Patents Assigned to Arcot Systems, Inc.
  • Patent number: 8015598
    Abstract: A computerized method of providing access to a secure resource includes, to each of a plurality of authorized users, providing a link to the secure resource. Each link includes a unique password embedded therein and each unique password relates to a particular user identification (userID) and personal identification number (PIN). The method also includes receiving a request to access the resource using a link having a password embedded therein, which request originates at a web browser. The method further includes directing the browser to a login screen and receiving via the login screen a userID and PIN. The method also includes determining whether the userID and PIN relate to one another and to the password and allowing or denying access to the resource in accordance with the determination.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: September 6, 2011
    Assignee: Arcot Systems, Inc.
    Inventor: Geoffrey Hird
  • Publication number: 20110208964
    Abstract: A method includes receiving, via a server, a User ID and Password from a client device, and generating a Secret PIN (SPIN). Values for a Partial Password and an encrypted version of the SPIN (ESPIN) are determined. The method includes challenging a user of the client device with a challenge that prompts the user to enter the Partial Password and an ESPIN. An Additional Factor, e.g., a One-Time Password from a Shared Secret, is locked using the SPIN. The Partial Password and challenge unlock the Additional Factor. The method includes authenticating the identity using the unlocked Additional Factor. A system includes a server in communication with a client device, and a non-transitory memory device on which is recorded process instructions for authenticating the identity of a user of the client device. The server executes the instructions to thereby authenticate the identity of the user using the unlocked Additional Factor.
    Type: Application
    Filed: January 21, 2011
    Publication date: August 25, 2011
    Applicant: Arcot Systems, Inc.
    Inventor: VenkataBabji Sama
  • Publication number: 20110202984
    Abstract: This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge.
    Type: Application
    Filed: February 4, 2011
    Publication date: August 18, 2011
    Applicant: Arcot Systems, Inc.
    Inventors: Geoffrey Hird, Rammohan Varadarajan, James D. Reno
  • Publication number: 20110184867
    Abstract: A method and system is provided for generating a dynamic card value (DCV) from a mobile user device for use in a transaction between a user cardholder and a transaction provider. The DCV may be configured for use as a card verification value (CVV), also known as a card security code (CSC), a primary account number (PAN), or a portion of a PAN. The DCV may be generated using a DCV generator which may include an algorithm and a DCV generation key. The DCV generation key may be camouflaged. Obtaining a DCV from the user device may require inputting a PIN, a device identifier, a challenge or transaction information. The DCV may be used for any transaction requiring the input of a user identification number and a verification value, including, credit card transactions, debit card transactions, online or telephonic transactions.
    Type: Application
    Filed: January 25, 2011
    Publication date: July 28, 2011
    Applicant: Arcot Systems, Inc.
    Inventor: Rammohan Varadarajan
  • Publication number: 20110185051
    Abstract: A method of identifying a networked client device of a host machine or server includes generating an encoded modified date during a first access attempt by the client device of a server-based object, storing the encoded modified date in a local cache of the device, and processing the encoded modified date during a second access attempt by the client device. A system includes the server and a memory device on which is recorded a server-based object. The server generates and stores the encoded modified date in the local cache, e.g., via HTTP, during the first access attempt of the object by the client device, and processes the encoded modified date during a second access attempt by the same client device to uniquely identify the client device. Restricted information may be provided to the client device upon successful identification.
    Type: Application
    Filed: January 25, 2011
    Publication date: July 28, 2011
    Applicant: Arcot Systems, Inc.
    Inventor: James D. Reno
  • Publication number: 20110113237
    Abstract: A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user machine. The method further includes modifying the controlled access datum, encrypting the controlled access datum using the PIN and/or a unique machine identifier to camouflage the datum, and generating a passcode using the camouflaged datum and the PIN and/or the unique machine identifier. A mobile user device may be used to execute the method in one embodiment. The passcode may be used to obtain transaction authorization and/or access to a secured system or secured data. The unique machine identifier may be defined by a machine effective speed calibration derived from information collected from and unique to the user machine.
    Type: Application
    Filed: November 3, 2010
    Publication date: May 12, 2011
    Applicant: Arcot Systems, Inc.
    Inventors: Geoffrey Hird, Rammohan Varadarajan
  • Publication number: 20110113245
    Abstract: A method and system is provided for generating a one-time passcode (OTP) configured for use as a personal identification number (PIN) for a user account from a user device. The OTP may be generated using an OTP generator which may include an algorithm an user account-specific OTP key. The OTP key may be camouflaged by encryption, obfuscation or cryptographic camouflaging using a PIN or a unique machine identifier defined by the user device. Obtaining an OTP from the user device may require inputting a data element which may be one of a PIN, a character string, an image, a biometric parameter, a user device identifier such as an machine effective speed calibration (MESC), or other datum. The OTP may be used for any transaction requiring a user PIN input, including ATM and debit card transactions, secure access and online transactions.
    Type: Application
    Filed: November 10, 2010
    Publication date: May 12, 2011
    Applicant: Arcot Systems, Inc.
    Inventor: Rammohan Varadarajan
  • Publication number: 20110099480
    Abstract: A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.
    Type: Application
    Filed: October 25, 2010
    Publication date: April 28, 2011
    Applicant: Arcot Systems, Inc.
    Inventors: Venkata Babji Sama, Suril Rajul Desai, Rammohan Varadarajan
  • Publication number: 20110060913
    Abstract: A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.
    Type: Application
    Filed: August 30, 2010
    Publication date: March 10, 2011
    Applicant: Arcot Systems, Inc.
    Inventors: Geoffrey Hird, Rammohan Varadarajan
  • Patent number: 7844827
    Abstract: A system and method for generating an encryption key using physical characteristics of a biometric sample is described. In one embodiment, the biometric feature(s) from a sample are analyzed to generate a feature vector. After discretizing the feature(s), the resultant feature vector is translated into a bit vector. The bit vector is the secure biometric key that results from the biometric(s). The secure biometric key is used to generate at least one cryptographic key. A similar process is used to access the cryptographic key secured by the secure biometric key. If the access biometric key matches the secure biometric key, the cryptographic key is revealed and access is allowed. In another embodiment, if the access biometric key does not match the secure biometric key a camouflaging process is used to provide an unauthorized user a bogus secure biometric key indistinguishable from the correct secure biometric key.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: November 30, 2010
    Assignee: Arcot Systems, Inc.
    Inventor: Naomaru Itoi
  • Publication number: 20100217825
    Abstract: A system identifies a real Internet Protocol (IP) address of a computer device having a browser and software for masking the real IP address. The system includes a server in communication with the device through an Anonymous Proxy Server (APS), an algorithm, and a website with embedded dynamic web content from the server. The algorithm identifies the real IP address, and executes the dynamic web content on the browser to open a direct network connection between the server and device. The network connection identifies the real IP address. A method for identifying the real IP address includes embedding dynamic web content within the website, executing the content within the browser when the device accesses the website via a first network connection, thereby opening a second network connection between the server and device. The real IP address is identified over the second network connection, and a security action may be executed.
    Type: Application
    Filed: December 21, 2009
    Publication date: August 26, 2010
    Applicant: Arcot Systems, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Publication number: 20100172504
    Abstract: A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured against attacks such as unauthorized use, modification or access, where authorization to access the secured data is determined by knowledge of an access private key of an access key pair. When an authorized user is to access the secured data, the first system generates a request to the key server, signed with the access private key, wherein the request is for a decryption control key and the request includes a one-time public key of a key pair generated by the first system for the request. The first system can decrypt the decryption control key from the response, using a one-time private key. The first system can then decrypt the secured data with the decryption control key remaining secured in transport.
    Type: Application
    Filed: March 12, 2010
    Publication date: July 8, 2010
    Applicant: Arcot Systems, Inc.
    Inventors: Robert Allen, Robert A. Jerdonek, John Wang, Tom Wu
  • Patent number: 7711122
    Abstract: A key management system includes secured data stored on a first system secured by a control key stored securely on a key server. The secured data is secured against attacks such as unauthorized use, modification or access, where authorization to access the secured data is determined by knowledge of an access private key of an access key pair. When an authorized user is to access the secured data, the first system generates a request to the key server, signed with the access private key, wherein the request is for a decryption control key and the request includes a one-time public key of a key pair generated by the first system for the request. The first system can decrypt the decryption control key from the response, using a one-time private key. The first system can then decrypt the secured data with the decryption control key remaining secured in transport.
    Type: Grant
    Filed: March 8, 2002
    Date of Patent: May 4, 2010
    Assignee: Arcot Systems, Inc.
    Inventors: Robert Allen, Robert A. Jerdonek, John Wang, Tom Wu
  • Patent number: 7634470
    Abstract: The present invention describes techniques for performing searches in an efficient manner while minimizing the memory resources required to perform the searches. According to the techniques of the present invention, the number of comparisons needed to determine if a query element is in included in a set of elements is proportional to the length of the query element and independent of the number of elements in the set of elements.
    Type: Grant
    Filed: July 25, 2005
    Date of Patent: December 15, 2009
    Assignee: Arcot Systems, Inc.
    Inventors: Sanguthevar Rajasekaran, Rajendra A. Gopalakrishna
  • Publication number: 20090199272
    Abstract: System and methods for authenticating a transaction between a user system and a host system are described herein. In one embodiment, the system and methods use a text-reading test (TRT) image as part of the authentication process. The TRT image is presented to the user upon initiation of a transaction by the user. Information provided by a user, via the user system, after perception of the TRT image is compared to the source information in the TRT image. If the user input corresponds to the source information, the user is authenticated and transaction is allowed to proceed.
    Type: Application
    Filed: February 6, 2009
    Publication date: August 6, 2009
    Applicant: Arcot Systems, Inc.
    Inventor: Rajendra A. Gopalakrishna
  • Publication number: 20090165109
    Abstract: A computerized method of accessing a secure resource using an application associated with a user's computing device is provided. The application is programmed, in part, to monitor user browsing activity and wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key. The method includes the application detecting a user attempt to log into a secure resource, the application scanning in-process browser processes to identify a browser process that is in a login state, the application associating the browser process in a login state with one of the trusted sites, the application initiating a new browser session with the trusted site using the associated predefined URL, the application obtaining a login password from the user, the application supplying to the trusted site the associated security key and login password, and the user's computer displaying subsequent browsing activity.
    Type: Application
    Filed: November 17, 2008
    Publication date: June 25, 2009
    Applicant: Arcot Systems, Inc.
    Inventor: Geoffrey Hird
  • Publication number: 20090138706
    Abstract: Techniques for efficiently searching encrypted searchable spaces. For example, embodiments of the present invention provide techniques for searching a plurality of files that are stored in encrypted (or ciphertext) form. According to embodiments of the present invention, the search can usually be performed by decrypting only a portion of the encrypted searchable space. According to an embodiment of the present invention, the search techniques determine a set of files comprising one or more files from the plurality of encrypted files that contain a user-specified query element. The set of files is usually determined by decrypting only a subset of the plurality of encrypted files.
    Type: Application
    Filed: December 7, 2008
    Publication date: May 28, 2009
    Applicant: Arcot Systems, Inc.
    Inventors: Sanguthevar Rajasekaran, Rammohan Varadarajan
  • Publication number: 20090138944
    Abstract: A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a generalized camouflaging technique. The secured object need not be stored in the system, not even in encrypted form. Instead, the technique employs a composition function that regenerates the secured object when one inputs a valid password (which may be any computer-representable information held by a user). By regenerating the secured object each time a valid password is entered, there is no need to store the secured object. If one inputs an invalid password, the technique may generate an incorrect object, such that the user is unable to distinguish this incorrect object from the secured object. If the user tries to use the incorrect object, the user can be exposed as unauthorized, without the user's knowledge that he has been exposed.
    Type: Application
    Filed: November 3, 2008
    Publication date: May 28, 2009
    Applicant: Arcot Systems, Inc.
    Inventors: Sanguthevar Rajasekaran, Geoffrey R. Hird, Balas Natarajan Kausik
  • Publication number: 20090138950
    Abstract: A computerized method of providing access to a secure resource includes, to each of a plurality of authorized users, providing a link to the secure resource. Each link includes a unique password embedded therein and each unique password relates to a particular user identification (userID) and personal identification number (PIN). The method also includes receiving a request to access the resource using a link having a password embedded therein, which request originates at a web browser. The method further includes directing the browser to a login screen and receiving via the login screen a userID and PIN. The method also includes determining whether the userID and PIN relate to one another and to the password and allowing or denying access to the resource in accordance with the determination.
    Type: Application
    Filed: November 17, 2008
    Publication date: May 28, 2009
    Applicant: Arcot Systems, Inc.
    Inventor: Geoffrey Hird
  • Publication number: 20090094157
    Abstract: A first account number and a second account number are created for an account. The first and second account numbers are associated with the account and can be used for transactions with the account. A first subset of operations is associated with the first account number and a second subset of operations is associated with the second account number. A subset of operations includes operations that are restricted to a party that has access to the account number. Accordingly, the first party that has access to the first account number is restricted to the operations found in the first subset of operations when transacting with the account. Also, a second party that has access to the second account number is restricted to the second subset of operations when transacting with the account.
    Type: Application
    Filed: April 3, 2008
    Publication date: April 9, 2009
    Applicant: Arcot Systems, Inc.
    Inventor: James D. Reno