Password Patents (Class 340/5.85)
  • Patent number: 8310358
    Abstract: Disclosed is an authentication apparatus easily achieving convenience and high accuracy in authentication. The authentication apparatus has an authentication accuracy simulation section that simulates authentication accuracy and also has a registration information setting section that sets an ID and biometric information input as registration information. The authentication accuracy simulation section uses an ID and biometric information that has been input as registration information by a user at the time of registration and the registered registration information to simulate authentication accuracy with which the user is authenticated. When the authentication accuracy simulated by the authentication accuracy simulation section does not satisfy a predetermined condition, the registration information setting section rejects registration of the ID input as the registration information.
    Type: Grant
    Filed: June 24, 2009
    Date of Patent: November 13, 2012
    Assignee: Fujitsu Limited
    Inventors: Masaki Watanabe, Toshio Endoh, Takahiro Aoki, Mitsuaki Fukuda, Soichi Hama, Hironori Yokoi
  • Patent number: 8307091
    Abstract: A method and apparatus for enabling consumers to scan RFID tags using home based endpoint devices that can transmit the scanned information to network based services are disclosed. Using the RFID scanned information, consumers can then access, retrieve and view additional information regarding products, in which RFIDs are embedded, on video display devices, such as televisions or video display monitors. This product related information can include interactive technical support, companion product information, or instructional guidelines.
    Type: Grant
    Filed: October 26, 2005
    Date of Patent: November 6, 2012
    Assignee: AT&T Intellectual Property II, L.P.
    Inventors: Marian Croak, Hossein Eslambolchi
  • Patent number: 8290660
    Abstract: To provide external access to a specification file stored in at least one memory unit, which is associated with at least one electronic control unit which may be in a vehicle, a computer is connected to a first communication bus in the vehicle. A first module in the computer is adapted to communicate with the at least one electronic control unit over the first communication bus. Provided that a user-unique key is connected to a port of the computer and a software component of this key is set to an active authorization state, the computer is enabled to communicate with the at least one electronic control unit. Thus, the computer may read out the specification file as well as update the specification file.
    Type: Grant
    Filed: March 29, 2005
    Date of Patent: October 16, 2012
    Assignee: Scania CV AB (publ)
    Inventors: Stanislaw Lazarz, Kurt Flatischler
  • Patent number: 8290601
    Abstract: A plant control system includes at least one control apparatus, and an engineering apparatus for changing a security state of the control apparatus. The control apparatus includes: a security management part for accepting a security level change request downloaded from the engineering apparatus and changing a security level of the control apparatus by referring to a password held by the control apparatus; and a change permission part for permitting a change in the security level by the security management part.
    Type: Grant
    Filed: November 21, 2006
    Date of Patent: October 16, 2012
    Assignee: Yokogawa Electric Corporation
    Inventor: Satoru Oosako
  • Patent number: 8269630
    Abstract: In embodiments of the present invention improved capabilities are described for a Radio Frequency ID (RFID) tag that contains multiple Radio Frequency (RF) network nodes that may include memory storage for the RFID tag, the memory storage may include one time programmable (OTP) memory and many time programmable (MTP) memory and the storage of the information may be within the OTP and MTP memory.
    Type: Grant
    Filed: October 28, 2007
    Date of Patent: September 18, 2012
    Assignee: Tego Inc.
    Inventors: Timothy P. Butler, Javier Berrios, Steve Beckhardt, Robert W. Hamlin, Larry Moore, David Puleston, Leonid Mats
  • Patent number: 8269995
    Abstract: Disclosed is an image forming apparatus that prints a confidential image on a recording medium. The apparatus includes a display, a printer for printing images in a queue, an input for receiving identification information for a user, and a processor. The processor determines whether identification information from the input corresponds to reference identification information in a storage and enables the printer to print a confidential image if the identification information from the input corresponds to the reference identification information in the storage.
    Type: Grant
    Filed: February 16, 2005
    Date of Patent: September 18, 2012
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventor: Tetsuya Niitsuma
  • Patent number: 8253567
    Abstract: In embodiments of the present invention improved capabilities are described for a Radio Frequency ID (RFID) tag that contains multiple Radio Frequency (RF) network nodes that provide enhanced memory capabilities, redundant functionality, and multiple frequency capabilities to the RFID tag using an inter-RF network node communication connection. The inter-RF network node communication may allow the coordination of RFID tag memory and functionality.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: August 28, 2012
    Assignee: Tego Inc.
    Inventors: Timothy P. Butler, Javier Berrios
  • Patent number: 8248238
    Abstract: In embodiments of the present invention improved capabilities are described for a Radio Frequency ID (RFID) tag that contains multiple Radio Frequency (RF) network nodes that provide enhanced memory capabilities, redundant functionality, and multiple frequency capabilities to the RFID tag using an inter-RF network node communication connection. The inter-RF network node communication may allow the coordination of RFID tag memory and functionality.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: August 21, 2012
    Assignee: Tego Inc.
    Inventors: Timothy P. Butler, Javier Berrios
  • Patent number: 8242907
    Abstract: In embodiments of the present invention improved capabilities are described for a Radio Frequency ID (RFID) tag that contains multiple Radio Frequency (RF) network nodes that provide enhanced memory capabilities, redundant functionality, and multiple frequency capabilities to the RFID tag using an inter-RF network node communication connection. The inter-RF network node communication may allow the coordination of RFID tag memory and functionality.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: August 14, 2012
    Assignee: Tego, Inc.
    Inventors: Timothy P. Butler, Javier Berrios
  • Patent number: 8242908
    Abstract: In embodiments of the present invention improved capabilities are described for a Radio Frequency ID (RFID) tag that contains multiple Radio Frequency (RF) network nodes that may include memory storage for the RFID tag, the memory storage may include one time programmable (OTP) memory and many time programmable (MTP) memory and the storage of the information may be within the OTP and MTP memory.
    Type: Grant
    Filed: October 28, 2007
    Date of Patent: August 14, 2012
    Assignee: Tego Inc.
    Inventors: Timothy P. Butler, Javier Berrios, Steve Beckhardt, Robert W. Hamlin, Larry Moore, David Puleston, Leonid Mats
  • Patent number: 8234219
    Abstract: A system, method, and apparatus for secure data editing is disclosed. A data field receives focus to accept a data entry from a user. The user inputs a data entry into the data field via a user interface. A determination is made of whether a manual lock event, a change focus event, or a time out event has triggered based on the user's action or inaction with the user interface. Upon the triggering of a manual lock event, a change focus event, or a time out event, the data entry in the data field is obscured. The user interface may display a data entry with a validation character which provides a reference point within the data entry while the data entry is displayed and while the data entry is obscured. The system may allow a user to have a specified function set based on his user access level.
    Type: Grant
    Filed: September 9, 2008
    Date of Patent: July 31, 2012
    Assignee: Applied Systems, Inc.
    Inventors: Robert E. Gorczowski, Brian D. Schubbe, Paul T. Klawitter
  • Publication number: 20120182125
    Abstract: A password checking device is connected to a power pushbutton. The power pushbutton includes a first terminal connected to a power on terminal of an electronic device and a second terminal configured for being connected to ground. The password checking device includes a touch pushbutton, a capacitive touch sensor, a switching circuit, and a processor. The touch pushbutton includes a metal cover pressed down by the power pushbutton and a metal spring receiving the power pushbutton. The capacitive touch sensor senses the capacitance of the touch pushbutton. When the capacitance changes, the sensor sends a counting signal. The processor is pre-set with a password with the times of the counting signal and an interval between two counting signals. The processor controls the switching circuit make sure the second terminal is connected to ground.
    Type: Application
    Filed: May 17, 2011
    Publication date: July 19, 2012
    Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD
    Inventor: XIANG CAO
  • Patent number: 8217753
    Abstract: Locked electronic device, e.g., a device which produces a video output, such as a game console or TV. The device is shipped in a locked state, and cannot be used as a game console or a TV until it is unlocked. The unlocking is carried out by a code. The code is provided separately from the device, and only once authorized sale is detected.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: July 10, 2012
    Assignee: Harris Technology, Inc.
    Inventor: Scott C. Harris
  • Patent number: 8212652
    Abstract: A biometric authentication system 10 includes an IC card 100 including a reading unit 110 sending generation information back to a terminal and a writing unit 111 writing biometric information in a storage area indicated in a write instruction, and a terminal 200 including a card generation acquisition unit 210 receiving from the IC card the generation information, a device generation acquisition unit 211 receiving from a biometric authentication device the generation information, a biometric information acquisition unit 212 receiving biometric information from the biometric authentication device 300, a first write instruction unit 213 identifying a storage area of the same generation as the generation of the biometric authentication device and transmitting a write instruction of the biometric information to the IC card, and a second write instruction unit 214 transmitting a write instruction for a storage area of the oldest generation to the IC card.
    Type: Grant
    Filed: October 30, 2009
    Date of Patent: July 3, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Takeshi Inoue, Shoko Hatanaka, Makoto Aikawa, Hideyuki Takeda
  • Publication number: 20120119878
    Abstract: An object of the present invention is to provide a portable electronic device of which operability is improved while maintaining a security function, and to provide a control method and a control program for the portable electronic device. In a case in which a function setting operation key is operated, a function limiting unit displays a screen for requesting password (for example, a personal identification number, a password, etc.) on a display unit, and limits utilization of a function assigned to the function setting operation key (for example, a variety of setting, an address book function, an electronic mail function, etc.).
    Type: Application
    Filed: November 16, 2011
    Publication date: May 17, 2012
    Applicant: KYOCERA CORPORATION
    Inventors: Koji Saijo, Akira Aoshima
  • Patent number: 8176548
    Abstract: A protection system for a display apparatus and a method thereof are provided. The protection system includes an electronic key and a protection module. The protection system performs security identification with a plurality of passwords and updates the passwords every time after the security identification is completed to improve the security of the display apparatus. The display apparatus is allowed to be turned on when one of the passwords is correct, and the passwords are separately updated after the security identification is completed. The protection system is highly secure and provides greater convenience to users.
    Type: Grant
    Filed: August 6, 2007
    Date of Patent: May 8, 2012
    Assignee: Coretronic Corporation
    Inventors: Chao-Wang Wu, Lien-Fu Cheng
  • Patent number: 8134449
    Abstract: A method for training a computing system using keyboard biometric information. The method includes depressing two or more keys on a keyboard input device for a first sequence of keys. The method then determines a key press time for each of the two or more keys to provide a key press time characteristic in the first sequence of keys. The method also determines a flight time between a first key and a second key to provide a flight time characteristic in the first sequence of keys, the first key being within the two or more keys. The method includes storing the key press time characteristic and the flight time characteristic for the first sequence of keys, and displaying indications associated with the first sequence of keys on a display device provided on a portion of the keyboard input device.
    Type: Grant
    Filed: October 22, 2008
    Date of Patent: March 13, 2012
    Assignee: Minebea Co., Ltd
    Inventors: Mario T. Wu, Jr., John J. Guo, Larry Rice
  • Publication number: 20120013440
    Abstract: These teachings comprise accessing an identifier as corresponds to a given module of RFID-tagged items and then using that identifier to filter the RFID tag readings. By one approach, one can obtain this identifier for the module by reading an optical code as corresponds to the given module of items. By another approach, one can obtain this identifier by reading an RFID tag that specifically correlates to the given module of items. By yet another approach, one can obtain this identifier by receiving the identifier as entered by an end user who is participating in the RFID tag reading process. If desired, this identifier can serve to recall corresponding information that can serve, directly or indirectly, as filter criterion to use when processing the RFID tag responses.
    Type: Application
    Filed: July 27, 2010
    Publication date: January 19, 2012
    Applicant: WAL-MART STORES, INC.
    Inventors: Samuel John von Bose, Wendell Lachica Valdez
  • Patent number: 8098131
    Abstract: An information processing apparatus includes a first control unit configured to judge whether or not the information processing apparatus is in a state where a remote lock operation is impossible; an input unit configured to accept input of authentication information in case that the first control unit judges that the information processing apparatus is in a state where the remote lock operation is impossible; an authenticate unit configured to authenticate whether or not the input-accepted authentication information is coincident with previously stored authentication information; and a second control unit configured to prohibit a transmission/reception of data between the information processing apparatus and an information read device disposed adjacent to the information processing apparatus.
    Type: Grant
    Filed: January 25, 2007
    Date of Patent: January 17, 2012
    Assignee: Fujitsu Toshiba Mobile Communications Limited
    Inventors: Yasuhiko Abe, Takafumi Nakamura, Munehisa Tomioka, Daizo Ichien
  • Patent number: 8063734
    Abstract: A method of operating an access control system including a remote control system configured to control a lock an a central control system configured to wirelessly communicate with the remote control system. The method includes inputting user data into a user identification reader of the remote control system, and in response to inputting user data, requesting updating a remote user list stored by the remote control system with a central user list stored by the central control system using a wireless communicator of the remote control system and a wireless communicator of the central control system. The method further includes comparing the user data with one of the remote user list and the central user list to determine whether to unlock the lock.
    Type: Grant
    Filed: November 6, 2006
    Date of Patent: November 22, 2011
    Assignee: Harrow Products LLC
    Inventor: Fred J. Conforti
  • Patent number: 8009013
    Abstract: A method of controlling access to a restricted area including receiving location information from at least one supplemental tracking source which tracks location of an authorized user, and controlling access by the authorized user to a restricted area based on the location information. The method may further include maintaining a muster based on the location information. A physical access control system for controlling access to a restricted area including a user location information system and an access system which controls access based on the location information. The user location information system may further maintain a muster based on the location information. The user location information system receives location information indicating location of an authorized user from at least one supplemental tracking source.
    Type: Grant
    Filed: September 21, 2007
    Date of Patent: August 30, 2011
    Inventors: Robert A. Hirschfeld, Michael K. Cation
  • Publication number: 20110156867
    Abstract: Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature authentication. In one embodiment, a method may involve recording a first gesture-based signature and storing the recorded first gesture-based signature. Then the method compares the first gesture-based signature with a second gesture-based signature. Then the method verifies the first gesture-based signature as authentic when the first gesture-based signature is substantially similar to the second gesture-based signature.
    Type: Application
    Filed: December 30, 2009
    Publication date: June 30, 2011
    Inventors: Carlos Carrizo, Claudio Ochoa, Lucas Massuh
  • Patent number: 7954704
    Abstract: Implementations of the present invention provide systems, methods, and apparatus for stopping unauthorized transactions before they are processed, as well as for creating and using one or more sub-accounts. For example, a debit or credit account can be activated or deactivated at will through various spend control mechanisms, which can be limited by specified time periods, numbers of transactions, and/or monetary amounts. Further implementations also relate to using a unique 6-digit identification number (or biometric information) that is known only to the account granting institution and the primary account owner for the various types of activation/deactivation.
    Type: Grant
    Filed: February 8, 2006
    Date of Patent: June 7, 2011
    Assignee: Transsec Data Limited Liability Compnay
    Inventors: Brian R. Gephart, Darrell Redford
  • Patent number: 7895440
    Abstract: The invention relates to a method of masking a plain datum b having n bits. The inventive method is characterised in that a masked datum m is produced using the following masking function: (I), wherein p is a prime number, bi is the bit at position i of plain datum b, and qi is the prime number at position i in a set of prime numbers (q1, . . . , qn). The invention also relates to a method of masking a biometric print, consisting in: determining a set of s real minutiae which are characteristic of the print; mixing and arranging the real minutiae with t false minutiae; and forming a mixed biometric datum b having n=s+t bits, such that, for any i: bi=1 if position i corresponds to a real minutia, and bi=0 if position i corresponds to a false minutia. The invention can be used to secure a security document such as a bank cheque.
    Type: Grant
    Filed: May 11, 2005
    Date of Patent: February 22, 2011
    Assignee: Gemalto SA
    Inventors: Cédric Cardonnel, Eric Brier, David Naccache, Jean-Sébastien Coron
  • Publication number: 20100328036
    Abstract: A method for granting access to change a security system from a locked state to an unlocked state includes: displaying a security access interface on the display unit; selecting one image; changing at least one value of at least one property of the selected image; at least recording the at least one changed value of the at least one property of the selected image; generating an input password at least according to the at least one recorded value of the at least one property of the selected; determining whether the input password matches a predetermined password; and granting access if the input password matches with the predetermined password. A related security system is also provided.
    Type: Application
    Filed: December 25, 2009
    Publication date: December 30, 2010
    Applicants: HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD., HON HAI PRECISION INDUSTRY CO., LTD.
    Inventor: KUI-JUN WANG
  • Publication number: 20100308963
    Abstract: Embodiments of the invention provide a variable frequency drive system and a method of controlling a pump driven by a motor with the pump in fluid communication with a fluid system. The drive system and method can provide one or more of the following: a sleep mode, pipe break detection, a line fill mode, an automatic start mode, dry run protection, an electromagnetic interference filter compatible with a ground fault circuit interrupter, two-wire and three-wire and three-phase motor compatibility, a simple start-up process, automatic password protection, a pump out mode, digital input/output terminals, and removable input and output power terminal blocks.
    Type: Application
    Filed: June 9, 2009
    Publication date: December 9, 2010
    Inventors: Melissa Drechsel Kidd, William James Genaw, Michael Robert Pasche, Gary Thomas Baase, II, Lars Hoffmann Berthelsen, Rasmus Fink, Martin Skov Holm
  • Publication number: 20100277279
    Abstract: A Radio Frequency Identification (RFID) privacy protection method and apparatus is provided. The RFID privacy protection method includes: receiving a password of a tag; reading a code value from the tag; performing authentication of a user with respect to the tag using the code value and the password; and deactivating the tag electrically or physically based on a result of the performing.
    Type: Application
    Filed: December 10, 2008
    Publication date: November 4, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Ho Won Kim, Kyo II Chung
  • Patent number: 7796011
    Abstract: A water treatment apparatus programmable pass key comprising a data carrier programmed with one or more predetermined codes, each code relating to an operation in or of the water treatment apparatus.
    Type: Grant
    Filed: September 9, 2004
    Date of Patent: September 14, 2010
    Assignee: OTV SA
    Inventors: Lee Underwood, Jonathan Fleisig
  • Patent number: 7786866
    Abstract: An RFID tag can include a transmitting device and a receiving device for transmitting data to and receiving data from a tag reader, and the tag can include a memory for storing identification data unambiguously labeling the RFID tag and circuitry which automatically executes functions depending on the fact that: the reader demonstrates knowledge of an internal password in a memory of the tag; and information stored in the memory of the tag for an internal state permits the execution of the function. The tag also includes circuitry for changing the stored password and/or the internal state, in particular depending on a previous comparison of the internal password to one received from the reader.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: August 31, 2010
    Assignee: SAP AG
    Inventor: Oliver Berthold
  • Patent number: 7762456
    Abstract: The security clearance card, system, and method include a card that stores data to verify the identity of an owner of the card. In addition to other types of information, the card stores biometric data of the owner and other identity data. Different portions of the data may be encrypted with different encryption techniques based upon a predetermined level of security assigned to the portions of the stored data. Reader elements are then capable of reading at least a portion of the encrypted data stored on the security clearance card, and receiving at least one biometric from an individual. The biometric stored in the card is then compared with the biometric of the individual presenting the security clearance card to verify that the holder of the card is the owner of the card.
    Type: Grant
    Filed: February 5, 2008
    Date of Patent: July 27, 2010
    Assignee: Digital Data Research Company
    Inventors: Arthur F. Register, Jr., Frank J. Camper
  • Publication number: 20100127824
    Abstract: The invention relates to methods and appropriate devices for safely, unequivocally and exclusively, temporarily assigning the command authority of an operator (1) to a controllable technical system (60) using a mobile control device (2) which is technically suitable for periodically controlling a plurality of controllable technical systems (60), which is equipped as standard with safety switch elements (38, 39) such as an emergency stop switch, ok key and operating mode selection switches and for a data coupling with the controllable technical system (60) in spite of having only normal transmission means (6) or network technologies without any particular features specific to safety function.
    Type: Application
    Filed: April 5, 2006
    Publication date: May 27, 2010
    Inventors: Manfred Möschl, Manfred Schininger
  • Patent number: 7725730
    Abstract: Secure authentication protocols, particularly well-suited for use in authenticating mobile communications devices having limited computational resources, are disclosed. In an illustrative embodiment, a network-based communication system includes a client device and at least two servers. First and second shares are generated from a first password associated with the client device, and stored in respective first and second servers. The client device submits additional information associated therewith to at least one of the first and second servers. Each of the first and second shares has the property that it is infeasible to determine solely therefrom correspondence of the additional information with the first password. The first and second servers then utilize the respective first and second shares to collectively determine said correspondence of the additional information with the first password.
    Type: Grant
    Filed: August 9, 2002
    Date of Patent: May 25, 2010
    Assignee: EMC Corporation
    Inventors: Ari Juels, Burton S. Kaliski, Jr.
  • Publication number: 20100085154
    Abstract: Provided is a radio frequency identification (RFID) tag generating method and device, and a contents receiving method using the same. The contents receiving method using the RFID tag generating device includes: a terminal detecting a virtual tag corresponding to contents; receiving a password to be used once, corresponding to the virtual tag; authenticating a user by determining whether the password to be used once corresponds to a password input by the user; receiving an identification code of the virtual tag when the password to be used once corresponds to a password input by the user; and receiving the contents matching the identification code of the virtual tag, and providing the same to the user.
    Type: Application
    Filed: September 24, 2009
    Publication date: April 8, 2010
    Applicant: Electronics and Telecommunication Research Institute
    Inventors: Nam Je PARK, Doo Ho CHOI
  • Patent number: 7683806
    Abstract: A reduced keyboard handheld electronic device and associated method that utilizes a plurality of passwords for controlling access thereto. The handheld electronic device has a non-predictive keystroke interpretation system, such as a multi-tap system. At least one of the passwords is valid and accepted when input using a keyboard of a separate electronic device, such as a PC or another handheld electronic device, and at least one of passwords is valid and accepted when input using the reduced keyboard of the handheld electronic device. In some embodiments, the keyboard of the separate electronic device is a reduced keyboard, such as a reduced QWERTY or AZERTY keyboard, and in others it is a non-reduced keyboard, such as a standard QWERTY keyboard.
    Type: Grant
    Filed: August 4, 2008
    Date of Patent: March 23, 2010
    Assignee: Research In Motion Limited
    Inventor: Christopher R. Wormald
  • Publication number: 20100051689
    Abstract: A wireless mobile communications apparatus reads removable cards and can communicate an account corresponding to the removable card in order to conduct a wireless transaction with a merchant on the account with the wireless mobile communications apparatus. A total currency amount for the transaction, and remaining balance in the account after the transaction, can be displayed on a display screen of the wireless mobile communications apparatus. The removable card can be a gift card bearing a magnetic strip having an identifier for the account encoded thereto that will be read when inserted into the wireless mobile communications apparatus which can be a cellular telephone or Web enabled portable device. The magnetic strip gift card can be substantially composed of paper so as to be intended for disposable after use.
    Type: Application
    Filed: August 13, 2009
    Publication date: March 4, 2010
    Inventor: Stephen Diamond
  • Publication number: 20100052854
    Abstract: Provided are an apparatus and a method for controlling an operation of an RFID system, that can selectively control communication of the RFID system. In the method for controlling an operation of the RFID system including at least one REID tag storing predetermined data, and an RFID reader transmitting/receiving data to/from the RFID tag, a password is set to at least one of the RFID tag and the RFID reader. A password is received so that data transmission/reception is performed between the RFID tag and the RFID reader. When the received password coincides with the set password, the data transmission/reception is performed.
    Type: Application
    Filed: November 7, 2007
    Publication date: March 4, 2010
    Inventor: Jae Han Jeun
  • Patent number: 7650409
    Abstract: Methods and devices are directed to authorizing a network device to a resource over a network. An access server determines based, in part, on an attribute of the network device associated with the attribute certificate, whether the network device may be authorized access to the resource over the network. The attribute may be associated with a capability granted to the network device, a condition to be satisfied for the attribute to be valid, and the like. The attribute may belong to a group of network devices, or one or more users accessing the network through the network device. In one embodiment, the attribute certificate may be provided based on an automated security scan of the network device. In another embodiment, the access server may make the attribute available to a network resource associated with the access server.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: January 19, 2010
    Assignee: Nokia Siemens Networks Oy
    Inventors: Adam Cain, Craig R. Watkins, Jeremey Barrett
  • Patent number: 7633376
    Abstract: RFID readers, computers, and methods are provided for reporting on the authentication of one or more RFID tags associated with a proffered item, while requiring special permissions be cleared before reporting. In some embodiments, a question is input about whether a Declared Password (DP) is regarded as proper for an Item Identifier (II), both of which have been input from the tags. An answer is generated for the question from the reference database, and transmitted to the user. The answer does not reveal an Actual Code that is indeed regarded as proper, unless the user first demonstrates they already know it. Beyond the authentication of the tag, the answer can further indicate the legitimacy of the proffered item, for a supply chain, at a Customs Office, etc.
    Type: Grant
    Filed: December 11, 2006
    Date of Patent: December 15, 2009
    Assignee: Impinj, Inc.
    Inventors: Christopher J. Diorio, Gregory T. Kavounas
  • Publication number: 20090302999
    Abstract: A vehicle security and monitoring control system having one or more vehicle security and monitoring control (VSMCM) controllers, one or more wireless remotes and one or more base stations connected to a computer. The VSMCM controller prevents operation of a vehicle in a safe manner by requesting protected state configuration changes within the control module within the vehicle when prompted to disable the vehicle, and changes the protected state configuration back to the original state within the control module when prompted to enable the vehicle. The wireless remote prompts the VSMCM controller to lock doors, unlock doors, enable vehicle operation or disable vehicle operation of the control module within the vehicle. The base station communicates with the VSMCM controllers to update and change operation of the controllers, as well as record events and vehicle information taken by the controllers.
    Type: Application
    Filed: June 4, 2009
    Publication date: December 10, 2009
    Applicant: Anzen Electronics LLC
    Inventor: Richard J. Skertic
  • Publication number: 20090295540
    Abstract: A facsimile machine receives image data, generates a password for received image data, assigns the generated password to the received image data, and stores the received image data. Information indicating a notification destination is extracted from the received image data, and the notification destination is notified of the password. The received image data are output responsive to subsequent input of the password at the facsimile machine. This scheme provides password protection without forcing users to register and remember passwords, and without the risk that a compromised password may be used for unauthorized output of facsimile data received later.
    Type: Application
    Filed: April 22, 2009
    Publication date: December 3, 2009
    Applicant: OKI DATA CORPORATION
    Inventor: Kazuya Yamamoto
  • Patent number: 7619544
    Abstract: A BIOS password security technique includes first logic operable to extract a down scan code from a keyboard input queue, the down scan code having a most significant bit; second logic operable to examine case-related auxiliary information; and third logic operable to set the state of the most significant bit responsive to the case-related auxiliary information, thereby creating a modified scan code.
    Type: Grant
    Filed: October 27, 2005
    Date of Patent: November 17, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Mark A. Piwonka, Bernard D. Desselle, David J. DeLisle
  • Patent number: 7561075
    Abstract: Ternary data as corresponds to a movable barrier operator is provided (21) and converted (22) into corresponding binary information. In a preferred approach this comprises converting each ternary trit into a corresponding binary pair. Pursuant to a preferred approach binary bits as correspond to, for example, fixed and/or non-fixed information (32 and 33) are provided (31) and then converted (34) into the aforementioned ternary data.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: July 14, 2009
    Assignee: The Chamberlain Group, Inc.
    Inventors: James J. Fitzgibbon, Eric Gregori
  • Publication number: 20090140839
    Abstract: Facilitating transactions using non-traditional devices and biometric data to activate a transaction device is disclosed. A transaction request is formed at a non-traditional device, and communicated to a reader, wherein the non-traditional device may be configured with an RFID device. The RFID device is not operable until a biometric voice analysis has been executed to verify that the carrier of the RFID equipped non-traditional device is the true owner of account information stored thereon. The non-traditional device provides a conduit between a user and a verification system to perform biometric voice analysis of the user. When the verification system has determined that the user is the true owner of one or more accounts stored at the verification system, a purchase transaction is facilitated between the verification system.
    Type: Application
    Filed: February 6, 2009
    Publication date: June 4, 2009
    Applicant: American Express Travel Related Services Company, Inc.
    Inventors: Fred Bishop, Peter D. Saunders
  • Patent number: 7511602
    Abstract: Methods and apparatus are provided for a key-less system for actuating a lock responsive to a valid OPEN signal. A first portion is continuously coupled to a power source and a second portion receives power from the source only when a coupling switch is ON. The first portion comprises a keypad for entry of a lock actuation code, and a detector that senses the first keystroke and turns the switch ON. The second portion includes an RF transmitter and preferably a memory with valid actuation codes stored therein, and a processor coupled to the memory, to the keypad and to the RF transmitter. When the entered and stored keystrokes match, the RF transmitter sends an OPEN signal to the lock. The method comprises detecting the first keystroke, turning on the power switch ON, comparing the entered and stored keystrokes and if matched, transmitting an OPEN command to the lock.
    Type: Grant
    Filed: January 10, 2006
    Date of Patent: March 31, 2009
    Assignee: General Motors Corporation
    Inventor: Fred W. Huntzicker
  • Publication number: 20090046841
    Abstract: Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user's account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
    Type: Application
    Filed: July 11, 2008
    Publication date: February 19, 2009
    Inventor: Stephen L. Hodge
  • Publication number: 20080306774
    Abstract: A credit card sized digital storage device and data system and method of marketing same pertaining to health care information, a memory and processor for processing digital data, an output on the card for converting and transmitting the digital data for video output, a set of touch sensitive controls on the planar surface of the card, a modifiable planar surface for placement of graphics, and electrical access to the memory and processor for upload and download of the digital content. A preferred embodiment includes memory storage of a patient's pertinent medical information for retrieval, addition and use by medical personnel. A preferred embodiment includes wireless transmitter or a USB connector for physical connection to a computing device. The device may also be used for branding and facilitating interrelationships between patient, medical providers and others involved in health care.
    Type: Application
    Filed: June 5, 2008
    Publication date: December 11, 2008
    Inventors: Andrew George, Josh Lieber
  • Patent number: 7460853
    Abstract: A wireless module security system and method is provided which includes, in one embodiment providing security data to a wireless module. The security data including a security code provided to the wireless module after the wireless module has been activated. The method for providing the security code includes encrypting the security code after establishing a wireless module account, issuing the security code through wireless transmission to the wireless module, and decrypting and storing the security code inside the wireless module. The security system and method also utilizes user authorized associated peripheral devices which may be connected to the wireless module to provide further combinations of security data. In one embodiment, the wireless module is provided with an electronic serial number and that electronic serial number is stored to the peripheral device for a security measure.
    Type: Grant
    Filed: October 5, 2001
    Date of Patent: December 2, 2008
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventor: Akihiko Toyoshima
  • Patent number: 7432831
    Abstract: A reduced keyboard handheld electronic device and associated method that utilizes a plurality of passwords for controlling access thereto. The handheld electronic device has a non-predictive keystroke interpretation system, such as a multi-tap system. At least one of the passwords is valid and accepted when input using a keyboard of a separate electronic device, such as a PC or another handheld electronic device, and at least one of passwords is valid and accepted when input using the reduced keyboard of the handheld electronic device. In some embodiments, the keyboard of the separate electronic device is a reduced keyboard, such as a reduced QWERTY or AZERTY keyboard, and in others it is a non-reduced keyboard, such as a standard QWERTY keyboard.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: October 7, 2008
    Assignee: Research in Motion Limited
    Inventor: Christopher R. Wormald
  • Publication number: 20080238614
    Abstract: A method of securing a wireless device, includes: receiving, from a subscriber, a request to activate one or more security features and recovery functions of a missing wireless device; determining whether the wireless device is powered on; setting, in the event the wireless device is not powered on, a flag in an account of the subscriber to activate the requested functions upon determining the wireless device is powered on; activating, upon determining the wireless device is powered on, the requested functions by blowing at least one of a series of electrically programmable fuses included within the wireless device; and deactivating by blowing at least another of a series of electrically programmable fuses, in the event of receiving another request from the subscriber, the one or more security features and recovery functions, so as to reinstate a set of standard operating features of the wireless device.
    Type: Application
    Filed: March 30, 2007
    Publication date: October 2, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David J. Delia, Wayne M. Delia
  • Publication number: 20080231418
    Abstract: The present invention relates to a device (100, 200, 300) and a method for creating challenge-response pairs. A basic idea of the present invention is to create a challenge in the form of light emitted onto a light scattering element (103, 203), which light will be scattered in the light scattering element and detected as a response to the challenge by light detecting elements (105, 205). The light scattering element comprises a transmissive material which contains randomly distributed light scattering particles (104, 204), which scatter incident light such that a random speckle pattern is created and spread over the light detecting elements. This random pattern is detected by the light detecting elements, and is known as the response to the challenge (i.e. the light) that was supplied to the light scattering element. Hence, a challenge-response pair is created.
    Type: Application
    Filed: October 2, 2006
    Publication date: September 25, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Willem Gerard Ophey, Boris Skoric, Pim Theo Tuyls, Antonius Hermanus Maria Akkermans