Patent application number | Description | Published |
20080262968 | SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES - Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application. | 10-23-2008 |
20090019501 | CONTENT LICENSING AND CONDITIONAL ACCESS USING A MOBILE DEVICE - Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted. | 01-15-2009 |
20090150983 | SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION - A method and system to authenticate human interactive proof (HIP) are described here. In response to a request from a web server, a motion random HIP in the form of motion-captcha is generated. The web server can then display the generated the motion random HIP in a requested web page. The web page is accompanied with a request from the user to provide the response for the generated motion captcha. After evaluation and verification of response received from the particular user, the authentication system determine whether the response to the HIP challenge is from human or from other source like computer software scripted agent. | 06-11-2009 |
20090281974 | System and method for adaptive data masking - A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value. | 11-12-2009 |
20100082494 | METHOD AND SYSTEM FOR CASH TRANSFER - A method and system for transferring cash electronically from a sender to a receiver through cash machines and a mobile device is disclosed. On initiation of a transaction by a sender on a cash machine, a coupon containing details of the transaction is generated by the system. The coupon is sent to the mobile device of the receiver. The receiver uses the coupon for withdrawing cash from a designated cash machine. On withdrawal of the cash by the receiver, the sender receives a confirmation from a bank. | 04-01-2010 |
20110099107 | METHOD FOR MONEY TRANSFER USING A MOBILE DEVICE - A method and system to mobile based money transaction across different transaction entity. A non-repudiable message, using a first mobile device, is sent to a first transaction entity expressing to provide a token wherein the mobile device is registered with the first transaction entity. The first transaction entity provides a generated token to the first mobile device using non-repudiable messaging services. The first mobile, in turn, transfers the non-repudiable message to a second mobile device of a second user including a token and a transaction entity code. The second mobile device sends the non-repudiable message to a second transaction entity, indicating a token number, a transaction entity code, and sum of money being transferred. The second transaction entity advances the token number, via a non-repudiable message, to a transaction entity indicated by the transaction code to authenticate the token. The first transaction entity authenticates token on receiving from second transaction entity and money being transferred for genuine token as indicated by first transaction machine. Alternatively, the second transaction entity transfers the equivalent sum of money to the first transaction entity indicating money should be transferred to the linked account of the token. | 04-28-2011 |
20110162054 | FIRMWARE AND METHOD FOR GENERATING ONE TIME PASSWORDS (OTPs) FOR APPLICATIONS - The invention describes a method, firmware, and computer program product for generating one or more One Time Passwords (OTPs) for one or more applications. The firmware embedded in a computational device receives one or more registration details corresponding to an application from a user. Thereafter, the firmware generates a Dynamic Information Number (DIN) based on at least one of the registration details and an application identifier (SIID). The user registers with the application with the DIN and at least one of the registration details. Further, the user may access the application using an OTP generated by the firmware based on the DIN and the application identifier. | 06-30-2011 |
20110209076 | SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION - A method & system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs from the user, the correct information of the said captcha & the user's input is compared. If the user's input and the correct information of the captcha object matches then the user is authenticated as human, else the user is authenticated as not a human. | 08-25-2011 |
20110321120 | METHOD AND SYSTEM FOR PROVIDING MASKING SERVICES - A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is authorized to access the requested application data. For an authorized user, a category of the user is determined to ascertain whether the user is privileged to obtain full access. In case the user is a privileged user, unmasked application data is fetched from a database utility and provided to the user. In case the user is not a privileged user, application data access request is transferred to a data masking service. Application data is fetched from database utility, masked based on pre-defined masking rules and provided to the user. | 12-29-2011 |
20110321164 | METHOD AND SYSTEM FOR ADAPTIVE VULNERABILITY SCANNING OF AN APPLICATION - A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability. | 12-29-2011 |
20120005169 | METHOD AND SYSTEM FOR SECURING DATA - Disclosed are methods and computer program product for securing data corresponding to one or more data fields of a form by providing data integrity, confidentiality and non-repudiation. The present invention includes providing one or more controls for enabling selection of at least one security type for each of the data fields corresponding to the form. Further, at least one security routine is implemented for the data fields to produce corresponding secured data. The at least one security routine corresponds to the selected at least one security type. Further, a system for securing the data is also disclosed. | 01-05-2012 |