the program
72997461250System and method for certificate exchange
73007461140Method and apparatus for identifying IPsec security policy in iSCSI
73017458102Information security architecture for remote access control using non-bidirectional protocols
73027458101Information viewing/listening system, information player, and information provider
73037458098Systems and methods for enhancing electronic communication security
73047457958System for detecting authentic e-mail messages
73057457953Method and apparatus to provide secure communication
73067457950Managed authentication service
73077454793Method for controlling the opening and transmission of electronic data on electronic communication devices
73087454784System and method for identity verification
73097454782Method and system for camouflaging access-controlled data
73107454781Method enabling multiple sessions and applications in instant messaging and presence service
73117454779Method, system and computer program for controlling access in a distributed data processing system
73127454778Enforcing rights management through edge email servers
73137454626Transmitting/receiving apparatus and a transmitting/receiving method
73147454625Method and apparatus for protecting a calculation in a cryptographic algorithm
73157454617Apparatus for validating the presence of an authorized accessory
73167454427Autonomic control of a distributed computing system using rule-based sensor definitions
73177453840Containment of rogue systems in wireless network environments
73187451492Portable information terminal, and electronic information authenticating system and method using same terminal
73197451491Method and a device for allowing only a specific kind of hardware to correctly execute software
73207451490Media data protection with secure installer
73217451483VLAN router with firewall supporting multiple security layers
73227451479Network apparatus with secure IPSec mechanism and method for operating the same
73237451478Time managing system and method
73247451477System and method for rule-based entitlements
73257451327Method for securing software via late stage processor instruction decryption
73267451326Method and apparatus for processing arbitrary key bit length encryption operations with similar efficiencies
73277451322User authentication method using password
73287451308Method and system to automatically evaluate a participant in a trust management infrastructure
73297450719Gigabit Ethernet-based passive optical network and data encryption method
73307450554Method for establishment of a service tunnel in a WLAN
73317448087System for preventing unauthorized use of recording media
73327448082Method for defining and checking a connection establishment authorisation, associated program data packet, associated device and associated program
73337448075Method and a system for authenticating a user at a network access while the user is making a connection to the Internet
73347448072Techniques for performing UMTS (Universal Mobile Telecommunications System) authentication using SIP (Session Initiation Protocol) messages
73357448071Dynamic downloading of keyboard keycode data to a networked client
73367447880Processor with internal memory configuration
73377447498User-assisted programmable appliance control
73387444681Security measures in a partitionable computing system
73397444676Direct authentication and authorization system and method for trusted network of financial institutions
73407444523System and method for using address bits to signal security attributes of data in the address space
73417444521System and method for detecting computer virus
73427444513Authentication in data communication
73437444505Method, system and software for maintaining network access and security
73447444476System and method for code and data security in a semiconductor device
73457444404Network traffic regulation including consistency based detection and filtering of packets with spoof source addresses
73467441276Content processing limit method, content processing limit program, and content edition device
73477441122Method for providing secure access to a digital resource
73487441117Group formation/management system, group management device, and member device
73497441116Secure resource distribution through encrypted pointers
73507441020Media plug-in registration and dynamic loading
73517437769Multiple entity control of access restrictions for media playback
73527437761Computer virus generation detection apparatus and method
73537437754Web object access authorization protocol based on an HTTP validation model
73547437753Storage area network (SAN) security
73557437752Client architecture for portable device with security policies
73567437574Method for processing information in an electronic device, a system, an electronic device and a processing block
73577437570Method, system, and program for distributing software between computer systems
73587437568Apparatus and method for establishing trust
73597437556Global visibility controls for operating system partitions
73607437554Method and apparatus for generating queries for secure authentication and authorization of transactions
73617437550System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
73627436959Data recording apparatus and recording method
73637436955Encrypting and decrypting a data stream
73647436552Information processing apparatus, information processing method, and control program
73657434264Data processing system with peripheral access protection and method therefor
73667434263System and method for secure storage data using a key
73677434253User mapping information extension for protocols
73687434252Role-based authorization of network services using diversified security tokens
73697434251System and method for authentication
73707434231Methods and apparatus to protect a protocol interface
73717434066Portable electronic device
73727434065Secure verification using a set-top-box chip
73737434051Method and apparatus for facilitating secure cocktail effect authentication
73747434047System, method and computer program product for detecting a rogue member in a multicast group
73757434044Fast re-authentication with dynamic credentials
73767433472Digital content distribution system
73777430761Command processing system by a management agent
73787430758Prompt authentication
73797428756Access control over dynamic intellectual capital content
73807428755Device that is used for secure diffusion controlled display private copying and management of and conditional access to MPEG-4-type audiovisual content rights
73817428749Secure delegation using public key authorization
73827428747Secure channel reservation
73837428637Dynamic authentication and initialization method
73847426751Recording medium, information transmission method, terminal, server, and recording method
73857426750Network-based content distribution system
73867426748Management mediating device, image processing apparatus, management mediating program, and storing medium storing management mediating program
73877426747Methods and systems for promoting security in a computer system employing attached storage devices
73887426745Methods and systems for transparent data encryption and decryption
73897426643Input device feature
73907426638Controlling access to information on a network using an extended network universal resource locator
73917424745Anti-virus fix for intermittently connected client computers
73927424737Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination
73937424732Card settlement method and system using mobile information terminal
73947424622Microprocessor with improved task management and table management mechanism
73957424621Data protection
73967424620Interleaved data and instruction streams for application program obfuscation
73977424619System and methods for anomaly detection and adaptive learning
73987424616System and method for facilitating access by sellers to certificate-related and other services
73997424034Information converting apparatus
74007421739System and method for monitoring and ensuring data integrity in an enterprise security system
74017421733System and method for providing multi-class processing of login requests
74027421583System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
74037421579Multiplexing a secure counter to implement second level secure counters
74047421078Valid medium management system
74057418737Encrypted data file transmission
74067418601Data transfer control system
74077418600Secure database access through partial encryption
74087418599Deterring theft of media recording devices by encrypting recorded media files
74097418594Mobile unit authenticating method
74107415721Separate authentication processes to secure content
74117415720User authentication system and method for controlling the same
74127415719Policy specification framework for insider intrusions
74137415618Permutation of opcode values for application program obfuscation
74147415617Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
74157415615Method and system for user authentication in a digital communication system
74167415610Facilitating access to information stored on a network using an extended network universal resource locator
74177412727Media streaming home network system and method for operating the same
74187412720Delegated authentication using a generic application-layer network protocol
74197412718Method for bidirectional data transfer
74207412717Access control apparatus, access control method, and access control program
74217412598Method and system for real-time insertion of service during a call session over a communication network
74227412450Method and apparatus for identifying tampering of data in a file system
74237409710Method and system for dynamically generating a web-based user interface
74247409560Certification processing hardware, certification processing system and use management hardware
74257409439Reducing overhead in reverse proxy servers when processing web pages
74267408953Information converting apparatus
74277406604Method for protecting a memory card, and a memory card
74287406603Data protection systems and methods
74297404204System and method for authentication via a single sign-on server
74307404202System, device, and method for providing secure electronic commerce transactions
74317404087System and method for providing improved claimant authentication
74327404086Method and apparatus for biometric authentication
74337404083Image signal analysis for watermark detection and decoding
74347401358Method of controlling access to control registers of a microprocessor
74357401338System and method for an access layer application programming interface for managing heterogeneous components of a storage area network
74367401235Persistent authorization context based on external authentication
74377401233Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing
74387401231Information recording/playback device and method
74397401229Remote access system, remote access method, and medium containing remote access program
74407401224System and method for managing sonic token verifiers
74417401222Method of authentication of memory device and device therefor
74427401218Home device authentication system and method
74437401215Method and apparatus for facilitating cryptographic layering enforcement
74447400725Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein
74457398557Accessing in a rights locker system for digital content access control
74467398550Enhanced shared secret provisioning protocol
74477398544Configurable cableCARD
74487398399Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network
74497398398Authenticated and metered flow control method
74507398393Privacy management of personal data
74517398392Method for using communication channel round-trip response time for digital asset management
74527398311Selective cache flushing in identity and access management systems
74537397916System and method for protecting computer software from a white box attack
74547397817Information converting apparatus
74557395436Methods, software programs, and systems for electronic information security
74567395435Secure memory device for smart cards
74577395433Method and system for sustainable digital watermarking
74587395430Secure authentication using digital certificates
74597395424Method and system for stepping up to certificate-based authentication without breaking an existing SSL session
74607395245Content usage management system and server used in the system
74617394902Encryption apparatus, decryption apparatus and encryption system
74627392538Firewall apparatus
74637392536System and method for unified sign-on
74647392535Access privilege transferring method
74657392534System and method for preventing identity theft using a secure computing device
74667392533System and method for management of a componentized electronic document retrievable over a network
74677392523Systems and methods for distributing objects
74687392399Methods and systems for efficiently integrating a cryptographic co-processor
74697392385Client server system and devices thereof
74707392383Method and apparatus for providing process-based access controls on computer resources
74717389535Password management
74727389428Data processing system, data processing method, and program providing medium
74737389420Content authentication and recovery using digital watermarks
74747386892Method and apparatus for detecting password attacks using modeling techniques
74757386879Broadcast network with interactive services
74767386878Authenticating peer-to-peer connections
74777386877Specifying a repository for an authentication token in a distributed computing system
74787386876MAC address-based communication restricting method
74797383586File system operation and digital rights management (DRM)
74807383576Method and system for displaying and managing security information
74817383575System and method for automatic password reset
74827383570Secure authentication systems and methods
74837383462Method and apparatus for encrypted remote copy for secure data backup and restoration
74847383447Method for controlling database copyrights
74857383445Semiconductor storage device
74867383444Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods
74877383442Nested strong loader apparatus and method
74887383439Apparatus and method for facilitating encryption and decryption operations over an email server using an unsupported protocol
74897383366Keypad user interface and port sequence mapping algorithm
74907382882Secure session set up based on the wireless application protocol
74917380280Rights locker for digital content access control
74927380278Protecting software environment in isolated execution
74937380271Grouped access control list actions
74947380268Methods apparatus and program products for wireless access points
74957380140Providing a protected volume on a data storage device
74967380136Methods and apparatus for secure collection and display of user interface information in a pre-boot environment
74977380134Information recording/reproducing apparatus and method of executing encryption processing
74987380133Anti-cloning method
74997380122Fixed pin array identification apparatus and method
75007380120Secured data format for access control
75017380117Process and streaming server for encrypting a data stream
75027380051System and methods for an overlay disk and cache using portable flash memory
75037376845Method for calculating hashing of a message in a device communicating with a smart card
75047376844Countermeasure method for a microcontroller based on a pipeline architecture
75057376843Remote control of VCR with electronic mail
75067376836Systems and methods for preventing an attack on healthcare data processing resources in a hospital information system
75077376834System and method for securely controlling communications
75087376829Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data
75097376826Methods and apparatus for performing encryption and authentication
75107373672Method for securely managing information in database
75117373671Method and system for user information verification
75127373669Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
75137373668Methods and circuits for protecting proprietary configuration data for programmable logic devices
75147373667Protecting a computer coupled to a network from malicious code infections
75157373666Distributed threat management
75167373658Electronic loose-leaf remote control for enabling access to content from a media player
75177373657Method and apparatus for controlling data and software access
75187373521Semiconductor IC, information processing method, information processing device, and program storage medium
75197373520Method for computing data signatures
75207373519Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis
75217373517System and method for encrypting and decrypting files
75227373506Data authentication system
75237370365Dynamic control of authorization to access internet services
75247370364Managing content resources
75257370346Method and apparatus for access security services
75267370212Issuing a publisher use license off-line in a digital rights management (DRM) system
75277370211Arrangement and method of execution of code
75287370198Total system for preventing information outflow from inside
75297370196Controlled-content recoverable blinded certificates
75307367061Systems, methods, and a storage medium for storing and securely transmitting digital media data
75317367060Methods and apparatus for secure document printing
75327367058Encoding method
75337367054Packet data communications
75347367053Password strength checking method and apparatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof
75357367050Storage device
75367367049System and method for enrolling in a biometric system
75377367048Apparatus and method for autonomic email access control
75387366919Use of geo-location data for spam detection
75397366918Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
75407366917System and method for accessing discrete data
75417366915Digital license with referral information
75427366912Method of identifying participants in secure web sessions
75437366904Method for modifying validity of a certificate using biometric information in public key infrastructure-based authentication system
75447366902System and method for authenticating a storage device for use with driver software in a storage network
75457366898Method and apparatus for performing configuration over a network
75467366896Systems and methods for limiting access to potentially dangerous code
75477366306Programmable logic device that supports secure and non-secure modes of decryption-key access
75487363656Event detection/anomaly correlation heuristics
75497363509Method, system and program product for electronically executing contracts within a secure computer infrastructure
75507363507Device and method of preventing pirated copies of computer programs
75517363506Software virus detection methods, apparatus and articles of manufacture
75527363504Method and system for keystroke scan recognition biometrics on a smartcard
75537363503Method for producing a data structure for use in password identification
75547363498Method and apparatus for facilitating secure distributed content delivery
75557363343Computer networks for providing peer to peer remote data storage and collaboration
75567360252Method and apparatus for secure distribution of software
75577360250Illegal access data handling apparatus and method for handling illegal access data
75587360240Portable network encryption keys
75597360238Method and system for authentication of a user
75607360082System and method for downloading security context elements governing execution of downloadable and distributable agents
75617360076Security association data cache and structure
75627359882Distributed run-time licensing
75637356838System and method for controlling access to digital content, including streaming media
75647356835Security monitor for PDA attached telephone
75657356834Solicited authentication of a specific user
75667356833Systems and methods for authenticating a user to a web server
75677356711Secure registration
75687356696Proofs of work and bread pudding protocols
75697356512Contents mediating system and contents mediating method
75707353543Contents distribution system
75717353541Systems and methods for content distribution using one or more distribution keys
75727353539Signal level propagation mechanism for distribution of a payload to vulnerable systems
75737353400Secure program execution depending on predictable error correction
75747353394System and method for digital signature authentication of SMS messages
75757353391Authenticating method for short-distance radio devices and a short-distance radio device
75767353385Authentication system, authentication method, authentication apparatus, and authentication method therefor
75777352861Digital electronic component which is protected against electrical-type analyses
75787350229Authentication and authorization mapping for a computer network
75797350083Integrated circuit chip having firmware and hardware security primitive device(s)
75807350082Upgrading of encryption
75817350081Secure execution of downloaded software
75827350075Method for autoconfiguration of authentication servers
75837350074Peer-to-peer authentication and authorization
75847346931Accepting a set of data in a computer unit
75857346929Method and apparatus for auditing network security
75867346161Method and apparatus for designing cipher logic, and a computer product
75877344823Transient optical state change materials useful in copy-protected compact discs
75887343623Authentication query strategizer and results compiler
75897343622Multi-level secure multi-processor computer architecture
75907343619Trusted flow and operation control method
75917343495Information recording apparatus, information reproducing apparatus, and information distribution system
75927340773Multi-stage authorisation system
75937340613Digital information recording apparatus and recording/reproducing apparatus
75947340611Template-driven XML digital signature
75957340604Using dynamic web components to remotely control the security state of web pages
75967340058Low-overhead secure information processing for mobile gaming and other lightweight device applications
75977340057Method and apparatus for distributing authorization to provision mobile devices on a wireless network
75987340056Remote deactivation of decoders for accessing multimedia digital data
75997340055Memory card and data distribution system using it
76007337473Method and system for network management with adaptive monitoring and discovery of computer systems based on user login
76017337469Method and system for unlocking doorway
76027337468Methods, apparatuses and systems facilitating seamless, virtual integration of online membership models and services
76037337466Information hiding through time synchronization
76047337329Secure video card methods and systems
76057337328Secure video card methods and systems
76067337324System and method for non-interactive human answerable challenges
76077337323Boot-up and hard drive protection using a USB-compliant token
76087337315Efficient certificate revocation
76097337314Apparatus and method for allocating resources within a security processor
76107336790Decoupling access control from key management in a network
76117336788Electronic book secure communication with home subsystem
76127334267Email viewing security
76137334258Configuration file download enforcement
76147334254Business-to-business security integration
76157334128Accessing information on a network using an extended network universal resource locator
76167333635Method and system for confirming personal identity
76177333481Method and system for disrupting undesirable wireless communication of devices in computer networks
76187331063Method and system for limiting software updates
76197331059Access restriction control device and method
76207331058Distributed data structures for authorization and access control for computing resources
76217330978Encrypted software installer
76227330970Methods and systems for protecting information in paging operating systems
76237328458Authoring system, authoring key generator, authoring device, authoring method, and data supply device, information terminal and information distribution method
76247328454Systems and methods for assessing computer security
76257328353Content distribution system
76267328351Mail processing apparatus and method
76277327843Data reproducing device, hard disk, and data storing disk
76287325247Information management method using a recording medium with a secure area and a user-use area
76297325246Enhanced trust relationship in an IEEE 802.1x network
76307325143Digital identity creation and coalescence for service authorization
76317325141Method and system for secure access
76327325133Mass subscriber management
76337325131Robust watermark for DSD signals
76347325129Method for altering encryption status in a relational database in a continuous process
76357322046Method and system for the secure use of a network service
76367322040Authentication architecture
76377321970Method and system for authentication using infrastructureless certificates
76387321910Microprocessor apparatus and method for performing block cipher cryptographic functions
76397320143Method of gaining secure access to intranet resources
76407320141Method and system for server support for pluggable authorization systems
76417320140Modifying digital rights
76427320076Method and apparatus for a transaction-based secure storage file system
76437320033Dynamic local drive and printer sharing
76447320008Data protection mechanism
76457319759Producing a new black box for a digital rights management (DRM) system
76467318159Detecting copied identity of terminal equipment
76477318156Group signature apparatus and method

2007

76487313824Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent
76497313820Method and system for providing an authorization framework for applications
76507313816Method and system for authenticating a user in a web-based environment
76517313814Scalable, error resilient DRM for scalable media
76527313812Application level security
76537313703Method for protecting a microcomputer system against manipulation of data stored in a storage assembly
76547313699Automatic authentication method and system in print process
76557313697Method for authentication
76567310822Filtering a permission set using permission requests associated with a code assembly
76577310812Service executing method and service providing system
76587310736Method and system for sharing storage space on a computer
76597310735Method, system, and program for distributing software between computer systems
76607310732Content distribution system authenticating a user based on an identification certificate identified in a secure container
76617308708Alternate encodings of a biometric identifier
76627308707Communication and authentication of a composite credential utilizing obfuscation
76637308703Protection of data accessible by a mobile device
76647308584System and method for securing a portable processing module
76657308581Systems and methods for online identity verification
76667308579Method and system for internationally providing trusted universal identification over a global communications network
76677308572Method of printing a document
76687308102System and method for securing access to memory modules
76697305704Management of trusted flow system
76707305567Decoupled architecture for data ciphering operations
76717305565Secure, encrypting pin pad
76727305555Smart card mating protocol
76737305550System and method for providing authentication and verification services in an enhanced media gateway
76747305545Automated electronic messaging encryption system
76757305470Method for displaying web user's authentication status in a distributed single login network
76767305432Privacy preferences roaming and enforcement
76777302703Hardware token self enrollment process
76787302698Operation of trusted state in computing platform
76797302591Access control
76807302589Method for securing memory mapped control registers
76817302588Data recording method, data recording device, and recording medium
76827302586Secure video card methods and systems
76837302585System for providing a trustworthy user interface
76847302584Mechanisms for banning computer programs from use
76857302571Method and system to maintain portable computer data secure and authentication token for use therein
76867302567Technical facility having software stored on a computer of the technical facility
76877302564Translation of secure communications for handshake protocols
76887302058Method and apparatus for securing control words
76897299499Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium
76907299498System and method of sharing digital literary works while protecting against illegal reproduction through communication network
76917299496Detection of misuse of authorized access in an information retrieval system
76927299491Authenticated domain name resolution
76937299490Portable wireless device and software for printing by reference
76947299366Secure software customization for smartcard
76957299365Secure video card methods and systems
76967299364Method and system to maintain application data secure and authentication token for use therein
76977299360Method and system for fingerprint template matching
76987299359Apparatus and method for indicating password quality and variety
76997299357Opaque message archives
77007298845Digital content protection system
77017298505Printing apparatus, printing method, and printing system for printing password-protected and normal print jobs
77027296294System for binding secrets to a computer system having tolerance for hardware changes
77037296289Setting or changing an access condition for an access management apparatus and method of a portable electronic device
77047296160Secure user authentication over a communication network
77057293292Method and system for securely and selectively providing optional features or premium functionality in a printer
77067293285Method and system for providing field scalability across a storage product family
77077293281Method and system for verifying a client request
77087293178Methods and systems for maintaining an encrypted video memory subsystem
77097290286Content provider secure and tracable portal
77107290285Systems and methods for distributing and viewing electronic documents
77117290279Access control method using token having security attributes in computer system
77127290278Identity based service system
77137290277Control of authentication data residing in a network device
77147290151Logic circuit with variable internal polarities
77157290150Information integration across autonomous enterprises
77167290143Method of certifying transmission, reception and authenticity of electronic documents and related network unit
77177290132Establishing secure peer networking in trust webs on open networks using shared secret device key
77187289632System and method for distributed security
77197287277Method and apparatus for controlling execution of a computer operation
77207287158Person authentication system, person authentication method, information processing apparatus, and program providing medium
77217287156Methods, systems and computer program products for authentication between clients and servers using differing authentication protocols
77227287010Information processing device and method, and providing medium
77237284279System and method for preventing unauthorized operation of identification and financial document production equipment
77247284271Authorizing a requesting entity to operate upon data structures
77257284265System and method for incremental refresh of a compiled access control table in a content management system
77267284263Rights management inter-entity message policies and enforcement
77277284135Methods and systems for maintaining an encrypted video memory subsystem
77287284132Memory card
77297284125Method and apparatus for personal identification
77307283632Unauthorized access embedded software protection system
77317281273Protecting content on medium from unfettered distribution
77327281267Software audit system
77337281263System and method for managing security access for users to network systems
77347281137Authentication method and system
77357281128One pass security
77367280662Time-shifting data in digital radio system
77377280661Data output method and apparatus, data playback method and apparatus, data recording method and apparatus, and data recording and playback method and apparatus
77387278169Controlling the downloading and recording of digital data
77397278166Method and apparatus for recording and/or reproducing data and record medium
77407278160Presentation of correlated events as situation classes
77417278026Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication
77427277547Method for automated security configuration in a wireless network
77437275260Enhanced privacy protection in identification in a data communications network
77447275259System and method for unified sign-on
77457275162On-line directory assistance system
77467275158Home server including a proxy facility, for executing an authentication and an encryption process instead of a user terminal, in an electronic commercial transaction
77477272857Method/system for preventing identity theft or misuse by restricting access
77487272855Unified monitoring and detection of intrusion attacks in an electronic system
77497272852Reserve/release control method
77507272849System and method for sharing data
77517272727Method for managing external storage devices
77527272726Secure video card methods and systems
77537272721System and method for automated border-crossing checks
77547269745Methods and apparatus for composing an identification number
77557269744System and method for safeguarding data between a device driver and a device
77567269743Method and apparatus for secure data mirroring a storage system
77577269742Microprocessor configuration with encryption
77587269736Distributed cryptographic methods and arrangements
77597269727System and method for optimizing authentication in a network environment
77607269656Remote order entry system and method
77617269649Protocol layer-level system and method for detecting virus activity
77627266846System and method of facilitating compliance with information sharing regulations
77637266842Control function implementing selective transparent data authentication within an integrated system
77647266840Method and system for secure, authorized e-mail based transactions
77657266839System and method for providing discriminated content to network users
77667266838Secure resource
77677266837Authentication, authorization, and accounting (AAA) server
77687266703Single-pass cryptographic processor and method
77697266702Method and system for managing security material and services in a distributed database system
77707266698Time stamping system for electronic documents and program medium for the same
77717266692Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates
77727266684Internet third-party authentication using electronic tickets
77737263716Remote management mechanism to prevent illegal system commands
77747263715Communications terminal operable with high security protocol
77757263618Method for binding a program module
77767263617Method and system for detecting a security violation using an error correction code
77777263610Secure multicast flow
77787260838Incorporating password change policy into a single sign-on environment
77797260834Cryptography and certificate authorities in gaming machines
77807260832Process for preventing virus infection of data-processing system
77817260831Method and system for authorization and access to protected resources
77827260726Method and apparatus for a secure computing environment
77837260724Context sensitive dynamic authentication in a cryptographic system
77847260215Method for encryption in an un-trusted environment
77857257843Command processing system by a management agent
77867257835Securely authorizing the performance of actions
77877257834Security framework data scheme
77887257718Cipher message assist instructions
77897257717Method with the functions of virtual space and data encryption and invisibility
77907257708Steganographic authentication
77917257580Method, system, and program for restricting modifications to allocations of computational resources
77927257107Device and method for detecting unauthorized, "rogue" wireless LAN access points
77937254838Copy protection method and system for digital media
77947254837Apparatus and method for storing and distributing encrypted digital content
77957254712System and method for compressing secure e-mail for exchange with a mobile data communication device
77967254711Network authentication system, method, and program, service providing apparatus, certificate authority, and user terminal
77977254705Service providing system in which services are provided from service provider apparatus to service user apparatus via network
77987254619Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network
77997254586Secure and opaque type library providing secure data protection of variables
78007254237System and method for establishing a secure connection
78017251834Filtering a permission set using permission requests associated with a code assembly
78027251830Process-based selection of virus detection actions system, method and computer program product
78037251828Flexible method of security data backup
78047251826Domain manager for plural domains and method of use
78057251732Password synchronization in a sign-on management system
78067249375Method and apparatus for end-to-end identity propagation
78077249373Uniformly representing and transferring security assertion and security response information
78087249372Network based document distribution method
78097249371Communications system and method
78107249370Communication system and transfer device
78117249369Post data processing
78127249265Multi-featured power meter with feature key
78137249263Method and system for user authentication and identification using behavioral and emotional association consistency
78147248739Semiconductor device for compressing video signals with copy protection information
78157246379Method and system for validating software code
78167246247Secure device
78177246244Identity verification method using a central biometric authority
78187246235Time varying presentation of items based on a key hash
78197243373On-access malware scanning
78207243366Key management protocol and authentication system for secure internet protocol rights management architecture
78217243241Data distributing apparatus and terminal apparatus for data distribution
78227243240System and method for firmware authentication
78237243238Person authentication system, person authentication method, information processing apparatus, and program providing medium
78247243235Mandatory access control (MAC) method
78257242771Contents management system
78267242769Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
78277240369Plug and play device and access control method therefor
78287240367User interface and method for inputting password and password system using the same
78297240365Repositing for digital content access control
78307240362Providing identity-related information and preventing man-in-the-middle attacks
78317240360System and method for controlling access to user interface elements
78327240219Method and system for maintaining backup of portable storage devices
78337240218Method of using a mask programmed key to securely configure a field programmable gate array
78347240211Method of providing an access request to a same server based on a unique identifier
78357240207Fingerprinting media entities employing fingerprint algorithms and bit-to-bit comparisons
78367240201Method and apparatus to provide secure communication between systems
78377240199System and method for verifying delivery and integrity of electronic messages
78387240198Honesty preserving negotiation and computation
78397239725Face image recognition apparatus
78407237268Apparatus and method for storing and distributing encrypted digital content and functionality suite associated therewith
78417237257Leveraging a persistent connection to access a secured service
78427237256Method and system for providing an open and interoperable system
78437237125Method and apparatus for automatically deploying security components in a content distribution system
78447237124Contents recorder/reproducer
78457237122Method and apparatus to facilitate software installation using embedded user credentials
78467237081Secure mode for processors supporting interrupts
78477237030System and method for preserving post data on a server system
78487236610Authenticating executable code and executions thereof
78497234160Method and apparatus for authorizing the transfer of information
78507234158Separate client state object and user interface domains
78517234157Remote authentication caching on a trusted client or gateway system
78527234156System and method for authentication of network users
78537233668System and method for a commercial multimedia rental and distribution system
78547233665Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
78557231669Binding content to a portable storage device or the like in a digital rights management (DRM) system
78567231663System and method for providing key management protocol with client verification of authorization
78577231659Entity authentication in a shared hosting computer network environment
78587231657User authentication system and methods thereof
78597231527Method of making secure the use of a piece of software by means of a processing and secret memorizing unit, and a system constituting an application thereof
78607231513Dynamically linked basic input/output system
78617231043Data processing apparatus and method, and computer-readable storage medium on which program for executing data processing is stored
78627231042Signal transmission apparatus and signal transmission method
78637228567License file serial number tracking
78647228561Open information based access control method
78657228440Scan and boundary scan disable mechanism on secure device
78667228438Computer network security system employing portable storage device
78677228435Program executing method in service system and program executing apparatus for the same
78687228425Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
78697228418Authentication and signature method for messages using reduced size of binary units of information content and corresponding systems
78707228417Simple secure login with multiple-authentication providers
78717225469BIOS lock encode/decode driver
78727225465Method and system for remote management of personal security devices
78737225340Digital copying method and storage device for digital content
78747225337Cryptographic security method and electronic devices suitable therefor
78757224802Wireless communication device, and method for controlling the same, which authenticates partner device when connecting thereto
78767224798Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system
78777222363Device independent authentication system and method
78787222361Computer security with local and remote authentication
78797219239Method for batching events for transmission by software agent
78807219238Data transfer control device, electronic instrument, and data transfer control method
78817219236Administering a security system
78827219234System and method for managing access rights and privileges in a data processing system
78837219233Methods and apparatus for associating a user with content in a collaborative whiteboard system
78847216363Licensing duplicated systems
78857216359Secure communication overlay using IP address hopping
78867216225Filtered application-to-application communication
78877215779Information providing apparatus and method, information processing apparatus and method, and program storage medium
78887213268Method for controlling customer-implemented data updates
78897213262Method and system for proving membership in a nested group using chains of credentials
78907213157Integrated circuit for digital rights management
78917213156Contents data transmission/reception system, contents data transmitter, contents data receiver and contents data transmission/reception method
78927213152Modular bios update mechanism
78937213150Method and apparatus for secure message queuing
78947213146System and method for establishing security profiles of computers
78957212637Cartridge validation with radio frequency identification
78967210164Method to remotely geolocate and activate or deactivate valuable equipment
78977210163Method and system for user authentication and authorization of services
78987210044Mobile phone with an encryption function
78997210035System and method for graphical indicia for the certification of records
79007210034Distributed control of integrity measurement using a trusted fixed token
79017207066Method for protecting a microcomputer system against manipulation of data stored in a storage arrangement of the microcomputer system
79027207065Apparatus and method for developing secure software
79037207058Method and system for transmitting authentication context information
79047206943Display unit storing and using a cryptography key
79057206942Recording medium cartridge and a recording-and-reproducing apparatus thereof
79067206940Methods and systems providing per pixel security and functionality
79077206939File storage system and a NAS server
79087206649Audio watermarking with dual watermarks
79097203968Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode
79107203967Methods and apparatus for content protection in a wireless network
79117200869System and method for protecting domain data against unauthorized modification
79127200862Securing uniform resource identifier namespaces
79137200861Method and system for validating physical access to an information handling system
79147200754Variable expiration of passwords
79157197768Software modem for communicating data using encrypted data and unencrypted control codes
79167197648Secure video card methods and systems
79177197647Method of securing programmable logic configuration data
79187197368Audio watermarking with dual watermarks
79197194768Access control for a microprocessor card
79207194739Multi-application execution system and method thereof
79217194637Method for controlling access within a distributed system containing at least one networked processor-based system and a plurality of non-networked processor-based systems
79227194636Data authentication
79237194617Method and apparatus to prevent the unauthorized copying of digital information
79247194440Billing method using SSL/TLS
79257194091Content using system
79267191467Method and system of integrating third party authentication into internet browser code
79277191466Flexible system and method of user authentication for password based system
79287191464Method and system for tracking a secure boot in a trusted computing environment
79297191344Method and system for controlling access to data stored on a data storage device
79307191340Generation of a secret quantity based on an identifier of an integrated circuit
79317191339System and method for using a PLD identification code
79327190671Mitigating denial-of-service attacks using frequency domain techniques
79337188362System and method of user and data verification
79347188359Optimizing authentication service availability and responsiveness via client-side routing
79357188314System and method for user authentication interface
79367188258Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects
79377188257Falsification detection system, and falsification detection method and medium
79387188256Recording medium having encrypted sound data recorded therein and information processor
79397188243System and method for over the air configuration security
79407187771Server-side implementation of a cryptographic system
79417185364Access system interface
79427185359Authentication and authorization across autonomous network systems
79437185357Method and mechanism for implementing synonym-based access control
79447185207Portable terminal apparatus with security function
79457185197Method and apparatus to facilitate secure network communications with a voice responsive network interface device
79467185092Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor
79477184546Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications
79487181763Authentication apparatus, authentication system, and authentication method
79497181629Data distribution system as well as data supply device terminal device and recording device for the same
79507181628Information terminal device and content backup method
79517181623Scalable wide-area upload system and method
79527181615Method and system for vehicle authentication of a remote access device
79537181014Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange
79547178169Method and apparatus for securing transfer of and access to digital content
79557178165Additional layer in operating system to protect system from hacking
79567178164System and method for ensuring proper implementation of computer security policies
79577178041Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device
79587178040Data processing method, system and apparatus for processing a variety of demands from a service provider
79597178038Apparatus and method for reproducing user data
79607178037Computer program copy management system
79617178027System and method for securely copying a cryptographic key
79627177425Device and method for securing information associated with a subscriber in a communication apparatus
79637176783Device for identifying authorization and triggering, enabling an action, preferably an electronic locking device for motor vehicles
79647174567Digital rights management apparatus, methods and multimedia products using biometric data
79657174564Secure wireless local area network
79667174466Method to protect software against unwanted use with a "detection and coercion" principle
79677174465Secure method for system attribute modification
79687174464Method of making a user piece of software secure by means of a processing and secret memorizing unit, and a system constituting an application thereof
79697174462Method of authentication using familiar photographs
79707174454System and method for establishing historical usage-based hardware trust
79717171694Method for performing a transaction over a network
79727171692Asynchronous communication within a server arrangement
79737171686Operating system extension to provide security for web-based public access services
79747171679Generating and maintaining encrypted passwords
79757171567System for protecting information over the internet
79767171565Method and system for producing wise cards
79777171555Method and apparatus for communicating credential information within a network device authentication conversation
79787168092Configuring processing units
79797167512Communication method, communication apparatus, software program and computer-readable recording medium for avoiding delay in authentication due to interruption of communication
79807165268Digital signatures for tangible medium delivery
79817165110System and method for simultaneously establishing multiple connections
79827162743System and method of limiting access to protected hardware addresses and processor instructions
79837162741System and methods for intrusion detection with dynamic window sizes
79847162737Synchronization of security gateway state information
79857162734Method for controlling access to a data communication network, with user identification
79867162648Methods of providing integrated circuit devices with data modifying capabilities
79877162644Methods and circuits for protecting proprietary configuration data for programmable logic devices
79887162643Method and system for providing transfer of analytic application data over a network
79897162642Digital content distribution system and method
79907162640System and method for protecting identity information
79917162635System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
79927162630Systems and methods for implementing host-based security in a computer network
79937162034Method and apparatus for multi-session time-slot multiplexing
79947159121Transmission of information to a reproduction device having user identification by organism information of a specified type
79957158641Recorder

2006

79967155739Method and system for secure registration, storage, management and linkage of personal authentication credentials data over a network
79977155616Computer network comprising network authentication facilities implemented in a disk drive
79987155614System and method for single sign on process for websites with multiples applications and services
79997155611Method of operating a conditional access system for broadcast applications
80007155606Method and system for accepting preverified information
80017152245Installation of black box for trusted component for digital rights management (DRM) on computing device
80027152244Techniques for detecting and preventing unintentional disclosures of sensitive data
80037152230Storage media storing data related to smart card, smart card system and smart card application loading method
80047152166Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
80057152165Trusted storage systems and methods
80067152164Network anti-virus system
80077151834Methods and devices for controlling facsimile transmissions of confidential information
80087151435Method and apparatus for identifying a patient
80097150043Intrusion detection method and signature table
80107150041Disk management interface
80117150038Facilitating single sign-on by using authenticated code to access a password store
80127150036Method of and personal computer for displaying content received from a content delivery server using a disk drive which includes a network address for the content delivery server and a server-contacting program
80137149900Method of defending software from debugger attacks
80147149897Systems and methods for providing increased computer security
80157146637User registry adapter framework
80167146507Information recording apparatus having function of encrypting information
80177146500System for obtaining signatures on a single authoritative copy of an electronic record
80187146007Secure conditional access port interface
80197143445Information processing apparatus, information processing method, and program storage medium
80207143440User authentication system and method
80217143409Automated entitlement verification for delivery of licensed software
80227143297Procedure for the protection of computer software and/or computer-readable data as well as protective equipment
80237143296Transmitting/receiving apparatus and a transmitting/receiving method
80247143295Methods and circuits for dedicating a programmable logic device for use with specific designs
80257143290Trusted and secure techniques, systems and methods for item delivery and execution
80267143283Simplifying the selection of network paths for implementing and managing security policies on a network
80277140045Method and system for user information verification
80287140042System and method for preventing software piracy
80297140036Centralized identity authentication for electronic communication networks
80307137145System and method for detecting an infective element in a network environment
80317137141Single sign-on to an underlying operating system application
80327137008Flexible method of user authentication
80337137002Differential authentication entity validation scheme for international emergency telephone service
80347137001Authentication of vehicle components
80357136998System and method for managing changes in a public key certificate directory
80367136996One-time logon method for distributed computing systems
80377136490Electronic password wallet
80387136488Microprocessor using asynchronous public key decryption processing
80397136487System and method for automatically protecting private video content using embedded cryptographic security
80407134145Registering copy protected material in a check-out, check-in system
80417134139System and method for authenticating block level cache access on network
80427134138Methods and apparatus for providing security for a data storage system
80437134137Providing data to applications from an access system
80447134026Data terminal device providing backup of uniquely existable content data
80457134025Methods and circuits for preventing the overwriting of memory frames in programmable logic devices
80467133846Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
80477131139Method for authorizing access to computer applications
80487131137Communication system including a security system
80497131010Data processing system, data processing method, data processing apparatus, and program providing medium
80507130886System and method for providing secure message signature status and trust status indication
80517130852Internal security system for a relational database system
80527127617On-line directory assistance system
80537127616Semiconductor integrated circuits, data transfer systems, and the method for data transfer
80547127608System and user interface supporting URL processing and concurrent application operation
80557124433Password that associates screen position information with sequentially entered characters
80567124305Data repository and method for promoting network storage of data
80577124296Security chip architecture and implementations for cryptography acceleration
80587124173Method and apparatus for intercepting performance metric packets for improved security and intrusion detection
80597120935Interactive key control system and method of managing access to secured locations
80607120928Secure selective sharing of account information on an internet information aggregation system
80617120927System and method for e-mail alias registration
80627120801Integrated circuit device with data modifying capabilities and related methods
80637120793System and method for electronic certificate revocation
80647120254Cryptographic system and method for geolocking and securing digital information
80657120128Method and system for creating and implementing zones within a fibre channel system
80667117535Software-generated machine identifier
80677117529Identification and authentication management
80687117528Contested account registration
80697117527Device, system, and method for capturing email borne viruses
80707117526Method and apparatus for establishing dynamic tunnel access sessions in a communication network
80717117373Bitstream for configuring a PLD with encrypted design data
80727117360CRL last changed extension or attribute
80737114183Network adaptive baseline monitoring system and method
80747114176Taking ownership of a part-physical, part-virtual device
80757114175System and method for managing network service access and enrollment
80767114082Data security for digital data storage
80777114081Outside leakage preventing system of confidential information
80787114080Architecture for secure remote access and transmission using a generalized password scheme with biometric features
80797114078Method and apparatus for storage of usernames, passwords and associated network addresses in portable memory
80807114073Digital contents generating apparatus and digital contents reproducing apparatus
80817111322Automatic generation of a new encryption key
80827111174Method and system for providing access to secure entity or service by a subset of N persons of M designated persons
80837111173Encryption process including a biometric unit
80847110543Content management system, content management terminal, usage rule management server, content management method, and content management program
80857107616Method of producing a response
80867107610Resource authorization
80877107458Authentication communicating semiconductor device
80887107455Computer information access based on a transmitted identification signal
80897107347Method and apparatus for network deception/emulation
80907103911Identity-based-encryption system with district policy information
80917103782Secure memory and processing system having laser-scribed encryption key
80927103776Emergency logon method
80937103773Message exchange in an information technology network
80947103770Point-to-point data streaming using a mediator node for administration and security
80957100204System and method for determining network users' physical locations
80967100203Operating session reauthorization in a user-operated device
80977100198Printing method, print system and program
80987100197Network user authentication system and method
80997100054Computer network security system
81007100046VPN enrollment protocol gateway
81017100045System, method, and program for ensuring originality
81027099320Method and apparatus for detection of and response to abnormal data streams in high bandwidth data pipes
81037096494Cryptographic system and method for electronic transactions
81047096369Data transformation apparatus and data transformation method
81057096366Portable electronic device with a security function and a nonvolatile memory
81067096358Encrypting file system
81077096357Cryptographic communication terminal, cryptographic communication center apparatus, cryptographic communication system, and storage medium
81087095859Managing private keys in a free seating environment
81097093298Apparatus and method for security object enhancement and management
81107093297Method and apparatus for monitoring a network data processing system
81117093285Supplier portal for global procurement e-business applications
81127093284Method, system, and storage medium for preventing recurrence of a system outage in a computer network
81137093282Method for supporting dynamic password
81147093281Casual access application with context sensitive pin authentication
81157093280Internet security system
81167093279Method and system for automatic invocation of secure sockets layer encryption on a parallel array of Web servers
81177093136Methods, systems, computer program products, and data structures for limiting the dissemination of electronic email
81187093127System and method for computer storage security
81197093125Rote based tool delegation
81207092909Information processing apparatus and method, and distribution medium
81217089584Security architecture for integration of enterprise information system with J2EE platform
81227089582Method and apparatus for identifying universal resource locator rewriting in a distributed data processing system
81237089428Method and system for managing computer security information
81247089425Remote access authorization of local content
81257089424Peripheral device for protecting data stored on host device and method and system using the same
81267089420Authentication method and system
81277089416Information communication apparatus and method, information communication system, and memory medium
81287089415Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet
81297085931Virtual smart card system and method
81307085929Method and apparatus for revocation list management using a contact list having a contact count field
81317085926Electronic contracts
81327085925Trust ratings in group credentials
81337085924Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet
81347084736Method for checking the authorization of users
81357082614System for identification of smart cards
81367082198Data receiving method and data receiving unit therefor
81377080403Method and system for person data authentication and management
81387080402Access to applications of an electronic processing device solely based on geographic location
81397080262Key compression
81407080260System and computer based method to automatically archive and retrieve encrypted remote client data files
81417080259Electronic information backup system
81427080258IC, IC-mounted electronic device, debugging method and IC debugger
81437080256Method for authenticating a chip card in a message transmission network
81447080255Secret key generation method, encryption method, and cryptographic communications method and system
81457079655Encryption algorithm management system
81467079278Image processing apparatus, data processing method, and storage medium
81477076805Digital data system
81487076798Securing non-EJB corba objects using an EJB security mechanism
81497076797Granular authorization for network user sessions
81507076796Virtual media from a directory service
81517076795System and method for granting access to resources
81527076656Methods and apparatus for providing efficient password-authenticated key exchange
81537076083Personnel access control system
81547073199Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine
81557073073Data providing system, device, and method
81567073071Platform and method for generating and utilizing a protected audit log
81577073069Apparatus and method for a programmable security processor
81587073058Authentication system for connecting client to server providing particular information using dedicated system and method therefor
81597069587Electronic device and connection control method
81607069580Function-based process control verification and security in a process control system
81617069447Apparatus and method for secure data storage
81627069446Stateless mechanism for data retrieval
81637069431Recovery of a BIOS image
81647065655Secure enclosure for key exchange
81657065652System for obfuscating computer code upon disassembly
81667065651Secure video card methods and systems
81677062781Method for providing simultaneous parallel secure command execution on multiple remote hosts
81687062780Granular access control of inter-process communications in a compartment mode workstation labeled environment
81697058977Copyright control of encrypted data using uncorrected errors in an error correcting code
81707058971Access privilege transferring method
81717058968Computer security and management system
81727058820Information processing system, medium, information processing apparatus, information processing method, storage medium storing computer readable program for realizing such method
81737058819Data processing system, data processing method, and program providing medium
81747058818Integrated circuit for digital rights management
81757058817System and method for single sign on process for websites with multiple applications and services
81767055173Firewall pooling in a network flowswitch
81777055170Security mechanism and architecture for collaborative software systems using tuple space
81787055042System and method for synchronizing a user password between mainframe and alternative computer operating environments
81797055036System and method to verify trusted status of peer in a peer-to-peer network environment
81807055033Integrated circuit devices with steganographic authentication and steganographic authentication methods
81817054930System and method for propagating filters
81827051366Evidence-based security policy manager
81837051364System and method for preparing, executing, and securely managing electronic documents
81847051362Method and system for operating a network server to discourage inappropriate use
81857051214Information processing system having fortified password function and method thereof
81867051213Storage medium and method and apparatus for separately protecting data in different areas of the storage medium
81877051211Secure software distribution and installation
81887051209System and method for creation and use of strong passwords
81897050892Diagnostic tool security key
81907047563Command authorization via RADIUS
81917047562Conditioning of the execution of an executable program upon satisfaction of criteria
81927047560Credential authentication for mobile users
81937047420Exclusive encryption
81947047415System and method for widely witnessed proof of time
81957047413Collusion-resistant watermarking and fingerprinting
81967047409Automated tracking of certificate pedigree
81977047408Secure mutual network authentication and key exchange protocol
81987043760System and method for establishing and managing relationships between pseudonymous identifications and memberships in organizations
81997043754Method of secure personal identification, information processing, and precise point of contact location and timing
82007043643Method and apparatus for operating a computer in a secure mode
82017043642Process to manage data in a chip card
82027043456Mobile electronic transaction personal proxy
82037043024System and method for key distribution in a hierarchical tree
82047039954Method for enabling a network-addressable device to detect use of its identity by a spoofer
82057039951System and method for confidence based incremental access authentication
82067039948Service control manager security manager lookup
82077039946Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
82087039815Method for protecting a data memory
82097039814Method for securing software via late stage processor instruction decryption
82107039812System and method for user authentication
82117039809Asymmetric encrypted pin
82127036150Data management apparatus, storage medium having stored therein data management program, storage medium having stored therein usage certificate data, and method of using data
82137036149Computer system
82147036141Transmission system, a method and an apparatus providing access for IP data packets to a firewall protected network
82157036022Verification of trusted-path commands
82167036018Integrated security circuit
82177036017Microprocessor configuration with encryption
82187035403Encryption method and apparatus with escrow guarantees
82197032241Methods and systems for accessing networks, methods and systems for accessing the internet
82207028336Firewall providing enhanced network security and user transparency
82217024700Computer with security function and method therefor
82227024699Publication of an attorney-client privilege warning message
82237024693Filter-based attribute value access control
82247024692Non pre-authenticated kerberos logon via asynchronous message mechanism
82257024691User policy for trusting web sites
82267024689Granting access rights to unattended software
82277024688Techniques for performing UMTS (universal mobile telecommunications system) authentication using SIP (session initiation protocol) messages
82287024686Secure network and method of establishing communication amongst network devices that have restricted network connectivity
82297024565Method and apparatus to detect circuit tampering
82307024564Software protection device and method
82317024558Apparatus and method for authenticating digital signatures and computer-readable recording medium thereof
82327023861Malware scanning using a network bridge
82337017190Portable recordable media anti-theft system
82347017189System and method for activating a rendering device in a multi-level rights-management architecture
82357017184Image recording apparatus and image processing method therefor
82367017183System and method for administering security in a corporate portal
82377017182Method of securely transmitting information
82387017181Identity-based-encryption messaging system with public parameter host servers
82397017050Clearinghouse server for internet telephony and multimedia communications
82407017048Circuit configuration for generating current pulses in the supply current of integrated circuits
82417017046System and method for graphical indicia for the certification of records
82427016497Data decryption system
82437013393Universal intelligent card for secure access to system functions
82447010809Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length
82457010808Binding digital content to a portable storage device or the like in a digital rights management (DRM) system
82467010806Dynamic downloading of keyboard keycode data to a networked client
82477010685Method and apparatus for storing scrambled digital programs by filtering product identifier
82487010684Method and apparatus for authenticating an open system application to a portable IC device
82497008456Computer with security function and method therefor
82507007300Secure booting of a personal computer system
82517007174System and method for determining user identity fraud using similarity searching
82527007171Method and apparatus for improved fold retention on a security enclosure
82537007168User authentication using member specifying discontinuous different coordinates
82547003673Method for storing and operating on data units in a security module and associated security module
82557003668Secure authentication of users via intermediate parties
82567003666Apparatus and method for embedding information for tamper detection and detecting tamper and recording medium having program for carrying out the method recorded thereon
82577003112Extensible GPS receiver system
82587003110Software aging method and apparatus for discouraging software piracy
82597000248Virtual network and virtual network connection system
82607000115Method and apparatus for uniquely and authoritatively identifying tangible objects
82617000107System and method for using dynamic web components to remotely control the security state of web pages
82626996844Switch-user security for UNIX computer systems
82636996839Authorized user system using biological signature
82646996723Data generating apparatus and data verifying apparatus
82656996722Data communications
82666996543System for protection of goods against counterfeiting
82676993666Method and apparatus for remotely accessing a password-protected service in a data communication system
82686993660System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment
82696993658Use of personal communication devices for user authentication
82706993654Secure encryption processor with tamper protection
82716993653Identity vectoring via chained mapping records
82726993652Method and system for providing client privacy when requesting content from a public server
82736993651Security protocol
82746993138Spatial key trees for key management in wireless environments
82756993133Data recording and reproduction apparatus
82766990683Information providing system utilizing IC cards and method thereof
82776990589Recording and/or playback apparatus and method
82786990582Authentication method in an agent system
82796990581Broadband certified mail
82806988203System and method of extending communications with the wiegand protocol
82816988198System and method for initializing operation for an information security operation
82826986063Method for monitoring software using encryption including digital signatures/certificates
82836986061Integrated system for network layer security and fine-grained identity-based access control
82846986057Security device and method
82856986056Method and arrangement for generating binary sequences of random numbers
82866986055Method for generating random numbers
82876986054Attack-resistant implementation method
82886986053System for protecting cryptographic processing and memory resources for postal franking machines
82896986052Method and apparatus for secure execution using a secure memory partition
82906986051Method and system for controlling and filtering files using a virus-free certificate
82916986046Method and apparatus for managing secure collaborative transactions
82926985583System and method for authentication seed distribution
82936983486Method and apparatus for establishing security scanner attributes in a computer system
82946983380Automatically generating valid behavior specifications for intrusion detection
82956983377Method for checking user access
82966983371Super-distribution of protected digital content

2005

82976968461Providing break points in a malware scanning operation
82986966004Method for providing single step log-on access to a differentiated computer network
82996963980Combined hardware and software based encryption of databases
83006963873Method and system for automatic association of a signed certificate with a certificate signing request
83016963845Business card as electronic mail authorization token
83026961855Notification of modifications to a trusted computing base
83036961429Method and device for guaranteeing the integrity and authenticity of a set of data
83046959392Information providing system and method for providing information
83056959387Method and apparatus for verifying secure document timestamping
83066959382Digital signature service
83076957338Individual authentication system performing authentication in multiple steps
83086957337Method and apparatus for secure authorization and identification using biometrics without privacy invasion
83096957335Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
83106957331Method of achieving multiple processor agreement in asynchronous networks
83116957330Method and system for secure information handling
83126956950Computer readable medium having a private key encryption program
83136954860Network copy protection for database programs
83146952778Protecting access to microcontroller memory blocks
83156952479Dynamic copy protection of optical media
83166952476Verification of the private components of a public-key cryptographic system
83176950949Method and apparatus for password entry using dynamic interface legitimacy information
83186950948Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
83196950943System for electronic repository of data enforcing access control on data search and retrieval
83206950934Method for managing certificate revocation list by distributing it
83216950933Method and system for management and notification of electronic certificate changes
83226950517Efficient encryption and authentication for data processing systems
83236950200Apparatus and method for re-outputting image data under different conditions depending on time passing from output of the image data
83246948075Computer controlling method, information apparatus, computer, and storage medium
83256948067Efficient encryption and authentication for data processing systems
83266948066Technique for establishing provable chain of evidence
83276948065Platform and method for securely transmitting an authorization secret
83286948061Method and device for performing secure transactions
83296947164Image forming system for permitting an image forming job based on an input password
83306944777System and method for controlling access to resources in a distributed environment
83316944772System and method of enforcing executable code identity verification over the network
83326944300Method for migrating a base chip key from one computer system to another
83336941461System and method of uniquely authenticating each replication of a group of soft-copy documents
83346941460Method and system of marking a text document with a pattern of extra blanks for authentication
83356941455System and method for cross directory authentication in a public key infrastructure
83366938170System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme
83376938168Interactive virtual library system for expeditiously providing automatic updates of user-desired information from content providers, at least one of which is commercial, to users
83386938159Continuous verification system
83396938157Distributed information system and protocol for affixing electronic signatures and authenticating documents
83406937728Verifiable anonymous channel
83416934860System, method and article of manufacture for knowledge-based password protection of computers and other systems
83426934859Authenticated search engines
83436934856System of secret internet web sites for securing user access
83446934843Method for authenticating at least one subscriber during a data interchange
83456934840Composite keystore facility apparatus and method therefor
83466934839Evidencing and verifying indicia of value using secret key cryptography
83476934836Fluid separation conduit cartridge with encryption capability
83486934393System and method for third party recovery of encryption certificates in a public key infrastructure
83496931539Methods and system for improved searching of biometric data
83506931537Folder type time stamping system and distributed time stamping system
83516931530Secure network file access controller implementing access control and auditing
83526931528Secure handshake protocol
83536931442Networked devices, adapters and methods which identify monitored equipment units
83546931126Non malleable encryption method and apparatus using key-encryption keys and digital signature
83556928557Method and apparatus for ejecting a recording medium from a storage unit detachable from host equipment
83566928546Identity verification method using a central biometric authority
83576928167Method for managing public key
83586925571Method and system of remote monitoring and support of devices, using POP3 and decryption using virtual function
83596925567Remote control of VCR with electronic mail
83606925564Digital signatures on a smartcard
83616925182Administration and utilization of private keys in a networked environment
83626922782Apparatus and method for ensuring data integrity of unauthenticated code
83636922778Transcoding in data communications
83646922776Scalable system and method for management and notification of electronic certificate changes
83656920563System and method to securely store information in a recoverable manner on an untrusted system
83666920561Method and system for enabling free seating using biometrics through a centralized authentication
83676920559Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed
83686918042Secure configuration of a digital certificate for a printer or other network device
83696918041System and method of network communication with client-forced authentication
83706918036Protected platform identity for digital signing
83716915433Securely extensible component meta-data
83726915423Method of providing time stamping service for setting client's system clock
83736912659Methods and device for digitally signing data
83746912657Method and arrangement in a communication network
83756910133Reflected interrupt for hardware-based encryption
83766910131Personal authentication system and portable unit and storage medium used therefor
83776910130System for and method of unconditionally secure digital signature
83786907399Secure user certification for electronic commerce employing value metering system
83796904528Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus
83806904527Intellectual property protection in a programmable logic device
83816904524Method and apparatus for providing human readable signature with digital signature
83826904521Non-repudiation of e-mail messages
83836904520Method and system for ensuring the securing of computer servers of games
83846904435Method and system for secure electronic distribution, archiving and retrieval
83856904416Signature verification using a third party authenticator via a paperless electronic document platform
83866901513Process for generating a digital signature and process for checking the signature
83876901509Apparatus and method for demonstrating and confirming the status of a digital certificates and other data
83886898713Residue transfer for encrypted messages split across multiple data segments
83896898711User authentication system and method for multiple process applications
83906898710System and method for secure legacy enclaves in a public key infrastructure
83916898709Personal computer system and methods for proving dates in digital data files
83926898707Integrating a digital signature service into a database
83936898581Secure user certification for electronic commerce employing value metering system
83946898579System, method and article of manufacture for contract term certification utilizing a network
83956898284Cryptographic identification and digital signature method using efficient elliptic curve
83966895514Method and apparatus for achieving secure password access
83976895509Tamper detection system for securing data
83986895507Method and system for determining and maintaining trust in digital data files with certifiable time
83996892308Internet protocol telephony security architecture
84006892305Method and system for booting up a computer system in a secure fashion
84016892288System for making automatic backup copies of computer files when a personal computer is switched off
84026889324Digital measurement apparatus and image measurement apparatus
84036889322Identification protocols
84046886095Method and apparatus for efficiently initializing secure communications among wireless devices
84056883095System and method for password throttling
84066880083Method and apparatus for creating and executing secure scripts
84076880080Method to provide authorization from a certifying authority to a service provider using a certificate
84086880079Methods and systems for secure transmission of information using a mobile device
84096877093System and method for secure provisioning and configuration of a transaction processing device
84106874087Integrity checking an executable module and associated protected service provider module
84116871286Method and apparatus for resetting passwords in a computer system
84126871278Secure transactions with passive storage media
84136871276Controlled-content recoverable blinded certificates
84146871150Expandable intelligent electronic device
84156868499Method and apparatus for password re-entry
84166865678Personal date/time notary device
84176862686Method and apparatus in a data processing system for the separation of role-based permissions specification from its corresponding implementation of its semantic behavior
84186862638RSM-resident program initiation sequence
84196859794Image processing system, image processing apparatus, image processing method, and storage medium
84206854057Digital certificate proxy
84216854056Method and system for coupling an X.509 digital certificate with a host identity
84226851052Method and device for generating approximate message authentication codes
84236848048Method and apparatus for providing verifiable digital signatures
84246847951Method for certifying public keys used to sign postal indicia and indicia so signed
84256847719Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext
84266845449System and method for fast nested message authentication codes and error correction codes
84276845447Electronic voting method and system and recording medium having recorded thereon a program for implementing the method
84286842863Certificate reissuance for checking the status of a certificate in financial transactions
84296842860System and method for selectively authenticating data
84306842859Authentication system, authentication device, authentication data producing device, and authentication method
84316842741Recording medium with electronic ticket definitions recorded thereon and electronic ticket processing methods and apparatuses
84326842628Method and system for event notification for wireless PDA devices
84336842523Encryption apparatus, cryptographic communication system, key recovery system, and storage medium
84346842106Challenged-based tag authentication model
84356839848Information processing system and peripheral apparatus
84366839843System for electronic repository of data enforcing access control on data retrieval
84376839437Method and apparatus for managing keys for cryptographic operations

2004

84386836846Method and apparatus for controlling e-mail access
84396836845Method and apparatus for generating queries for secure authentication and authorization of transactions
84406834347Target self-security for upgrades for an embedded device
84416834112Secure distribution of private keys to multiple clients
84426832349Remote activation of enhanced functionality features in locally created documents
84436832316Systems and methods for protecting data secrecy and integrity
84446829367Content data judging apparatus
84456829355Device for and method of one-way cryptographic hashing
84466826695Method and system for grouping of systems in heterogeneous computer network
84476826690Using device certificates for automated authentication of communicating devices
84486826687Commitments in signatures
84496826686Method and apparatus for secure password transmission and password changes
84506826685Method and system for the digital certificate generation and distribution
84516823458Apparatus and method for securing resources shared by multiple operating systems
84526823456System and method for providing trusted services via trusted server agents
84536820202Account authority digital signature (AADS) system
84546820201System and method using information-based indicia for securing and authenticating transactions
84556820199Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
84566816970Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
84576816969Digital signature generating method and digital signature verifying method
84586813716Secure calling card and authentication process
84596813712Viral replication detection using a counter virus
84606813571Apparatus and method for seamlessly upgrading the firmware of an intelligent electronic device
84616813354Mixing in small batches
84626810123Rolling code security system
84636807633Digital signature system
84646802010Multiple user computer system and method for remote control thereof
84656802002Method and apparatus for providing field confidentiality in digital certificates
84666801999Passive and active software objects containing bore resistant watermarking
84676801935Secure printing using electronic mailbox
84686799272Remote device authentication system
84696798190Compact intelligent electronic device incorporating transformers
84706795919Unique digital signature
84716795861Dynamic controlling method for field authority and system thereof
84726795404Device for aggregating, translating, and disseminating communications within a multiple device environment
84736792545Enterprise computer investigation system
84746792536Smart card system and methods for proving dates in digital files
84756792530Implicit certificate scheme
84766792425Secure multi database system including a client, multi database server, and database server
84776789200Method of automatically instituting secure, safe libraries and functions when exposing a system to potential system attacks
84786782476Data processing apparatus and authentication method applied to the apparatus
84796782349Method and system for updating a root of trust measurement function in a personal computer
84806778667Method and apparatus for integrated ciphering and hashing
84816775777Secure system using images of only part of a body as the key where the part has continuously-changing features
84826775770Platform and method for securing data provided through a user input device
84836772350System and method for controlling access to resources in a distributed environment
84846772342Document or message security arrangements using a numerical hash function
84856772331Method and apparatus for exclusively pairing wireless devices
84866771386Image forming system
84876769118Dynamic, policy based management of administrative procedures within a distributed computing environment
84886766450Certificate revocation system
84896763467Network traffic intercepting method and system
84906763459Lightweight public key infrastructure employing disposable certificates
84916760842Finite state automata security system
84926757827Autonomously secured image data
84936757825Secure mutual network authentication protocol
84946754824Modulated message authentication system and method
84956751733Remote authentication system
84966751730Method and apparatus for documenting cap removal data
84976751318Method and apparatus for digital signature authentication
84986748540Method and apparatus for detection and notification of unauthorized access attempts in a distributed data processing system
84996748539System and method for securely checking in and checking out digitized content
85006748534System and method for partitioned distributed scanning of a large dataset for viruses and other malware
85016748530Certification apparatus and method
85026747546Data communication transponder and communications system employing it
85036745327Electronic certificate signature program
85046745138Intelligent electronic device with assured data storage on powerdown
85056742119Time stamping method using time delta in key certificate
85066741852Method and device to authenticate subscribers in a mobile radiotelephone systems
85076738912Method for securing data relating to users of a public-key infrastructure
85086738899Method for publishing certification information certified by a plurality of authorities and apparatus and portable data storage media used to practice said method
85096732270Method to authenticate a network access server to an authentication server
85106728880Secure time on computers with insecure clocks
85116728378Secret key messaging
85126725373Method and apparatus for verifying the integrity of digital objects using signed manifests
85136725370Sharing data safely using service replication
85146721891Method of distributing piracy protected computer software
85156721886Preventing unauthorized use of service
85166720985Method and system for object selection
85176718470System and method for granting security privilege in a communication system
85186718468Method for associating a password with a secured public/private key pair
85196718314Multi-purpose transaction card system
85206715085Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
85216715083Method and system of alerting internet service providers that a hacker may be using their system to gain access to a target system
85226715079Method and system for soft modem protection
85236711680Method of limiting key usage in a postage metering system that produces cryptographically secured indicium
85246711679Public key infrastructure delegation
85256711677Secure printing method
85266711263Secure distribution and protection of encryption key information
85276708049Sensor with signature of data relating to sensor
85286704870Digital signatures on a Smartcard
85296704868Method for associating a pass phase with a secured public/private key pair
85306704867Method for publishing certification information representative of selectable subsets of rights and apparatus and portable data storage media used to practice said method
85316704715Method and system for ensuring the security of the remote supply of services of financial institutions
85326701434Efficient hybrid public key signature scheme
85336697947Biometric based multi-party authentication
85346697946Message recovery signature apparatus
85356694414Magnetic disc device having copy protect function
85366690796Rolling code security system
85376690794Electronic ticket system
85386687835Command authorization method
85396681214Secure system for printing authenticating digital signatures
85406679420Business card as electronic mail token
85416678665Computer system for protecting software and a method for protecting software
85426677888Secure aircraft communications addressing and reporting system (ACARS)
85436676023Method and system for checking an original recorded information
85446675296Information certificate format converter apparatus and method

2003

85456671803Method and system for consumer electronic device certificate management
85466671759Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets
85476654889Method and apparatus for protecting proprietary configuration data for programmable logic devices
85486654883Device authentication and encrypted communication system offering increased security
85496651169Protection of software using a challenge-response protocol embedded in the software
85506651166Sender driven certification enrollment system
85516647493Method and system for authentication and electronic signature
85526640303System and method for encryption using transparent keys
85536640294Data integrity check method using cumulative hash function
85546636969Digital signatures having revokable anonymity and improved traceability
85556633979Methods and arrangements for secure linking of entity authentication and ciphering key generation
85566622247Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
85576620047Electronic gaming apparatus having authentication data sets
85586615352Device and method for authenticating user's access rights to resources
85596615347Digital certificate cross-referencing
85606611913Escrowed key distribution for over-the-air service provisioning in wireless communication networks
85616609197Method and system for secure emergency access to network devices
85626601172Transmitting revisions with digital signatures
85636594362Radio data transmission apparatus
85646591273Method and system for secure electronic distribution, archiving and retrieval
85656591249Touch scan internet credit card verification purchase process
85666587945Transmitting reviews with digital signatures
85676587880Session management system and management method
85686584565Method and apparatus for long term verification of digital signatures
85696584454Method and apparatus for community management in remote system servicing
85706581044Method and apparatus for encoding license parameters within a license number for authentication purposes
85716578144Secure hash-and-sign signatures
85726574733Centralized secure backup system and method
85736574730User authentication in a communications network
85746571344Method and apparatus for authenticating time-sensitive interactive communications
85756571334Apparatus and method for authenticating the dispatch and contents of documents
85766570988Simple technique for implementing a cryptographic primitive using elementary register operations
85776567916Method and device for authentication
85786567793Remote authorization for unlocking electronic data system and method
85796567530Device and method for authenticating and certifying printed documents
85806563928Strengthened public key protocol
85816556680Method for authorization check
85826553494Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document
85836553493Secure mapping and aliasing of private keys used in public key cryptography
85846542610Content protection for digital transmission systems
85856542607Device and method for the cryptographic processing of a digital data stream presenting any number of data
85866539479System and method for securely logging onto a remotely located computer
85876535980Keyless encryption of messages using challenge response
85886535978Digital signature providing non-repudiation based on biological indicia
85896532541Method and apparatus for image authentication
85906532540Apparatus and method for demonstrating and confirming the status of a digital certificates and other data
85916532290Authentication methods
85926532194Method and apparatus for providing certified time
85936530023Method and device that validates time of an internal source using an external source
85946530020Group oriented public key encryption and key management system
85956529886Authenticating method for an access and/or payment control system
85966529487Method and apparatus for securely transmitting distributed RAND for use in mobile station authentication
85976526509Method for interchange of cryptographic codes between a first computer unit and a second computer unit
85986523115ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, CRYPTOGRAPHY SYSTEM, COMPUTER-READABLE RECORDING MEDIUM STORING ENCRYPTION PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM STORING DECRYPTION PROGRAM WHICH PERFORM ERROR DIAGNOSIS
85996523114Method and apparatus for embedding authentication information within digital data
86006522767Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
86016516415Device and method of maintaining a secret code within an integrated circuit package
86026516413Apparatus and method for user authentication
86036510514Device for reliability creating electronic signatures
86046510513Security services and policy enforcement for electronic data
86056507912Protection of biometric data via key-dependent sampling
86066507907Protecting information in a system
86076507656Non malleable encryption apparatus and method
86086505302Authentication for secure devices with limited cryptography
86096505301Authentication for secure devices with limited cryptography
86106504932Method of transferring information between a subscriber identification module and a radiocommunication mobile terminal, and a corresponding subscriber identification module and mobile terminal
86116502861Seat belt guide

2002

86126499104Digital signature method
86136499019Electronic payment device using unbalanced binary tree and the method of the same
86146498837Method and apparatus capable of performing information providing operation with information security measures
86156493823Instrument for making secure data exchanges
86166490682Log-on verification protocol
86176490680Access control and authorization system
86186490358Enabling business transactions in computer networks
86196487659Device and method for conditional authentication
86206487658Efficient certificate revocation
86216483918Technique for producing a parameter, such as a checksum, through a primitive that uses elementary register operations
86226480957Method and system for secure lightweight transactions in wireless data networks
86236473742Reception apparatus for authenticated access to coded broadcast signals
86246473508Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys
86256470449Time-stamped tamper-proof data storage
86266470448Apparatus and method for proving transaction between users in network environment
86276456716Apparatus and method for establishing a crytographic link between elements of a system
86286453417Microcontroller with secure signature extraction
86296453416Secure proxy signing device and method of use
86306449473Security method for transmissions in telecommunication networks
86316446207Verification protocol
86326446051Document transfer systems
86336445780Method and system for ensuring the security of telephone call management centers
86346445281Dynamically controlled electronic locking system and control system fitted with such a locking system
86356442691Authenticated time device
86366442689Apparatus and method for demonstrating and confirming the status of a digital certificates and other data
86376442688Method and apparatus for obtaining status of public key certificate updates
86386442532Wireless transaction and information system
86396438691Transmitting messages over a network
86406434561Method and system for accessing electronic resources via machine-readable data on intelligent documents
86416434238Multi-purpose transaction card system
86426430690Secure one-way authentication communication system
86436425081Electronic watermark system electronic information distribution system and image filing apparatus
86446424718Data communications system using public key cryptography in a web environment
86456424712Accelerated signature verification on an elliptic curve
86466421779Electronic data storage apparatus, system and method
86476411716Method of changing key fragments in a multi-step digital signature system
86486411715Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
86496408389System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
86506408388Personal date/time notary device
86516405923Method for secure distribution of data
86526405314Secure system using images of only part of a body as the key where the part has continuously-changing features
86536405313Method for providing authentication assurance in a key-binding system
86546401206Method and apparatus for binding electronic impressions made by digital identities to documents
86556401203Method for automatic handling of certificate and key-based processes
86566397329Method for efficiently revoking digital identities
86576396928Digital message encryption and authentication
86586393566Time-stamp service for the national information network
86596385318Encrypting method, deciphering method and certifying method
86606381699Leak-resistant cryptographic method and apparatus
86616381696Method and system for transient key digital time stamps
86626381695Encryption system with time-dependent decryption
86636377692Method and system for controlling key for electronic signature
86646377670Method and system for ensuring the security of the supply of services of telecommunication operators
86656370250Method of authentication and storage of private keys in a public key cryptography system (PKCS)
86666370249Method and apparatus for public key management
86676370247Hash value generating method and device, data encryption method and device, data decryption method and device
86686370209Process for sensing manipulations of digital information
86696367014Enhanced short message and method for synchronizing and ensuring security of enhanced short messages exchanged in a cellular radio communication system
86706367013System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
86716366570Processing CDMA signals
86726363485Multi-factor biometric authenticating device and method
86736357006Digital signaturing method and system for re-creating specialized native files from single wrapped files imported from an open network or residing on a CD-ROM
86746353889Portable device and method for accessing data key actuated devices
86756353888Access rights authentication apparatus
86766347373Method and device for the protected storage of data from message traffic
86776341349Digital signature generating/verifying method and system using public key encryption
86786339828System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

2001

86796332193Method and apparatus for securely transmitting and authenticating biometric data over a network
86806330674Use of biometrics as a methodology for defining components for ECC encryption
86816330673Determination of a best offset to detect an embedded pattern
86826327656Apparatus and method for electronic document certification and verification
86836324645Risk management for public key management infrastructure using digital certificates
86846323752Electronic instrument having resettable security code and method for resetting security code
86856321333Efficient digital certificate processing in a data processing system
86866321094Access method through radio mobile communication system
86876320966Cryptographic methods for demonstrating satisfiable formulas from propositional logic
86886317834Biometric authentication system with encrypted models
86896317829Public key cryptography based security system to facilitate secure roaming of users
86906314521Secure configuration of a digital certificate for a printer or other network device
86916314517Method and system for notarizing digital signature data in a system employing cryptography based security
86926311271How to sign digital streams
86936311171Symmetrically-secured electronic communication system
86946308277Virtual certificate authority
86956307935Method and apparatus for fast elliptic encryption with direct embedding
86966304974Method and apparatus for managing trusted certificates
86976304658Leak-resistant cryptographic method and apparatus
86986301664Method and system for non-malleable and non-interactive cryptographic commitment in a network
86996301661Enhanced security for applications employing downloadable executable content
87006301659Tree-based certificate revocation system
87016297891Method & system for electronic document certification
87026292897Undeniable certificates for digital signature verification
87036292896Method and apparatus for entity authentication and session key generation
87046292893Certificate revocation system
87056292892Apparatus and method for providing secured communications
87066289460Document management system
87076289453Method and apparatus for secure measurement certification
87086289451System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
87096285873Method for generating a broadcast challenge value
87106285760Method and apparatus for digital signature authentication
87116282648Method and apparatus for secure measurement certification
87126279110Masked digital signatures
87136269446Authenticating images from digital cameras
87146269445Electronic shopping method, electronic shopping system and document authenticating method relating thereto
87156266771Probabilistic signature scheme
87166266680Method for electronically checking authenticity of document
87176263446Method and apparatus for secure distribution of authentication credentials to roaming users
87186263438Method and apparatus for secure document timestamping
87196263436Method and apparatus for simultaneous electronic exchange using a semi-trusted third party
87206263434Signed group criteria
87216263081Elliptic curve calculation apparatus capable of calculating multiples at high speed
87226260145System and method of authentication of digital information
87236259790Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion
87246259789Computer implemented secret object key block cipher encryption and digital signature device and method
87256253323Object-based digital signatures
87266253322Electronic certification authentication method and system
87276249871System and method for using a second resource to store a data element from a first resource in a first-in last-out stack
87286249867Method for transferring sensitive information using initially unsecured communication
87296243812Authentication for secure devices with limited cryptography
87306243467Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form
87316237096System and method for electronic transmission storage and retrieval of authenticated documents
87326237095Apparatus for transfer of secure information between a data carrying module and an electronic device
87336233341System and method for installing and using a temporary certificate at a remote site
87346230269Distributed authentication system and method
87356230266Authentication system and process
87366226743Method for authentication item
87376226742Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message
87386216014Communication system for managing safely and independently a plurality of applications by each user card and corresponding user card and management method
87396215872Method for creating communities of trust in a secure communication system
87406212638Method for generating unpredictable authentication identification symbols
87416212637Method and apparatus for en-bloc verification of plural digital signatures and recording medium with the method recorded thereon
87426212634Certifying authorization in computer networks
87436212281Digital signature protocol
87446209093Technique for producing a privately authenticatable product copy indicia and for authenticating such an indicia
87456209091Multi-step digital signature method and system
87466209090Method and apparatus for providing secure time stamps for documents and computer files
87476201871Secure processing for authentication of a wireless communications device
87486199161Management of authentication keys in a mobile communication system
87496199053Digital signature purpose encoding
87506198824System for providing secure remote command execution network
87516192474Method for establishing a key using over-the-air communication and password protocol and password protocol
87526192130Information security subscriber trust authority transfer system with private key history transfer
87536189098Client/server protocol for proving authenticity
87546189097Digital Certificate
87556189096User authentification using a virtual private key
87566185685Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
87576185682Authentication system
87586185546Apparatus and method for providing secured communications
87596185316Self-authentication apparatus and method
87606182219Apparatus and method for authenticating the dispatch and contents of documents
87616182217Electronic data-processing device and system
87626182215Information devices which select and use one out of plurality of encryption utilization protocols for protecting copyrights of digital productions
87636175923Secure system using images of only part of a body as the key where the part has continuously-changing features
87646175626Digital certificates containing multimedia data extensions
87656173400Methods and systems for establishing a shared secret using an authentication token
87666170058Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use

2000

87676167518Digital signature providing non-repudiation based on biological indicia
87686167516Data file authentication device
87696163842Method and apparatus for embedding authentication information within digital data
87706163841Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures
87716161183Data verifying method apparatus for creating data to be verified and data verifying apparatus
87726161181Secure electronic transactions using a trusted intermediary
87736161180Authentication for secure devices with limited cryptography
87746158005Cloning protection scheme for a digital information playback device
87756158003Method and system for electronic document certification
87766154841Digital signature method and communication system
87776154544Rolling code security system
87786152367Wired logic microcircuit and authentication method having protection against fraudulent detection of a user secret code during authentication
87796149522Method of authenticating game data sets in an electronic casino gaming system
87806148405Method and system for secure lightweight transactions in wireless data networks
87816148404Authentication system using authentication information valid one-time
87826148400Apparatus and method for establishing a crytographic link between elements of a system
87836148084Restrictedly blindable certificates on secret keys
87846141750Simultaneous electronic transactions with subscriber verification
87856141421Method and apparatus for generating hash value
87866137884Simultaneous electronic transactions with visible trusted parties
87876134550Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths
87886134431Personal station authentication system and authentication method
87896134328Secure user certification for electronic commerce employing value metering system
87906134327Method and apparatus for creating communities of trust in a secure communication system
87916134326Simultaneous electronic transactions
87926130623Encryption for modulated backscatter systems
87936128740Computer security system and method with on demand publishing of certificate revocation lists
87946128737Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key
87956125445Public key identification process using two hash functions
87966125185System and method for encryption key generation
87976122736Key agreement and transport protocol with implicit signatures
87986122375Hash value generating method and device, data encryption method and device, data decryption method and device
87996122372System and method for encapsulating transaction messages with verifiable data generated identifiers
88006119227Methods and apparatus for authenticating an originator of a message
88016115818Method and apparatus for embedding authentication information within digital data
88026115472Contents transmission control method with user authentication functions and recording medium with the method recorded thereon
88036111956Method for secure key distribution over a nonsecure communications network
88046111953Method and apparatus for authenticating a document
88056111952Asymmetrical cryptographic communication method and portable object therefore
88066108788Certificate management system and method for a communication security system
88076108783Chameleon hashing and signatures
88086108656Automatic access of electronic information through machine-readable codes on printed documents
88096108425Method and apparatus for controlling the configuration of a cryptographic processor
88106106396Electronic casino gaming system with improved play capacity, authentication and security
88116105133Bilateral authentication and encryption system
88126101605Method and apparatus for performing a secure operation
88136101604Method and apparatus for embedding authentication information within digital data
88146101603System and method for using a second resource to store a data element from a first resource in a first-in last-out stack
88156101254Security method for making secure an authentication method that uses a secret key algorithm
88166097813Digital signature protocol with reduced bandwidth
88176097811Tree-based certificate revocation system
88186094487Apparatus and method for encryption key generation
88196092201Method and apparatus for extending secure communication operations via a shared list
88206092193Authentication of accumulated instrument data
88216092192Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment
88226092191Packet authentication and packet encryption/decryption scheme for security gateway
88236091821Pipelined hardware implementation of a hashing algorithm
88246091816Integrated audio recording and GPS system
88256088798Digital signature method using an elliptic curve, a digital signature system, and a program storage medium having the digital signature method stored therein
88266088454Key management method, encryption system, and sharing digital signature system which have hierarchies
88276085322Method and apparatus for establishing the authenticity of an electronic document
88286085321Unique digital signature
88296085320Client/server protocol for proving authenticity
88306084965Identification scheme, digital signature scheme giving message recovery and digital signature scheme with appendix
88316081899Time stamp authority hierarchy protocol and associated validating system
88326081893System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
88336079018System and method for generating unique secure values for digitally signing documents
88346076163Secure user identification based on constrained polynomials
88356076162Certification of cryptographic keys for chipcards
88366073236Authentication method, communication method, and information processing apparatus
88376073234Device for authenticating user's access rights to resources and method
88386072875Method and apparatus for secure identification of a mobile user in a communication network
88396072874Signing method and apparatus using the same
88406069955System for protection of goods against counterfeiting
88416065117Systems, methods and computer program products for sharing state information between a stateless server and a stateful client
88426061799Removable media for password based authentication in a distributed system
88436061789Secure anonymous information exchange in a network
88446058478Apparatus and method for a vetted field upgrade
88456058476Encryption apparatus for ensuring security in communication between devices
88466058383Computationally efficient method for trusted and dynamic digital objects dissemination
88476055518Secure auction systems
88486055508Method for secure accounting and auditing on a communications network
88496052469Interoperable cryptographic key recovery system with verification by comparison
88506052468Method of securing a cryptographic key
88516052467System for ensuring that the blinding of secret-key certificates is restricted, even if the issuing protocol is performed in parallel mode
88526052365Multi-channel digital data transmission in a wireless telecommunications system
88536049877Systems, methods and computer program products for authorizing common gateway interface application requests
88546049872Method for authenticating a channel in large-scale distributed systems
88556049612File encryption method and system
88566049611One-way data conversion apparatus and device authentication system
88576049610Method and apparatus for digital signature authentication
88586047374Method and apparatus for embedding authentication information within digital data
88596047242Computer system for protecting software and a method for protecting software
88606047072Method for secure key distribution over a nonsecure communications network
88616047066Communication method and device
88626044488Process for generating a check word for a bit sequence for verifying the integrity and authenticity of the bit sequence
88636044463Method and system for message delivery utilizing zero knowledge interactive proof protocol
88646044462Method and apparatus for managing key revocation
88656044350Certificate meter with selectable indemnification provisions
88666041409Device and method for data integrity and authentication
88676039248Method for preparing safe electronic notarized documents in electronic commerce
88686038321Data transfer method, communication system and storage medium
88696038316Method and system for protection of digital information
88706038315Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy
88716035402Virtual certificate authority
88726035398Cryptographic key generation using biometric data
88736035397Process for data certification by scrambling and certification system using such a process
88746034618Device authentication system which allows the authentication function to be changed
88756028938Secure electronic forms permitting layout revision
88766028937Communication device which performs two-way encryption authentication in challenge response format
88776023689Method for secure communication in a telecommunications system
88786023509Digital signature purpose encoding
88796021201Method and apparatus for integrated ciphering and hashing
88806011848Method and system for message delivery utilizing zero knowledge interactive proof protocol

1999

88816009177Enhanced cryptographic system and method with key escrow feature
88826009176How to sign digital streams
88836005487Electronic security system with novel electronic T-handle lock
88846002768Distributed registration and key distribution system and method
88855999628Method and apparatus for improved digital message transaction model
88865999626Digital signatures on a smartcard
88875995624Bilateral authentication and information encryption token system and method
88885991408Identification and security using biometric measurements
88895991407Subscriber authentication in a mobile communications system
88905991406System and method for data recovery
88915991404System for diversifying information in a network for distributing goods or services
88925991401Method and system for checking security of data received by a computer system within a network environment
88935987140System, method and article of manufacture for secure network electronic payment and credit collection
88945987138Identification and/or signature process
88955987134Device and method for authenticating user's access rights to resources
88965987133Electronic authentication system
88975982898Certification process
88985982892System and method for remote authorization for unlocking electronic data
88995982506Method and system for electronic document certification
89005978668Radio communication apparatus
89015978482Method and system for protection of digital information
89025974550Method for strongly authenticating another process in a different address space
89035974150System and method for authentication of goods
89045970148Low cost encryption transponder
89055970147System and method for configuring and registering a cryptographic device
89065966446Time-bracketing infrastructure implementation
89075966445Identification scheme single or multi-digital signature scheme giving message recovery single or multi-digital signature scheme with appendix key exchange scheme and blind digital signature scheme
89085963649Message authorization system for authorizing message for electronic document
89095963644Process and device for making secure a telephone link connecting two subscriber sets
89105960083Certificate revocation system
89115956408Apparatus and method for secure distribution of data
89125956405Implementation efficient encryption and message authentication
89135956404Digital signature with auditing bits
89145956403System and method for access field verification
89155953424Cryptographic system and protocol for establishing secure authenticated remote access
89165949879Auditable security system for the generation of cryptographically protected digital data
89175949877Content protection for transmission systems
89185946397Method of cryptography with public key based on the discrete logarithm
89195946396System and method for ensuring integrity of audio
89205943426Method and apparatus for relaying digitally signed messages
89215940509Method and apparatus for controlling country specific frequency allocation
89225940007Remote control system for motor vehicle related devices
89235940002Security system with random number remote communication
89245936541Method for securing information relevant to a transaction
89255936149Personal date/time notary device
89265933829Automatic access of electronic information through secure machine-readable codes on printed documents
89275933504Strengthened public key protocol
89285933503Controlled modular cryptography apparatus and method
89295930704Reconfigurable subscriber terminal for a wireless telecommunications system
89305926551System and method for certifying content of hard-copy documents
89315926550Peripheral device preventing post-scan modification
89325923763Method and apparatus for secure document timestamping
89335923756Method for providing secure remote command execution over an insecure computer network
89345923668Apparatus and method of establishing a downlink communication path in a wireless telecommunications system
89355918160Subscriber terminal for a wireless telecommunications system
89365915216Apparatus and method of transmitting and receiving information in a wireless telecommunications system
89375915024Electronic signature addition method, electronic signature verification method, and system and computer program product using these methods
89385915021Method for secure communications in a telecommunications system
89395913175Method of making the use of a terminal of a cellular mobile radio system more secure, and corresponding terminal and user card
89405912974Apparatus and method for authentication of printed documents
89415912972Method and apparatus for embedding authentication information within digital data
89425910989Method for the generation of electronic signatures, in particular for smart cards
89435907619Secure compressed imaging
89445905976System of secured payment by the transfer of electronic money through an interbank network
89455905963Subscriber terminal monitor system for a wireless telecommunications system
89465905800Method and system for digital watermarking
89475903651Apparatus and method for demonstrating and confirming the status of a digital certificates and other data
89485901227Method and apparatus for implementing partial and complete optional key escrow
89495898782Method and system to secure the transmission of data elements between a sensor and a recorder
89505898779Photograhic system with selected area image authentication
89515896455Key agreement and transport protocol with implicit signatures
89525894519Process for the dissimulaton of a secret code in a data authentication device
89535892829Method and apparatus for generating secure hash functions
89545889868Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
89555889865Key agreement and transport protocol with implicit signatures
89565889862Method and apparatus for implementing traceable electronic cash
89575884272Method and system for establishing and maintaining user-controlled anonymous communications
89585884270Method and system for facilitating an employment search incorporating user-controlled anonymous communications
89595883958Method and device for data decryption, a method and device for device identification, a recording medium, a method of disk production, and a method and apparatus for disk recording
89605883956Dynamic configuration of a secure processing unit for operations in various environments
89615878144Digital certificates containing multimedia data extensions
89625878142Pocket encrypting and authenticating communications device
89635878140Limited-traceability systems
89645875248Method of counterfeit detection of electronic data stored on a device
89655872849Enhanced cryptographic system and method with key escrow feature
89665872848Method and apparatus for witnessed authentication of electronic documents
89675870476Process for pledging data for a secure data exchange protocol
89685870354Data recording and reproducing apparatus capable of detecting an input for controlling an output
89695869821Credit inquiry service system and method
89705867776Receiver for receiving text-based multiplex broadcasts
89715867578Adaptive multi-step digital signature system and method of operation thereof
89725864667Method for safe communications
89735860099Stored program system with protected memory and secure signature extraction
89745857022Enhanced cryptographic system and method with key escrow feature

1998

89755850451Enhanced cryptographic system and method with key escrow feature
89765841873Methods of detecting decryption errors
89775841865Enhanced cryptographic system and method with key escrow feature
89785838913Control message transmission in telecommunications systems
89795835726System for securing the flow of and selectively modifying packets in a computer network
89805835596International cryptography framework
89815828751Method and apparatus for secure measurement certification
89825825885Bit agitator
89835825880Multi-step digital signature method and system
89845825877Support for portable trusted software
89855825300Method of protected distribution of keying and certificate material
89865822432Method for human-assisted random key generation and application for digital watermark system
89875822430System for encoding encryption/decryption information into IFF challenges
89885818937Telephone tone security device
89895815798Apparatus and method of controlling transmitting power in a subscriber terminal of a wireless telecommunications system
89905812670Traceable anonymous transactions
89915812669Method and system for providing secure EDI over an open network
89925812667Subscriber registration and authentication method
89935809093Apparatus and method of frame aligning information in a wireless telecommunications system
89945805712Apparatus and method for providing secured communications
89955805703Method and apparatus for digital signature authentication
89965805702Method, apparatus, and system for transferring units of value
89975799088Non-deterministic public key encrypton system
89985799086Enhanced cryptographic system and method with key escrow feature
89995799083Event verification system
90005796841Secure user certification for electronic commerce employing value metering system
90015796840Apparatus and method for providing secured communications
90025796833Public key sterilization
90035796832Wireless transaction and information system
90045796830Interoperable cryptographic key recovery system
90055796827System and method for near-field human-body coupling for encrypted communication with identification cards
90065794139Automatic generation of private authentication key for wireless communication systems
90075793868Certificate revocation system
90085793866Communication method and device
90095793302Method for securing information relevant to a transaction
90105790669Lightweight non-repudiation system and method
90115790667Personal authentication method
90125787178Computerized method for signing a message
90135787175Method and apparatus for collaborative document control
90145787172Apparatus and method for establishing a cryptographic link between elements of a system
90155787154Universal authentication device for use over telephone lines
90165784566System and method for negotiating security services and algorithms for communication across a computer network
90175784464System for and method of authenticating a client
90185781723System and method for self-identifying a portable information device to a computing unit
90195781635Method and apparatus for improved digital message transaction model
90205781631Limited-traceability systems
90215781630Method and device for accurately dating an electronic document
90225781629Digital document authentication system
90235778071Pocket encrypting and authenticating communications device
90245774552Method and apparatus for retrieving X.509 certificates from an X.500 directory
90255771292Device and method for data integrity and authentication
90265771287Apparatus and method for secured control of feature set of a programmable device
90275768389Method and system for generation and management of secret key of public key cryptosystem
90285767784Initialization method for keyless entry system
90295761309Authentication system
90305761305Key agreement and transport protocol with implicit signatures
90315757919Cryptographically protected paging subsystem
90325757917Computerized payment system for purchasing goods and services on the internet
90335757913Method and apparatus for data authentication in a data communication environment
90345754659Generation of cryptographic signatures using hash keys
90355754656Electronic shopping method, electronic shopping system and document authenticating method relating thereto
90365751809Apparatus and method for securing captured data transmitted between two sources
90375748782Device for implementing a message signature system and chip card comprising such a device
90385748739Access control for sensitive functions
90395748738System and method for electronic transmission, storage and retrieval of authenticated documents
90405745574Security infrastructure for electronic transactions
90415745573System and method for controlling access to a user secret
90425745496Apparatus and method of establishing a downlink communication path in a wireless telecommunications system
90435745044Electronic security system
90445742685Method for verifying an identification card and recording verification of same
90455742595Processing CDMA signals
90465737419Computer system for securing communications using split private key asymmetric cryptography
90475733047Enciphering system applicable to various keyless entry systems
90485729608Method and system for providing secure key distribution in a communication system
90495729537Method and apparatus for providing anonymous data transfer in a communication system
90505721779Apparatus and methods for verifying the identity of a party
90515719940Method for providing information security by exchanging authentication and signing an electronic signature and apparatus therefor
90525717759Method for certifying public keys in a digital signature scheme
90535717758Witness-based certificate revocation system
90545717757Certificate issue lists
90555715390Method and apparatus for providing upgrades in electricity meters
90565712914Digital certificates containing multimedia data extensions
90575712913Limited-traceability systems
90585708714Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatuses
90595708712Vehicle security device with electronic use authorization coding
90605708710Method and apparatus for authentication in a communication system
90615706349Authenticating remote users in a distributed environment
90625706347Method and system for authenticating a computer network node

1997

90635703950Method and apparatus for controlling country specific frequency allocation
90645699431Method for efficient management of certificate revocation lists and update information
90655696827Secure cryptographic methods for electronic transfer of information
90665696766Apparatus and method of synchronizing a transmitter in a subscriber terminal of a wireless telecommunications system
90675694569Method for protecting a volatile file using a single hash
90685689567Electronic signature method and apparatus
90695689563Method and apparatus for efficient real-time authentication and encryption in a communication system
90705687235Certificate revocation performance optimization
90715682430Secure anonymous message transfer and voting scheme
90725680455Digital signature generator /verifier/ recorder (DS-GVR) for analog transmissions
90735677955Electronic funds transfer instruments
90745673318Method and apparatus for data authentication in a data communication environment
90755673316Creation and distribution of cryptographic envelope
90765671285Secure communication system
90775671283Secure communication system with cross linked cryptographic codes
90785668878Secure cryptographic methods for electronic transfer of information
90795666420Simultaneous electronic transactions
90805666416Certificate revocation system
90815666415Method and apparatus for cryptographic authentication
90825664016Method of building fast MACS from hash functions
90835661807Authentication system using one-time passwords
90845661806Process of combined authentication of a telecommunication terminal and of a user module
90855661805Signature verification apparatus capable of obtaining information required for a document recipient by using an apparatus's verification key alone
90865659617Method for providing location certificates
90875659616Method for securely using digital signatures in a commercial cryptographic system
90885659613Method and apparatus for copy protection for various recording media using a video finger print
90895657388Method and apparatus for utilizing a token for resource access
90905655021Method for checking data sequences
90915651069Software-efficient message authentication
90925651068International cryptography framework
90935649014Pseudorandom composition-based cryptographic authentication process
90945646998Secure transaction system and method utilized therein
90955646997Method and apparatus for embedding authentication information within digital data
90965643086Electronic casino gaming apparatus with improved play capacity, authentication and security
90975642401System and method of authenticating a service request in a mobile communication system
90985640454System and method for access field verification
90995638447Compact digital signatures
91005638446Method for the secure distribution of electronic files in a distributed environment
91015636280Dual key reflexive encryption security system
91025633932Apparatus and method for preventing disclosure through user-authentication at a printing node
91035633931Method and apparatus for calculating message signatures in advance
91045631962Circuit and method of encrypting key validation
91055629982Simultaneous electronic transactions with visible trusted parties
91065627893Cryptographic method
91075625695Process for generating DSA signatures with low-cost portable apparatuses
91085623545Automatic data generation for self-test of cryptographic hash algorithms in personal security devices
91095621798Method and apparatus for cooperative messaging
91105621796Transferring information between transaction networks
91115619575Pseudorandom composition-based cryptographic authentication process
91125619573Vehicle security device with electronic use authorization coding
91135615268System and method for electronic transmission storage and retrieval of authenticated documents
91145613001Digital signature verification technology for smart credit card and internet applications
91155610982Compact certification with threshold signatures
91165608801Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions
91175608800Process for detecting unauthorized introduction of any data transmitted by a transmitter to a receiver
91185606617Secret-key certificates
91195606609Electronic document verification system and method
91205604805Privacy-protected transfer of electronic information
91215604804Method for certifying public keys in a digital signature scheme
91225602918Application level security system and method
91235600725Digital signature method and key agreement method
91245598476Random clock composition-based cryptographic authentication process and locking system
91255598475Rolling code identification scheme for remote control applications
91265598473Digital signature generator/verifier/recorder (DS-GVR) for analog transmissions
91275598459Authentication and handover methods and systems for radio personal communications
91285596641Authentication method for mobile communications
91295592553Authentication system using one-time passwords

1996

91305590199Electronic information network user authentication and authorization system
91315590197Electronic payment system and method
91325587809System and a process for transmission of secure faxes
91335581616Method and apparatus for digital signature authentication
91345581615Scheme for authentication of at least one prover by a verifier
91355579485Apparatus for remote implementation of a command
91365579393System and method for secure medical and dental record interchange
91375577121Transaction system for integrated circuit cards
91385577120Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transaction or the like
91395572193Method for authentication and protection of subscribers in telecommunications systems
91405568554Method for improving the processing and storage performance of digital signature schemes
91415559885Two stage read-write method for transaction cards
91425557765System and method for data recovery
91435557346System and method for key escrow encryption
91445555307Device and process for rendering secure the transmission of faxes, as well as fax unit which has been made secure and incorporating such a device
91455555303Secure transaction system and method utilized therein
91465553145Simultaneous electronic transactions with visible trusted parties
91475546463Pocket encrypting and authenticating communications device
91485544322System and method for policy-based inter-realm authentication within a distributed processing system
91495544245Mutual authentication/cipher key delivery system
91505541581Electronic combination lock security system
91515539828Apparatus and method for providing secured communications
91525539826Method for message authentication from non-malleable crypto systems
91535539824Method and system for key distribution and authentication in a data communication network
91545537475Efficient digital signature algorithm and use thereof technical field
91555535276Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
91565530757Distributed fingerprints for information integrity verification
91575528231Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process
91585524073Secure transaction system and method utilized therein
91595521980Privacy-protected transfer of electronic information
91605515441Secure communication method and apparatus
91615513260Method and apparatus for copy protection for various recording media
91625513245Automatic generation of private authentication key for wireless communication systems
91635511121Efficient electronic money
91645506905Authentication method for keyless entry system
91655504817Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications
91665502765Method and apparatus for settlement of accounts by IC cards
91675502764Method, identification device and verification device for identificaiton and/or performing digital signature
91685500897Client/server based secure timekeeping system
91695499296Natural input encryption and method of use
91705499294Digital camera with apparatus for authentication of images produced from an image file
91715497423Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication
91725497422Message protection mechanism and graphical user interface therefor
91735495533Personal key archive
91745495532Secure electronic voting using partially compatible homomorphisms
91755493614Private signature and proof systems
91765491752System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
91775491750Method and apparatus for three-party entity authentication and key distribution using message authentication codes
91785491749Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks
91795485519Enhanced security for a secure token code
91805483597Authentication process for at least one identification device using a verification device and a device embodying the process

1995

91815479512Method and apparatus for performing concryption
91825479511Method, sender apparatus and receiver apparatus for modulo operation
91835475826Method for protecting a volatile file using a single hash
91845475763Method of deriving a per-message signature for a DSS or El Gamal encryption system
91855473689Method for authentication between two electronic devices
91865469507Secure communication and computation in an insecure environment
91875465299Electronic document processing system and method of forming digital signature
91885463690Method and apparatus for public key exchange in a cryptographic system
91895457747Anti-fraud verification system using a data card
91905455865Robust packet routing over a distributed network containing malicious failures
91915455863Method and apparatus for efficient real-time authentication and encryption in a communication system
91925452357Method and apparatus for access control and/or identification
91935450493Secure communication method and apparatus
91945448639Digital signature device
91955448638Security apparatus and system for retail environments
91965446796Method and apparatus for settlement of accounts by IC cards
91975444780Client/server based secure timekeeping system
91985442707Method for generating and verifying electronic signatures and privacy communication using elliptic curves
91995440635Cryptographic protocol for remote authentication
92005434919Compact endorsement signature systems
92015432852Large provably fast and secure digital signature schemes based on secure hash functions
92025422953Personal date/time notary device
92035420927Method for certifying public keys in a digital signature scheme
92045420925Rolling code encryption process for remote keyless entry system
92055414772System for improving the digital signature algorithm
92065412727Anti-fraud voter registration and voting system using a data card
92075412726Telecommunication installation with secure remote loading of prepayment means and corresponding remote loading process
92085406628Public key authentication and key agreement for low-cost terminals
92095406619Universal authentication device for use over telephone lines
92105402490Process for improving public key authentication
92115398285Method for generating a password using public key cryptography
92125396558Method and apparatus for settlement of accounts by IC cards
92135392355Secure communication system
92145390252Authentication method and communication terminal and communication processing unit using the method
92155390247Method and apparatus for creating, supporting, and using travelling programs
92165388158Secure document and method and apparatus for producing and authenticating same
92175386468Method of registering identification number in personal communication terminal
92185384850Security apparatus and system for retail environments
92195384847Method and apparatus for protecting cordless telephone account authentication information
92205384846System and apparatus for controlled production of a secure identification card
92215379343Detection of unauthorized use of software applications in communication units

1994

92225377270Cryptographic authentication of transmitted messages using pseudorandom numbers
92235377267Method of authentication with improved security for secrecy of authentication key
92245375170Efficient signature scheme based on birational permutations
92255373561Method of extending the validity of a cryptographic certificate
92265373558Desinated-confirmer signature systems
92275371796Data communication system
92285371794Method and apparatus for privacy and authentication in wireless networks
92295369707Secure network method and apparatus
92305369705Multi-party secure session/conference
92315367573Signature data object
92325365589Method and apparatus for encryption, decryption and authentication using dynamical systems
92335363449Personal identification encryptor and method
92345363448Pseudorandom number generation and cryptographic authentication
92355355412Identifying secret data messages in a one-direction multipoint network
92365351302Method for authenticating objects identified by images or other identifying information
92375351295Secure method of neighbor discovery over a multiaccess medium
92385351293System method and apparatus for authenticating an encrypted signal
92395349643System and method for secure initial program load for diskless workstations
92405349642Method and apparatus for authentication of client server communication
92415347650Device for transforming a digital data sequence into a condensed digital data block using tables and logic operators
92425347581Verification process for a communication system
92435347580Authentication method and system with a smartcard
92445347579Personal computer diary
92455345507Secure message authentication for binary additive stream cipher systems
92465345506Mutual authentication/cipher key distribution system
92475343529Transaction authentication using a centrally generated transaction identifier
92485341428Multiple cross-check document verification system
92495339361System and method for authenticating transmission and receipt of electronic information
92505337360Method and apparatus for creating, supporting, and using travelling programs
92515337358Apparatus for recording a transaction including authenticating an identification card
92525323146Method for authenticating the user of a data station connected to a computer system
92535319711Wireless device for verifying identification
92545319710Method and means for combining and managing personal verification and message authentication encrytions for network transmission
92555317637Data exchange system with a check of the apparatus for its authentication status
92565315658Fair cryptosystems and methods of use
92575311596Continuous authentication using an in-band or out-of-band side channel
92585307523Protective eyewear
92595307411Means for identification and exchange of encryption keys
92605299263Two-way public key authentication and key agreement for low-cost terminals
92615299262Method for exponentiating in cryptographic systems
92625295188Public key encryption and decryption circuitry and method
92635293576Command authentication process
92645278904Method of verifying identification
92655276737Fair cryptosystems and methods of use
92665276736Optionally moderated transaction systems

1993

92675271061Method and apparatus for public key exchange in a cryptographic system
92685268963System for encoding personalized identification for storage on memory storage devices
92695267314Secure transaction system and method utilized therein
92705263085Fast signature scheme based on sequentially linearized equations
92715261070Method and apparatus for forming unique user identification data at remote terminal for secure transmission of data from host terminal
92725261002Method of issuance and revocation of certificates of authenticity used in public key networks and other systems
92735259025Method of verifying fake-proof video identification data
92745253295Process for authentication, by an outside medium, of a portable object connected to that medium via a transmission line and system for carrying out the process
92755249230Authentication system
92765247577Methods and apparatus for securely enabling features in highly integrated electronic circuits
92775245657Verification method and apparatus
92785245656Security method for private information delivery and filtering in public networks
92795243652Location-sensitive remote database access control
92805241600Vertification system for credit or bank card or the like
92815241598Rolling key resynchronization in cellular verification and validation system
92825241594One-time logon means and methods for distributed computing systems
92835239584Method and apparatus for encryption/authentication of data in energy metering applications
92845239294Method and apparatus for authenication and protection of subscribers in telecommunication systems
92855237614Integrated network security system
92865237612Cellular verification and validation system
92875235642Access control subsystem and method for distributed computer system using locally cached authentication credentials
92885231668Digital signature algorithm
92895231666Cryptographic method for updating financial records
92905228084Security apparatus and system for retail environments
92915226079Non-repudiation in computer networks
92925224163Method for delegating authorization from one entity to another through the use of session encryption keys
92935224162Electronic cash system
92945222140Cryptographic method for key agreement and user authentication
92955222138Remote signature rendering system & apparatus
92965222136Encrypted communication system
92975218637Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization
92985216715Key distribution in public communication networks taking account of security gradations
92995214702Public key/signature cryptosystem with enhanced digital signature certification
93005214700Method for obtaining a securitized cleartext attestation in a distributed data processing system environment
93015210795Secure user authentication from personal computer
93025208858Method for allocating useful data to a specific originator
93035208853Method and apparatus for usage protection of data files using split key and unique variable
93045204902Cellular telephony authentication arrangement
93055202921Method and apparatus for authenticating users of a communication system to each other
93065196840Secure communications system for remotely located computers
93075193114Consumer oriented smart card system and authentication techniques
93085191613Knowledge based system for document authentication
93095189700Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents
93105185795Authentication of rekey messages in a communication system

1992

93115175765Robust data broadcast over a distributed network with malicious failures
93125172414Speech and control message encrypton in cellular radio
93135170431Electronic bolt lock with enhanced security features
93145164988Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
93155164986Formation of rekey messages in a communication system
93165163098System for preventing fraudulent use of credit card
93175163091Knowledge based system for document authentication (apparatus)
93185159634Cryptosystem for cellular telephony
93195159632Method and apparatus for public key exchange in a cryptographic system
93205157726Document copy authentication
93215153919Service provision authentication protocol
93225153581Method for authentication by an external medium of a portable object such as a memory card coupled to this medium
93235150411Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction
93245148481Transaction system security method and apparatus
93255148479Authentication protocols in communication networks
93265148007Method for generating random number for the encoded transmission of data
93275144667Method of secure remote access
93285142577Method and apparatus for authenticating messages
93295140634Method and apparatus for authenticating accreditations and for authenticating and signing messages
93305140317Electronic security system
93315136647Method for secure time-stamping of digital documents
93325136646Digital document time-stamping with catenate certificate
93335136643Public/key date-time notary facility
93345131039Optionally moderated transaction systems
93355131038Portable authentification system
93365101430Method and device for generating and for validating a digital message and application of such a device
93375091942Authentication system for digital cellular communications

1991

93385068894Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system
93395060263Computer access control system and method
93405056140Communication security accessing system and process
93415048085Transaction system security method and apparatus
93425046094Server-aided computation method and distributed information processing unit
93435031214Document authentication apparatus
93445022080Electronic notary
93455020105Field initialized authentication system for protective security of electronic information networks
93465018196Method for electronic transaction with digital signature
93475016274On-line/off-line digital signing
93485010573Cryptographic system by blocs of binery data
93495005200Public key/signature cryptosystem with enhanced digital signature certification
93505001752Public/key date-time notary facility
93514996711Selected-exponent signature systems
93524995082Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system
93534993068Unforgeable personal identification system
93544993067Secure satellite over-the-air rekeying method and system
93554991210Unpredictable blind signature systems
93564987593One-show blind signature systems
93574981370Document authentication apparatus

1990

93584977595Method and apparatus for implementing electronic cash
93594969189Authentication system and apparatus therefor
93604965827Authenticator
93614965568Multilevel security apparatus and method with personal key
93624962532Method for providing notification of classified electronic message delivery restriction
93634956863Cryptographic method and apparatus for public key exchange with authentication
93644949380Returned-value blind signature systems
93654947430Undeniable signature systems
93664935962Method and system for authentication
93674933970Variants of the fiat-shamir identification and signature scheme
93684932056Method and apparatus for user identification based on permuted kernels
93694926480Card-computer moderated systems
93704926479Multiprover interactive verification system
93714924514Personal identification number processing using control vectors
93724919545Distributed security procedure for intelligent networks
93734914698One-show blind signature systems
93744908861Data authentication using modification detection codes based on a public one way encryption function
93754907272Method for authenticating an external authorizing datum by a portable object, such as a memory card
93764907270Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line
93774897875Key management system for open communication environments

1989

93784890323Data communication systems and methods
93794888801Hierarchical key management system
93804885777Electronic transaction system
93814881264Digital signature system and method based on a conventional encryption function
93824868877Public key/signature cryptosystem with enhanced digital signature certification
93834866707Secure messaging systems
93844860352Satellite communication system and method with message authentication suitable for use in financial institutions
93854823388Communications network using an enciphering and deciphering device
93864816651Process and apparatus for the simultaneous and remote reading and certifying of an information present in a memory of an electronic medium
93874802217Method and apparatus for securing access to a computer facility
93884799061Secure component authentication system

1988

93894783798Encrypting transponder
93904759064Blind unanticipated signature systems
93914759063Blind signature systems
93924748668Method, apparatus and article for identification and signature
93934731841Field initialized authentication system for protective security of electronic information networks
93944723284Authentication system
93954720859Method and system for the mutual encyphered indentification between data communicating stations and stations for use with such method and system

1987

93964694492Computer communications security control system
93974691355Interactive security control system for computer communications and the like
93984677670Paired-secure message identification controller for computers and the like
93994665396Validation check for remote digital station
94004661658Offline PIN validation with DES
94014656474Process and apparatus for authenticating the signature of a signed message
94024649233Method for establishing user authenication with composite session keys among cryptographically communicating nodes

1986

94034633037Generation of identification keys
94044625076Signed document transmission system
94054612413Authentication system between a card reader and a pay card exchanging data
94064578532Method and apparatus for code transmission

1985

94074549075Method for certifying the origin of at least one item of information stored in the memory of a first electronic device and transmitted to a second electronic device, and system for carrying out the method
94084544833Process and apparatus for authenticating or certifying at least one item of information contained in a memory of a removable and portable electronic carrier, such as a card
94094500750Cryptographic application for interbank verification
94104498000Security method and device for communicating confidential data via an intermediate stage

1984

94114467139Process and system for transmission of signed messages
94124458109Method and apparatus providing registered mail features in an electronic communication system
94134438824Apparatus and method for cryptographic identity verification

1983

94144393269Method and apparatus incorporating a one-way sequence for transaction and identity verification
94154386233Crytographic key notarization methods and apparatus

1982

94164349695Recipient and message authentication method and system
94174326098High security system for electronic signature verification
94184314097Authenticator device for precluding compensating text modifications in transmitted messages
94194310720Computer accessing system
94204309569Method of providing digital signatures

1981

94214304961Authenticator code generator
94224264782Method and apparatus for transaction and identity verification
94234259720Security system for electronic funds transfer system

1980

94244223403Cryptographic architecture for use with a high security personal identification system
94254206315Digital signature system and apparatus

1979

94264159468Communications line authentication device
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017