1
Eric M Olden: Security and access management system for web-enabled and non-web-enabled applications and content on a computer network. RSA Security, Testa Hurwitz & Thibeault, October 1, 2002: US06460141 (641 worldwide citation)

A security and access management system provides unified access management to address the specific problems facing the deployment of security for the Web and non-Web environment. Unified access management consists of strategic approaches to unify all key aspects of Web and non-Web security policies, ...


2
Burton S Kaliski Jr: Client/server protocol for proving authenticity. RSA Security, Testa Hurwitz & Thibeault, July 4, 2000: US06085320 (438 worldwide citation)

A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a ...


3
Burton S Kaliski Jr: Client/server protocol for proving authenticity. RSA Security, Testa Hurwitz & Thibeault, February 13, 2001: US06189098 (375 worldwide citation)

A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a ...


4
Todd D Graham, Jonathan C Hudson: Dynamic file access control and management. RSA Security, BainwoodHuang, February 9, 2010: US07660902 (284 worldwide citation)

A dynamic file access control and management system and method in accordance with the present invention may be a proxy file management system that includes one or more file system proxy servers that provide selective access and usage management to files available from one or more file systems or sou ...


5
John G Brainard, Burton S Kaliski Jr, Magnus Nyström, Ronald L Rivest: System and method for authentication seed distribution. RSA Security, Wilmer Cutler Pickering Hale and Dorr, January 10, 2006: US06985583 (271 worldwide citation)

In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation funct ...


6
Louis A Gasparini, Charles E Gotlieb: Method and apparatus for authentication of users and web sites. RSA Security, Innovation Partners, Charles E Gotlieb, August 29, 2006: US07100049 (271 worldwide citation)

A system and method allows a user to authenticate a web site, a web site to authenticate a user, or both. When a user requests a web page from the web site, customization information that is recognizable to the user is provided to allow the user to authenticate the web site. A signed, encrypted cook ...


7
James Donald Nisbet, James Christopher Wiese, David Alexander Reizes, Stephen Crosby Hoyt: Inferring document and content sensitivity from public account accessibility. RSA Security, PatentVentures, Bennett Smith, Korbin Van Dyke, April 7, 2009: US07516492 (253 worldwide citation)

In one embodiment, documents accessible via a designated public account are classified as public. In another embodiment, documents accessible according to a designated public access control list are classified as public. In some embodiments, all documents not classified as public are classified as p ...


8
Kenneth P Weiss: Method and apparatus for inhibiting unauthorized access to or utilization of a protected device. RSA Security, Testa Hurwitz & Thibeault, October 10, 2000: US06130621 (251 worldwide citation)

A method and apparatus for inhibiting unauthorized access to or utilization of a container or other protected device wherein a free standing lock or other control is provided, the state of which may be varied in response to receipt of a dynamic non-predictable code. The device may be a lock which wh ...


9
John G Brainard, Burton S Kaliski Jr, Ronald L Rivest: Method and apparatus for performing enhanced time-based authentication. RSA Security, BainwoodHuang, April 22, 2008: US07363494 (225 worldwide citation)

A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a perso ...


10
Ari Juels, Niklas Frykholm: Robust visual passwords. RSA Security, Wilmer Cutler Pickering Hale and Dorr, May 15, 2007: US07219368 (222 worldwide citation)

Enrollment and authentication of a user based on a sequence of discrete graphical choices is described. A graphical interface presents various images and memory cues that a user may associate with their original graphical choices. Enrollment may require the input to have a security parameter value t ...