Pin/password Generator Device Patents (Class 713/184)
-
Patent number: 9167432Abstract: Systems and methods for implementing security features of a mobile electronic device. The mobile electronic device comprises a first security module configured to implement a first security operation and a second security module configured to implement a second security operation. The method includes: detecting a first security event; implementing a first security operation by the first security module; triggering a second security event; and implementing a second security operation by the second security module. The first security operation includes triggering the second security event.Type: GrantFiled: March 21, 2012Date of Patent: October 20, 2015Assignee: BlackBerry LimitedInventor: Christopher James Ould
-
Patent number: 9147081Abstract: The presently disclosed subject relates at least to a method and system for controlling access to a logical unit (LU) in a logical storage space, available to a given initiator, representing a corresponding physical storage space, said logical storage space being accessible via a storage control layer, said storage control layer being associated with a security manager. A first value is generated by the security manager, based on a secret key, and transmitted to host requesting permission to access the logical storage space, while the secret key is made available to a target associated with the logical storage space. The host sends to the control device an access related request, the request comprising a second value which was generated based on the first value. Responsive to the command the target calculates the first value, based on the secret key and the second value based on the first value.Type: GrantFiled: July 26, 2011Date of Patent: September 29, 2015Assignee: INFINIDAT LTD.Inventor: Julian Satran
-
Patent number: 9130919Abstract: A device is configured to receive an authentication credential from a user device, and is configured to authenticate the user device based on the authentication credential. The device is configured to transmit, based on authenticating the user device, a first application for establishing a tunnel that permits the user device to access a second application using an Internet protocol multimedia subsystem (IMS) network architecture. The device is configured to establish, based on the first application, a tunnel for transferring IMS traffic to or from the user device, and is configured to transfer the IMS traffic to or from the user device, using the tunnel, where transferring the IMS traffic permits the user device to access the second application.Type: GrantFiled: October 15, 2012Date of Patent: September 8, 2015Assignees: Verizon Patent and Licensing Inc., Cellco PartnershipInventors: Thomas W. Haynes, Steven R. Rados, Priscilla Lau, Patricia R. Chang, Sagiv Draznin, Lalit R. Kotecha
-
Patent number: 9122310Abstract: An input device and method for protecting input information from exposure, in which the time of input of information is determined using a tactile output to protect the input information from being exposed. The input device for protecting input information from exposure includes a user-input module for receiving predetermined input information from a user, a control module for setting the information inputted in association with a tactile signal among the input information as user-input information, and a tactile-output-generation module for generating and providing the tactile signal to the user-input module under the control of the control module.Type: GrantFiled: April 10, 2013Date of Patent: September 1, 2015Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Byung-Seok Soh, Kyu-yong Kim, Sang-youn Kim, Gyung-hye Yang, Yong-beom Lee
-
Patent number: 9082121Abstract: Systems and methods are provided for facilitating guided entry of a passcode. The exemplary guided passcode entry system provides additional security to traditional secret PIN or passcode entry systems by generating a randomized input sequence (order of entry) and prompting the user to input the passcode according to the randomized input sequence. The system also causes a test of the user's input data against a database of passcodes associated with the particular user for an exact match. The testing step can include comparing the characters of the input data to a particular passcode associated with the user which is stored in a database in accordance with the randomized input sequence in regard to the order that the input data was received. Based on the comparison of the received pin to the stored pin, the system can advance the transaction with the user.Type: GrantFiled: October 23, 2013Date of Patent: July 14, 2015Assignee: MASTERCARD INTERNATIONAL INCORPORATEDInventor: Mohammed Sadiq
-
Patent number: 9055029Abstract: A multifactor authentication (MFA) enforcement server provides multifactor authentication services to users and existing services. During registration, the MFA enforcement server changes a user's password on an existing service to a password unknown to the user. During normal usage when the user accesses the existing service through the MFA enforcement server, the MFA enforcement server enforces a multifactor authentication enforcement policy.Type: GrantFiled: May 29, 2014Date of Patent: June 9, 2015Assignee: Tyfone, INC.Inventors: Siva G. Narendra, Donald Allen Bloodworth, Todd Raymond Nuzum
-
Publication number: 20150149787Abstract: Apparatus, systems, and methods may operate to invoke multiple authentication mechanisms, by a client node, to encrypt N split-keys using credentials associated with corresponding ones of the authentication mechanisms. Further activity may include transforming the split-keys to provide N encrypted split-keys, and storing each of the encrypted split-keys with an associated local user identity and an identity of corresponding ones of the authentication mechanisms. Additional apparatus, systems, and methods are disclosed.Type: ApplicationFiled: November 25, 2013Publication date: May 28, 2015Applicant: Novell, Inc.Inventors: Santosh Kumar Panchapakesan, Vinayak Hegde
-
Patent number: 9043938Abstract: The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access.Type: GrantFiled: August 31, 2012Date of Patent: May 26, 2015Assignee: Rockwell Collins, Inc.Inventors: Kaushik Raghu, Ivan N. Hall, Jesse B. Pate
-
Patent number: 9043237Abstract: Embodiments of the invention provide methods and systems for performing a payment transaction. A method for performing a payment transaction may include receiving purchase information from a merchant and associating the purchase information with an identifier. The method may also include transmitting the identifier to the merchant and receiving the identifier from a wireless device of a customer. The wireless device may obtain the identifier by receiving a code from a merchant device and by interpreting the code. The method may additionally include associating the identifier with the purchasing information, determining a payment account associated with the customer, transmitting a request to a payment service provider system to provide funds for the payment transaction, and receiving an authorization from the payment service provider system to provide the funds. The method may additionally include transmitting a confirmation of the authorization to the merchant.Type: GrantFiled: September 21, 2011Date of Patent: May 26, 2015Assignee: Fexco Merchant ServicesInventor: John F. McCarthy
-
Patent number: 9043596Abstract: Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value.Type: GrantFiled: July 2, 2010Date of Patent: May 26, 2015Assignee: SAMSUNG ELECTRONICS CO., LTD.Inventors: Bae-eun Jung, Tae-sung Park
-
Patent number: 9037865Abstract: Securely providing secret information, such as PINs, to users via an encrypted electronic document is disclosed. The user might receive the encrypted electronic document as an attachment to an e-mail or might access the encrypted electronic document from a web site, as two examples. In order to open the encrypted electronic document, the user may need to provide some information that is on a physical banking card that was issued to the user. Therefore, an extra level of security is provided in that the user needs to be in possession of the physical banking card that may have been delivered by traditional mail, as well as the encrypted electronic document which is delivered via an electronic network.Type: GrantFiled: March 4, 2013Date of Patent: May 19, 2015Assignee: CA, Inc.Inventor: Rajendra A. Gopalakrishna
-
Patent number: 9032508Abstract: A pattern password trajectory configuration system used in an electronic device with a graphics input interface and a method using the same are provided. The disclosed pattern password trajectory configuration system includes a central processing module, a pattern defining module electronically connected the central processing module for defining the graphics input interface into a central block and multiple blocks neighboring the central block and assigning different data codes to the different blocks neighboring the central block, a sliding direction defining module electronically connected to the central processing module for assigning different prime numbers to define different sliding directions moving along the blocks neighboring the central block, and a touch sequence defining module electronically connected to the central processing module for counting and recording touch sequences of sliding among the blocks neighboring the central block.Type: GrantFiled: June 12, 2013Date of Patent: May 12, 2015Assignee: Yankey Information Co., Ltd.Inventor: Chun-Yu Chu
-
Patent number: 9032534Abstract: A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, changed setting information, as well as a previous WEP key before the change of the setting information, is written into the memory card MC. The system administrator then inserts this memory card MC into a memory card slot of a printer PRT1. The printer PRT1 authenticates the memory card MC as genuine under management of the system administrator. In the case of the authenticated memory card MC, the setting information is updated. This arrangement effectively relieves the user's workload in setting wireless communication devices, while ensuring the sufficiently high security.Type: GrantFiled: December 21, 2004Date of Patent: May 12, 2015Assignee: Seiko Epson CorporationInventor: Katsuyuki Koga
-
Publication number: 20150127950Abstract: A method of encrypting data comprising the steps of: creating a one time pad; and encrypting the data using the one time pad to produce output data, wherein the one time pad is generated using the data.Type: ApplicationFiled: April 11, 2013Publication date: May 7, 2015Inventor: David Irvine
-
Patent number: 9027126Abstract: A cyber fraud phish baiting system for baiting a phishing website is disclosed. The cyber fraud phish baiting system is configured to store a plurality of URLs in a database and enter each of the URLs into a browser to view internet resources linked to the URLs. It is configured to scan the internet resources for information requests, obtain information responsive to the information requests from a database, enter responsive information into the information requests, and store the information requests and the responsive information entered into the information requests for each of the URLs. The internet resource may be a phishing website, and fake information is entered into the information requests.Type: GrantFiled: September 6, 2012Date of Patent: May 5, 2015Assignee: Bank of America CorporationInventor: Joshua Enoch Larkins
-
Patent number: 9021268Abstract: The generation of a unique password using a secret key and an application name is disclosed. Other passwords may be generated for other applications using the same key. A user provides a key that is not easily able to be guessed by third parties. The user also inputs a name of an application for which a password is desired. The system utilises the application name and the secret key to generate a unique password for that application, using standard encryption techniques. The system generates the same password for that application and secret key combination every time. Alternate embodiments generate a user identifier from the same secret key and application name.Type: GrantFiled: August 2, 2008Date of Patent: April 28, 2015Assignee: International Business Machines CorporationInventor: Manjeri Ramanathan Dharmarajan
-
Patent number: 9021248Abstract: Enhanced security measures are provided for accessing applications or data on a client device using an encryption scheme. The client device receives authorization to access the applications or data from a server that compares a password received at the client device with a password previously stored in the server. In addition to comparing the passwords, the server may implement additional security measures such as checking geographic locations of the client device or monitoring for suspicious patterns of usage on the client device. Further, different passwords may be used depending on whether the client device has connectivity with the server. When the connectivity is not available, a longer or more complicated password may be used instead of a shorter or simple password to provide added security. When the user is authenticated, a key is made available to access applications or data on the client device.Type: GrantFiled: August 22, 2013Date of Patent: April 28, 2015Assignee: SolidMobile, Inc.Inventor: Nae Kwon Jung
-
Patent number: 9021269Abstract: A blind hashing system and method are provided in which blind hashing is used for data encryption and secure data storage such as in password authentication, symmetric key encryption, revocable encryption keys, etc. The system and method include using a hash function output (digest) as an index or pointer into a huge block of random data, extracting a value from the indexed location within the random data block, using that value to salt the original password or message, and then hashing it to produce a second digest that is used to verify the password or message, encrypt or decrypt a document, and so on. A different hash function can be used at each stage in the process. The blind hashing algorithm typical runs on a dedicated server and only sees the digest and never sees the password, message, key, or the salt used to generate the digest.Type: GrantFiled: July 17, 2013Date of Patent: April 28, 2015Assignee: TapLink, Inc.Inventor: Jeremy Spilman
-
Patent number: 9021562Abstract: The present disclosure provides methods and systems for secure logon. One or more method includes: determining, via authentication information provided by a user of an electronic device, that the user is authorized to access an online account provided by the online account provider; providing the user with a selectable option to enable an expedited logon process by which the user can access the online account by solely providing a particular authentication item of the user; receiving a verification credential in response to a next logon attempt using the expedited logon process; and verifying that the received verification credential matches an assigned verification credential provided to the user for use in conjunction with the next logon attempt using the expedited logon process.Type: GrantFiled: February 28, 2011Date of Patent: April 28, 2015Assignee: United Services Automobile AssociationInventors: Thomas B. Buckingham, Richard A. Davey, Tammy L. Sanclemente, Ryan M. Johnson, Adam J. Leatham, John D. Row, Christopher T. Wilkinson
-
Patent number: 9015476Abstract: Methods, apparatus and articles of manufacture for implementing cryptographic devices operable in a challenge-response mode are provided herein. A method includes storing a set of authentication information in a first cryptographic device associated with a user, receiving a challenge in the first cryptographic device in connection with a user authentication request responsive to a request from the user to access a protected resource, wherein the challenge comprises an index of at least one non-sequential portion of the authentication information stored in the first cryptographic device, and outputting a non-sequential portion of the authentication information from the set of authentication information stored in the first cryptographic device in response to the challenge for use in authenticating the user.Type: GrantFiled: December 7, 2012Date of Patent: April 21, 2015Assignee: EMC CorporationInventors: Ari Juels, Guoying Luo, Kevin D. Bowers
-
Patent number: 9009485Abstract: According to one embodiment, an electronic apparatus comprises a communication module and a connection control module. The communication module is configured to execute close proximity wireless transfer. The connection control module is configured to start an operation of establishing a connection between the communication module and an external device which is in close proximity to the communication module if an identifier of the external device wirelessly transmitted from the external device is included in a connection permission list. The connection control module is configured to display a password entry screen if the identifier is not included in the connection permission list, and to add, if a password entered on the password entry screen matches with a registered password, the identifier to the connection permission list and start the operation of establishing the connection between the communication module and the external device.Type: GrantFiled: June 11, 2014Date of Patent: April 14, 2015Assignee: Kabushiki Kaisha ToshibaInventor: Kotaro Fukui
-
Patent number: 9009802Abstract: A PIN is automatically generated based on at least one rule when the user enters a password through a user device. In one example, the PIN is a truncated version of the password where each character in the truncated version is mapped onto a number. The mapping can be a truncation at the beginning or end of the password, or the mapping can be with any pattern or sequence of characters in the password. This PIN generation may be transparent to the user, such that the user may not even know the PIN was generated when the password was entered. When the user attempts to access restricted content, the user may enter the PIN instead of the password, where the user may be notified of the rule used to generate the PIN so that the user will know the PIN by knowing the password.Type: GrantFiled: December 27, 2012Date of Patent: April 14, 2015Assignee: Ebay Inc.Inventor: Bjorn Markus Jakobsson
-
Patent number: 9003195Abstract: The systems and methods described herein can be used for enhancing the security of computer passwords by electronically receiving a password, the password comprising a plurality of components, each of the components being of a type of component, storing the received password in an electronic data store, converting the stored password to a topological representation of the password by which each of the plurality of components is represented and stored as its type of component, and storing the topological representation of the password in an electronic data store.Type: GrantFiled: July 30, 2014Date of Patent: April 7, 2015Assignee: KoreLogic, Inc.Inventors: Henry Lewis Leininger, Klayton Lee Monroe, Michael Thomas Wollman
-
Patent number: 9003508Abstract: A security process involves log-in and data exchange between a server and a user operating a computerized appliance. The process requires a user-specific token, independent verification of the server execution within a programmed time window. A hash created at the client side is reproduced at the server side from separate data and compared to the client hash. Too much time or incorrect hash denies access.Type: GrantFiled: October 27, 2014Date of Patent: April 7, 2015Assignee: OHVA, Inc.Inventors: Vincent Cedric Colnot, Ty Fellers
-
Patent number: 9002003Abstract: A password protocol uses a multiple word password and provides prompts to a user allowing the user to select the next word in the password from a set of words. The selection of a word causes a client to perform a cryptographic operation and generate a new selection of words. After the password is completely entered, a key is generated from the words selected.Type: GrantFiled: November 29, 2007Date of Patent: April 7, 2015Assignee: Certicom Corp.Inventors: Daniel R. L. Brown, Marinus Struik
-
Patent number: 9001999Abstract: A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client in accordance with an authentication protocol, and authenticate the client based on a comparison of the first form to a value derived from a second form of the password stored in a password database. The comparison fails when the first form is not comparable to a value derived from the second form. The server may establish a secure connection to the client, receive a plain-text password from the client over the secure connection, authenticate the client by comparing a value derived from the plain-text password with a value derived from the second form, and update the password database with a third form of the password that permits the authentication server to successfully authenticate the client when the authentication server receives the first form.Type: GrantFiled: December 6, 2011Date of Patent: April 7, 2015Assignee: Pulse Secure, LLCInventors: Andy Tsang, Roger A. Chickering, Clifford E. Kahn, Jeffrey C. Venable, Sr.
-
Patent number: 8997214Abstract: In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.Type: GrantFiled: February 21, 2012Date of Patent: March 31, 2015Assignee: SanDisk Technologies Inc.Inventors: Po Yuan, Javier Canis Robles, Mei Yan, Fabrice Jogand-Coulomb, Ahmet Altay, Bahman Qawami, Patricia Dwyer, Robert Chin-Tse Chang, Oktay Rasizade, Farshid Sabet-Sharghi
-
Publication number: 20150089239Abstract: The present invention relates to a passcode operating system, to a passcode apparatus, and to a super-passcode generating method, which are capable of protecting user authentication information from external hacking. The passcode apparatus of the present invention comprises: one or more processors; a memory; and one or more programs stored in the memory and configured to be executed by the one or more processors. The program includes: a data safekeeping module for storing user-specific passcode data; an input window module for displaying an input window on which multiple icons are arranged; and a passcode-generating module for checking, when icons are selected through the input window module, the character string corresponding to each selected icon on a virtual keyboard contained in the passcode data, generating a seed passcode in which the checked character strings are combined, and generating a super-passcode for each website using the seed passcode and a site code.Type: ApplicationFiled: April 25, 2013Publication date: March 26, 2015Inventors: Giho Yang, Jaeyeob Hwang
-
Patent number: 8990478Abstract: Aspects of the invention provide for masking a current profile of a one-time programmable (OTP) memory. In one embodiment, a circuit includes: a first one-time programmable (OTP) memory configured to receive a data input for a plurality of address fields; and a second OTP memory configured to receive an inverse of the data input for a plurality of address fields, wherein a current profile for a programming supply for the first OTP memory and the second OTP memory is masked, such that the data input for the first OTP memory is undetectable.Type: GrantFiled: July 23, 2012Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: John A. Fifield, Gerald P. Pomichter, Jr., Jeffrey S. Zimmerman
-
Patent number: 8990588Abstract: A storage system in which a storage control apparatus writes data in each of divided areas defined by division of one or more storage areas in one or more storage devices, after encryption of the data with an encryption key unique to each divided area. When the storage control apparatus receives, from a management apparatus, designation of one or more of the divided areas allocated as one or more physical storage areas for a virtual storage area to be invalidated and an instruction to invalidate data stored in the one or more of the divided areas, the storage control apparatus invalidates one or more encryption keys associated with the designated one or more of the divided areas. In addition, the storage control apparatus may further overwrite at least part of the designated one or more of the divided areas with initialization data for data erasion.Type: GrantFiled: September 5, 2012Date of Patent: March 24, 2015Assignee: Fujitsu LimitedInventor: Masaru Shimmitsu
-
Patent number: 8990579Abstract: A method and an apparatus are provided for unlocking an electronic device. A first input screen portion for unlocking the electronic device from a locking mode is displayed. A first input is received from a user via the first input screen portion. The first input is compared with a first user-defined information stored in the electronic device. A second input is received from the user via a second input screen portion. The second input screen portion is displayed after a determination that the first input does not match from the first user-defined information. The second input is compared with a second user-defined information stored in the electronic device. In response to the second input matches to the second user-defined information, the electronic device is unlocked from the locking mode.Type: GrantFiled: June 10, 2014Date of Patent: March 24, 2015Assignee: Samsung Electronics Co., LtdInventor: Kyong-Su Kim
-
Publication number: 20150082046Abstract: The present invention seeks to meet these needs by providing a password generation and retrieval system (PGRS) that generates encrypted passwords with a computer program using an algorithm that combines a website information such as a domain name or email address, the user's own text input or phrase, and the user's own numeric value or pin number. The present invention does not involve the maintenance of a database of any kind. As such, there is no login required and no records are kept of the visitors, their input or the passwords generated. Preferably, the process is carried out using a website, browser extension, smart phone application and/or a stand-alone executable program.Type: ApplicationFiled: August 8, 2014Publication date: March 19, 2015Inventor: Jim Lucas
-
Patent number: 8984599Abstract: A method and apparatus for generating a password in real time by creating at least one password map during creation of an account associated with a user, and generating and providing a random password hint sequence grid to the user in real time, authenticating the user for accessing the account using a password created by the user, where the password is created by the user using the random password hint sequence grid and the at least one password map.Type: GrantFiled: January 27, 2012Date of Patent: March 17, 2015Assignee: Samsung Electronics Co., Ltd.Inventor: Vikram Bodavula
-
Patent number: 8977844Abstract: An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes formatting the token at the client in response to the status of the token being unformatted.Type: GrantFiled: August 31, 2006Date of Patent: March 10, 2015Assignee: Red Hat, Inc.Inventors: Steven William Parkinson, Robert B. Lord
-
Patent number: 8972743Abstract: A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a trusted platform module (TPM) to encrypt the sensitive data via a TPM storage key associated with the agent.Type: GrantFiled: May 16, 2005Date of Patent: March 3, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali, Boris Balacheff
-
Patent number: 8973102Abstract: Systems and methods for authenticating a user request for authentication are provided. An authentication device that may be part of such a system includes a network interface component coupled to a network and configured to receive at least one data packet having authentication information including at least a username of a user and user credentials. The device also includes a memory coupled to the network interface component and configured to store the received authentication information, one or more instructions for authenticating the user, and account information of the user. The device further includes one or more processors configured to analyze the received information, calculate a score based on the received information, determine a threshold, compare the calculated score with the determined threshold, and authenticate the user and a device from which the data packet is received if the calculated score is greater than or equal to the determined threshold.Type: GrantFiled: June 14, 2012Date of Patent: March 3, 2015Assignee: eBay Inc.Inventor: Bjorn Markus Jakobsson
-
Patent number: 8966276Abstract: In a system for disconnected authentication, verification records corresponding to given authentication token outputs over a predetermined period of time, sequence of events, and/or set of challenges are downloaded to a verifier. The records include encrypted or hashed information for the given authentication token outputs. In one embodiment using time intervals, for each time interval, token output data, a salt value, and a pepper value, are hashed and compared with the verification record for the time interval. After a successful comparison, a user can access the computer. A PIN value can also be provided as an input the hash function. A portion of the hash function output can be used as a key to decrypt an encrypted (Windows) password, or other sensitive information.Type: GrantFiled: September 10, 2004Date of Patent: February 24, 2015Assignee: EMC CorporationInventors: Andrew Nanopoulos, Karl Ackerman, Piers Bowness, William Duane, Markus Jakobsson, Burt Kaliski, Dmitri Pal, Shane D. Rice, Ronald L. Rivest
-
Patent number: 8966261Abstract: The present invention is directed to an architecture and mechanism for securely backing up files and directories on a local machine onto untrusted servers over an insecure network.Type: GrantFiled: August 5, 2013Date of Patent: February 24, 2015Assignee: AT&T Intellectual Property II, L.P.Inventor: Aviel D. Rubin
-
Patent number: 8959349Abstract: Various methods for the secure exchange of private keys for authenticating a user to an RDP service are provided. One example method may comprise receiving a request comprising a session token to provide a user with access to an RDP service, and retrieving a username and password associated with the user using the session token. The method may further comprise assigning a time period of validity to the password. Furthermore, the method may comprise generating a first secret key based on user information, generating a second secret key based on the first secret key and a salt, and encrypting a packet comprising the password and the time period using the second secret key. Additionally, the method may comprise transmitting the username and encrypted packet to the device for authenticating the user with the requested RDP service. Similar and related example methods, apparatuses, systems, and computer program products are also provided.Type: GrantFiled: September 10, 2012Date of Patent: February 17, 2015Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Richard W. German, Tony E. Thompson, Eric T. Marshall
-
Patent number: 8959645Abstract: A distributed operation is performed using at least one first and second computer-based object, wherein control information is used to influence or determine a property, a function of the first and/or second computer-based objects. The control information includes details of a parameter identifier, a value associated with the parameter identifier, a range of validity and a remote access attribute. The control information is provided in a retrievable manner, according to the included range of validity, in a memory organized according to ranges of validity and is associated with the first computer-based object. During a function or service call for performing the distributed operation, which is sent from the first computer-based object to the second, the control information is transmitted to the second computer-based object, provided in a retrievable manner in the memory organized according to the ranges of validity and associated with the second computer-based object.Type: GrantFiled: September 2, 2009Date of Patent: February 17, 2015Assignee: Siemens AktiengesellschaftInventors: Harald Herberth, Ulrich Kröger, Allan Sobihard
-
Patent number: 8959356Abstract: A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.Type: GrantFiled: March 15, 2013Date of Patent: February 17, 2015Assignee: International Business Machines CorporationInventors: Vincent Boucher, Sebastien Chabrolles, Benoit Granier, Arnaud Mante
-
Patent number: 8959604Abstract: A client device is coupled with a server. The client device prompts a user to enter a number associated with a mobile device, which can be the client device, and generates data including a code. The code is typically hidden from the user when the code is generated and is saved on the client device. The client device transmits the number entered by the user and the code generated by the client device to the server, which sends a message, including the code, to the mobile device associated with the number. The client device prompts the user to enter the code included in the message. Validity of the number is based on one or more factors, including the accuracy of the code entered by the user. In addition, validity of the number can also be based on whether the second user input was entered within a predetermined time limit.Type: GrantFiled: November 25, 2011Date of Patent: February 17, 2015Assignee: Synchronoss Technologies, Inc.Inventor: Sumeet Sohan Singh
-
Patent number: 8959619Abstract: A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images, having different background colors, the correct image and background color which correspond to the user's computer account. In one advantageous form, in addition to selecting the correct image, the user must first enter a username and password. In an alternative form, if a user is seeking access to a computer network by using a preapproved access point or computer having an approved IP address, a user is allowed to gain access to the computer network without being prompted to select a correct image.Type: GrantFiled: December 21, 2011Date of Patent: February 17, 2015Assignee: Fleet One, LLC.Inventors: Ted Sanft, John Overland, Andy Roberts
-
Patent number: 8959360Abstract: Methods, systems, and apparatus for voice authentication and command. In an aspect, a method comprises: receiving, by a data processing apparatus that is operating in a locked mode, audio data that encodes an utterance of a user, wherein the locked mode prevents the data processing apparatus from performing at least one action; providing, while the data processing apparatus is operating in the locked mode, the audio data to a voice biometric engine and a voice action engine; receiving, while the data processing apparatus is operating in the locked mode, an indication from the voice biometric engine that the user has been biometrically authenticated; and in response to receiving the indication, triggering the voice action engine to process a voice action that is associated with the utterance.Type: GrantFiled: August 15, 2013Date of Patent: February 17, 2015Assignee: Google Inc.Inventor: Hugo B. Barra
-
Patent number: 8954745Abstract: A method and apparatus are provided to allow a user of a communications device to utilize one-time password generators for two-way authentication of users and servers, i.e., proving to users that servers are genuine and proving to servers that users are genuine. The present invention removes the need for a user to have a separate physical device, e.g., token, per company or service, reduces the cost burden on the companies and allows for two-way authentication via multiple access methods, e.g., telephone, web interfaces, automatic teller machines (ATMs), etc. Also, the present invention may be utilized in consumer and enterprise applications.Type: GrantFiled: April 3, 2007Date of Patent: February 10, 2015Assignee: Alcatel LucentInventors: Debra L. Cook, Vijay K. Gurbani, Maarten Wegdam
-
Patent number: 8955085Abstract: In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device are associated with each other if these authentications succeed. The CE device obtains information for user authentication from an IC card and portable memory, and sends the information and device authentication information to a device registration unit. The device registration unit sends the information for the user authentication to a user authentication unit, and the device authentication information to a device authentication unit. The user authentication unit executes a user authentication process and sends information of the user to the device registration unit if authentication succeeds. The device authentication unit executes a device authentication process and sends information of the device to the device registration unit if authentication succeeds.Type: GrantFiled: January 13, 2012Date of Patent: February 10, 2015Assignee: Sony CorporationInventor: Naoshi Suzuki
-
Patent number: 8955150Abstract: The present invention relates to an apparatus and a method for managing digital rights using virtualization technique, and more particularly to an apparatus and a method for enabling a user to access a desired text file in an independent area through a virtual machine corresponding to a licensed right for accessing the text file. The present invention comprises a virtual machine (VM) management unit for controlling a user access authorization function for accessing the text file in the area to which the virtualization technique is applied.Type: GrantFiled: September 10, 2010Date of Patent: February 10, 2015Assignee: Fasoo.com Co. Ltd.Inventor: Chel Park
-
Patent number: 8954759Abstract: A magnetic memory device includes a main memory made of magnetic memory, the main memory and further includes a parameter area used to store parameters used to authenticate data. Further, the magnetic memory device has parameter memory that maintains a protected zone used to store protected zone parameters, and an authentication zone used to store authentication parameters, the protection zone parameters and the authentication parameters being associated with the data that requires authentication. Upon modification of any of the parameters stored in the parameter memory by a user, a corresponding location of the parameter area of the main memory is also modified.Type: GrantFiled: September 14, 2012Date of Patent: February 10, 2015Assignee: Avalanche Technology, Inc.Inventors: Siamack Nemazie, Ngon Van Le
-
Patent number: 8954735Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: GrantFiled: September 28, 2012Date of Patent: February 10, 2015Assignee: Intel CorporationInventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
-
Patent number: RE45532Abstract: A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.Type: GrantFiled: April 1, 2014Date of Patent: May 26, 2015Assignee: AT&T INTELLECTUAL PROPERTY II, L.P.Inventors: Paul Shala Henry, Zhimei Jiang, Hui Luo, Frederick Kenneth Schmidt