1
Bjorn Markus Jakobsson: Systems and methods for authenticating a user and device. eBay, Haynes and Boone, March 3, 2015: US08973102 (45 worldwide citation)

Systems and methods for authenticating a user request for authentication are provided. An authentication device that may be part of such a system includes a network interface component coupled to a network and configured to receive at least one data packet having authentication information including ...


2
David Wentker, Michael Lindelsee, Olivier Brand, James Dimmick, Tribhuwan A Singh Grewal: Remote authentication system. Visa U, Kilpatrick Townsend & Stockton, October 13, 2015: US09160741 (40 worldwide citation)

One embodiment of the invention is directed to a method including receiving an alias identifier associated with an account associated with a presenter, determining an associated trusted party using the alias identifier, sending a verification request message to the trusted party after determining th ...


3
Gary Barton, James Robert Walker, Nitin Desai, Zhongmin Lang: Policy-based application management. Citrix Systems, Banner & Witcoff, December 15, 2015: US09213850 (35 worldwide citation)

Improved techniques for managing enterprise applications on mobile devices are described herein. Each enterprise mobile application running on the mobile device has an associated policy through which it interacts with its environment. The policy selectively blocks or allows activities involving the ...


4
Deb Banerjee: Method and system for visibility and control over access transactions between clouds using resource authorization messages. Symantec Corporation, Lowenstein Sandler, January 6, 2015: US08931041 (30 worldwide citation)

A computing system detects an access transaction based on one or more resource authorization messages transmitted via a resource authorization protocol. The access transaction pertains to access of a protected resource by a consumer cloud, the protected resource hosted by a provider cloud. The compu ...


5
Amjad Hussain, Andrew Eremenko, Mahadeva Kumar Alladi, Sriram Sampath, Tristan William Scott, Travis Michael Howe, Ido Miles Ben Shachar: User authentication in a cloud environment. Microsoft Technology Licensing, Timothy Churna, Sade Fashokun, Micky Minhas, September 1, 2015: US09124569 (26 worldwide citation)

Embodiments are directed to authenticating a user to a remote application provisioning service. In one scenario, a client computer system receives authentication credentials from a user at to authenticate the user to a remote application provisioning service that provides virtual machine-hosted remo ...


6
Robert B Lord, Terry N Hayes, Justin Ubertin: Secure instant messaging system. Google, June 30, 2015: US09071597 (23 worldwide citation)

A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. ...


7
William Rodgers Ackerly: Methods and systems for distributing cryptographic data to trusted recipients. Virtru Corporation, Hyperion Law, Cynthia M Gilbert, December 29, 2015: US09225709 (22 worldwide citation)

A method for distributing cryptographic data to trusted recipients includes receiving, by an access control management system, from a first client device, information associated with an encrypted data object, the information including an identification of a platform for generating an integrity measu ...


8
Rakesh Radhakrishnan, Cynthia Ann Frick, Radu Marian, Abdulkader Omar Barbir, Rajat P Badhwar: Method and apparatus for token-based tamper detection. Bank of America Corporation, Michael A Springs, June 30, 2015: US09069943 (18 worldwide citation)

According to one embodiment, an apparatus may store: a hard token representing identification information of the device, a network token representing the status of a network, and a resource token representing information associated with a resource. The apparatus may further store secured copies of t ...


9
Rakesh Radhakrishnan, Cynthia Ann Frick, Radu Marian, Abdulkader Omar Barbir, Rajat P Badhwar: Method and apparatus for token-based combining of risk ratings. Bank of America Corporation, Michael A Springs, June 9, 2015: US09055053 (18 worldwide citation)

According to one embodiment, an apparatus may store a plurality of tokens. The plurality of tokens may include a plurality of risk tokens. Each risk token may represent a risk rating. The risk rating may be a numerical value indicating a risk associated with granting a particular user access to a pa ...


10
Jay D Logue: In-field smart device updates. Google, September 8, 2015: US09130910 (12 worldwide citation)

Methods and systems for causing a device to join a network or fabric. A joining device sends an indication that the electronic device is not connected to a network type and receives a device ID for an assisting device to assist the electronic device in joining a network of the network type. Moreover ...