Password Patents (Class 340/5.85)
-
Patent number: 7420478Abstract: A reduced keyboard handheld electronic device and associated method that utilizes a plurality of passwords for controlling access thereto. The handheld electronic device has a non-predictive keystroke interpretation system, such as a multi-tap system. At least one of the passwords is valid and accepted when input using a keyboard of a separate electronic device, such as a PC or another handheld electronic device, and at least one of passwords is valid and accepted when input using the reduced keyboard of the handheld electronic device. In some embodiments, the keyboard of the separate electronic device is a reduced keyboard, such as a reduced QWERTY or AZERTY keyboard, and in others it is a non-reduced keyboard, such as a standard QWERTY keyboard.Type: GrantFiled: April 17, 2007Date of Patent: September 2, 2008Assignee: Research In Motion LimitedInventor: Christopher R. Wormald
-
Patent number: 7394347Abstract: The operating control system can be use on electronic equipment, such as cell phones, computers, engine analyzers, etc. An input device enables the input of user access data and a readout panel monitors the equipment status. A programmable feature selection member enables the user to select at least one programmable feature and respective activation time period. An internal member controls operation of the equipment by controlling access to one or more said programmable features based upon user selection, to enable full or partial activation of the device. A user is able to program specific events, such as TV shows, to be activated at specific times with controlled access by secondary access codes.Type: GrantFiled: January 9, 2003Date of Patent: July 1, 2008Assignee: World Wide Innovations, LLCInventor: Darren Kady
-
Publication number: 20070293194Abstract: Provided is a remote mobile device access and control method, and particularly a generic approach for providing remote mobile device access and control. To this end, there is provided a method for a user to access and control his/her mobile device at a remote location by using a remote mobile device access and control architecture that allows the user to access an application and data of his/her mobile device.Type: ApplicationFiled: May 31, 2007Publication date: December 20, 2007Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventor: Man Mohan Singh Bisht
-
Patent number: 7245213Abstract: RFID system components, such as readers and tags, communicate where at least a portion of data or a password is transmitted in encrypted form. The reader transmits a command, along with data or a password encrypted using an encryption kernel. In some instances, the tag itself has sent the kernel.Type: GrantFiled: January 10, 2005Date of Patent: July 17, 2007Assignee: Impinj, Inc.Inventors: Aanand Esterberg, Christopher J. Diorio, Todd E. Humes
-
Patent number: 7173517Abstract: When transmitting an instruction for activating an immobilizer function to a subject vehicle, a base station also transmits a given ID code for releasing the immobilizer function. An immobilizer ECU that receives the instruction and the given ID code, prohibits an engine from being started by other than a key having the given ID code. Therefore, a regular user alone, who owns a key having the given ID code, can start the engine.Type: GrantFiled: October 28, 2004Date of Patent: February 6, 2007Assignee: Denso CorporationInventors: Akihiro Kondo, Ifushi Shimonomoto, Toshio Shimomura
-
Patent number: 7161468Abstract: A user authentication method and apparatus including determining whether a password has been input; setting a first threshold value if the input password matches with a registered password and setting a second threshold value if the input password does not match with the registered password; and determining whether to authenticate the user or not based on a comparison of the user's biometrics information with registered biometrics information and the first or second threshold value.Type: GrantFiled: January 21, 2004Date of Patent: January 9, 2007Assignee: Samsung Electronicss Co., Ltd.Inventors: Eui-hyeon Hwang, Jong-ha Lee
-
Patent number: 7154378Abstract: RFID circuitry is used in an endoscopic light source unit to track cumulative light bulb use information. An inductively powered RFID tag is affixed to the light bulb assembly, and communicates wirelessly with an RF transceiver within the light source unit via a low-frequency modulation wave. The RFID tag includes memory which stores a value representing cumulative duration of use of the light bulb. The transceiver reads the value from the RFID tag and communicates the value to control circuitry in the light source unit, which tracks use of the light bulb within the light source unit. Based on such tracking, the transceiver periodically updates the value in the RFID tag via the wireless link. Cumulative bulb usage hours is displayed on the light source unit. The RFID tag also may store a custom password and/or other information.Type: GrantFiled: September 11, 2003Date of Patent: December 26, 2006Assignee: Stryker CorporationInventors: Hasan Ertas, Brannon P. Wells, Rajeshwari Srinivasan
-
Patent number: 7091845Abstract: A security system incorporating one or more biometric data recognition capabilities in a non-intrusive way to enhance the overall security provided by the system. The biometric recognition may be provided by incorporating one or more cameras in a keypad system wherein the key identifications are altered between uses, and wherein the viewing of the key identifications is sufficiently restricted so that an operator must be adequately aligned with the key identifications when operating the system that reliable biometric data may be automatically obtained during system operation without the need for additional explicit positioning requirements placed upon the user. Other biometric data sensors may also be used if desired. Various embodiments are disclosed.Type: GrantFiled: September 5, 2003Date of Patent: August 15, 2006Assignee: Hirsch Electronics CorporationInventors: Lawrence W. Midland, Douglas J. Morgan
-
Patent number: 7079007Abstract: Systems and methods perform access control and mobile identity verification utilizing a memory, maybe on a handheld device, that stores at least biometric data, such as minutia. The handheld device may also store other data, such as a threshold value and Wiegand data. The data may be stored in a memory, a magnetic strip, a code, a bar code, or in all of these devices associated with the handheld device. The handheld device may be a SmartCard or the like. The threshold value may be a required value or parameter generated from input criteria based on biometric data read and extracted by an extracting system during an enrolling process. The threshold value is used during extracting, matching, or both, to most accurately determine the identity and characteristics of an individual wanting access to an accessed system or being questioned by law enforcement in the field.Type: GrantFiled: April 19, 2002Date of Patent: July 18, 2006Assignee: Cross Match Technologies, Inc.Inventors: William G. Siegel, Greg L. Cannon, Frank E. Fernandez
-
Patent number: 7071850Abstract: Ternary data as corresponds to a movable barrier operator is provided (21) and converted (22) into corresponding binary information. In a preferred approach this comprises converting each ternary trit into a corresponding binary pair. Pursuant to a preferred approach binary bits as correspond to, for example, fixed and/or non-fixed information (32 and 33) are provided (31) and then converted (34) into the aforementioned ternary data.Type: GrantFiled: January 27, 2005Date of Patent: July 4, 2006Assignee: The Chamberlain Group, Inc.Inventors: James J. Fitzgibbon, Eric Gregori
-
Patent number: 7015791Abstract: Methods and apparatus are provided for a key-less system for actuating a lock responsive to a valid OPEN signal. A first portion is continuously coupled to a power source and a second portion receives power from the source only when a coupling switch is ON. The first portion comprises a keypad for entry of a lock actuation code, and a detector that senses the first keystroke and turns the switch ON. The second portion includes an RF transmitter and preferably a memory with valid actuation codes stored therein, and a processor coupled to the memory, to the keypad and to the RF transmitter. When the entered and stored keystrokes match, the RF transmitter sends an OPEN signal to the lock. The method comprises detecting the first keystroke, turning on the power switch ON, comparing the entered and stored keystrokes and if matched, transmitting an OPEN command to the lock.Type: GrantFiled: August 19, 2003Date of Patent: March 21, 2006Assignee: General Motors CorporationInventor: Fred W. Huntzicker
-
Patent number: 7002450Abstract: In a method for authenticating a spare key for use with a vehicle in the absence of the regular key, the spare key is provided with an identification number that is transmitted to, and checked by, a central station. The spare key is authenticated by an authorization signal sent from the central station to the vehicle.Type: GrantFiled: June 30, 2004Date of Patent: February 21, 2006Assignee: Bayerische Motoren Werke AktiengesellschaftInventor: Ruediger Bartz
-
Patent number: 6978385Abstract: A data processing system and method are disclosed for remotely recovering a client computer system's primary password. The primary password be correctly entered prior to the client computer system becoming fully accessible to a user. The client computer system is coupled to a server computer system utilizing a network. Prior to the client computer system completing a boot process, a user is prompted to enter the primary password. An interrogative password method is provided in response to an incorrect entry of the primary password. The primary password is recoverable in response to a successful execution of the interrogative password method. The primary password is recoverable from the server computer system by the client computer system prior to said client computer system completing said boot process utilizing the interrogative password method.Type: GrantFiled: March 1, 2000Date of Patent: December 20, 2005Assignee: International Business Machines CorporationInventors: Richard W. Cheston, Daryl Carvis Cromer, Richard Alan Dayan, Dhruv Manmohandas Desai, Jan M. Janick, Howard Jeffery Locker, Andy Lloyd Trotter, James Peter Ward
-
Patent number: 6976269Abstract: An Internet co-location facility security system integrates all the major components of the system and makes tracking information from these components available to co-located members on a database accessible from the web. A web-based interface allows co-located members to assign visitor access to the Internet co-location facility through the Internet from remote computer terminals. A visitor access and enrollment system allows a visitor to enroll only once in the system to be granted access to one or more other Internet co-location facility security systems around the globe.Type: GrantFiled: August 29, 2000Date of Patent: December 13, 2005Assignee: Equinix, Inc.Inventors: Albert M. Avery, IV, Jay Steven Adelson, Derrald Curtis Vogt
-
Patent number: 6971029Abstract: An Internet co-location facility security system and method integrates all the major components of the system and makes tracking information from these components available to co-located members on a database accessible from the web. A web-based interface allows co-located members to assign visitor access to the Internet co-location facility through the Internet from remote computer terminals. A visitor access and enrollment system allows a visitor to enroll only once in the system to be granted access to one or more other Internet co-location facility security systems around the globe.Type: GrantFiled: June 29, 2001Date of Patent: November 29, 2005Assignee: Equinix, Inc.Inventors: Albert M. Avery IV, Jay Steven Adelson, Derrald Curtis Vogt
-
Patent number: 6940395Abstract: A system and method for adjusting an alarm/reminder activation time that takes into account a user-requested alarm/reminder time and unexpected conditions that are unknown to the user, or are realized after the user has entered the user-requested alarm time, is provided. User related information is used to gather present unexpected condition information relevant to the user from a content provider periodically. Based on the user related and configuration information and the unexpected condition information, an adjusted alarm time is determined periodically. An alarm signal is activated when the actual time reaches the adjusted alarm time.Type: GrantFiled: June 29, 2001Date of Patent: September 6, 2005Assignee: Intel CorporationInventor: Daniel E Steinmark
-
Patent number: 6871288Abstract: A computerized password verification system and associated method is disclosed for discreet recognition and reporting of a duress transaction being imposed upon a user at an ATM or other remote cash-dispensing terminal. The inventive system utilizes conventional ATM hardware including a card reader, keypad and display together with its associated operating and communications software required for transaction processing, and further comprises the programmed generation and display screen of a list of transaction acceptance passwords (TAPs) with a prompt to the user for a TAP selection to confirm the validity of the immediate transaction. The prompted display of the TAP list appears following the initial acceptance of the user's personal identification number (PIN) and requires the ATM user to select the TAP from the list that is currently registered to the user.Type: GrantFiled: February 21, 2003Date of Patent: March 22, 2005Inventor: Ronald K. Russikoff
-
Publication number: 20040164848Abstract: A user authentication method and apparatus including determining whether a password has been input; setting a first threshold value if the input password matches with a registered password and setting a second threshold value if the input password does not match with the registered password; and determining whether to authenticate the user or not based on a comparison of the user's biometrics information with registered biometrics information and the first or second threshold value.Type: ApplicationFiled: January 21, 2004Publication date: August 26, 2004Applicant: Samsung Electronics Co., LtdInventors: Eui-hyeon Hwang, Jong-ha Lee
-
Patent number: 6765470Abstract: A mobile electronic apparatus in which biometrics information, free from being stolen or faked by a unauthorized person, is used for user verification, virtually perfectly protecting an authorized user's personal data stored in a storing section of the apparatus. A verifying section compares a user's biometrics feature information with the authorized user's reference biometrics feature information to discriminate whether the fingerprint feature information for verification matches the reference fingerprint feature information. If it matches, a display control section reads out the personal data stored in the storing section and controls a display section to display the read-out personal data.Type: GrantFiled: February 5, 2001Date of Patent: July 20, 2004Assignee: Fujitsu LimitedInventor: Takashi Shinzaki
-
Patent number: 6725382Abstract: The BIOS device (108) or some other secure store of a portable computer (PC 100) or other valuable device stores a password-based security program (302), an encrypted password (306), and an encryption key (304). When the PC is booted, the security program executes first and prompts the user for a password, encrypts it with the stored key, and compares it with the stored password. If the passwords do not match, boot is aborted and the PC is disabled. Only if the passwords do match is boot continued and use of the PC enabled. If this security measure is advertised, theft of the PC is deterred because of the difficulty of accessing or bypassing the password and the security program in the BIOS device. The encrypted password is also registered with a remote trusted certificate authority (TCA 150) or is stored on a local external storage device (250). To establish or change the password, a communication connection is established from the PC to the TCA or storage device.Type: GrantFiled: December 6, 1999Date of Patent: April 20, 2004Assignee: Avaya Technology Corp.Inventors: John S. Thompson, Melinda M. Thompson
-
Patent number: 6720860Abstract: A wearable mobile computing device/appliance (e.g., a wrist watch) with a high resolution display that is capable of wirelessly accessing information from the network and a variety of other devices. The Wrist Watch device/appliance includes a password authentication system for enabling access to secured data stored therein. The authentication system includes a user interface display having a touch sensitive panel for detecting physical user interaction therewith and generating signals accordingly. The Wrist Watch device/appliance generates a sequence of one or more images for display via the user interface, the images of a sequence including that users' password elements which are flashed randomly at different interface display locations and varied temporally.Type: GrantFiled: June 30, 2000Date of Patent: April 13, 2004Assignee: International Business Machines CorporationInventor: Chandrasekhar Narayanaswami
-
Patent number: 6674358Abstract: A holster for a telecommunication device includes a self-contained power source for driving an alert and a detector. The detector detects the presence and unseating of an telecommunication device that is insertable into the holster. The alert is coupled to the detector and is operable to alert to a user when the telecommunication device is removed from the holster. In this way the user is warned of the imminent loss or theft of the communication device.Type: GrantFiled: January 4, 2001Date of Patent: January 6, 2004Assignee: Motorola, Inc.Inventor: Keith R. Tinsley
-
Patent number: 6657538Abstract: In a method for authenticating persons, video information of certain body features associated with a user or a user group is recorded in a point of presence (POP). Such recorded video information is processed to derive biometric keys, which are stored in tables of a biometric server and in a SIM-card of the user. Each biometric key in the tables is assigned to a respective user. When the user inserts the SIM-card containing a personal biometric key into a communication terminal device, video information describing current body feature of the user is recorded via a video sensor that is not in the communication terminal device. The recorded current video information is then transmitted from the video sensor to the communication terminal device. To authenticate the user, the recorded current video information is processed to derive current biometric keys and compared with pre-stored biometric keys. The authenticity of the user is ensured if the comparison yield a positive result.Type: GrantFiled: September 28, 1999Date of Patent: December 2, 2003Assignee: Swisscom Mobile AGInventor: Rudolf Ritter
-
Patent number: 6606024Abstract: An information source connected to a user's terminal through a communication line sends authentication information to the user's terminal. The user's terminal sends back response information of a card which is unique to each owner and which is loaded into the user's terminal, to the information source. The information source verifies the response information of the card to positively authenticate the user of the card.Type: GrantFiled: July 1, 1997Date of Patent: August 12, 2003Assignee: Canon Kabushiki KaishaInventor: Hiroshi Hosokawa
-
Patent number: 6587032Abstract: A stealth system and method that allows a resource to be practically invulnerable to fast online brute-force attacks is disclosed. The method for controlling access to a computer resource consists in performing a user authentication procedure upon receiving a request from a user to access the computer resource. As part of the user authentication procedure, a password verification procedure is performed which comprises the steps of requesting a password from the user and comparing the entered password with an expected valid one. The next steps are to compute the number of ungranted access for the user during a predefined time interval N if the password matches the expected one and to grant access to the user only if the computed number is lower than a predetermined number K of authorized requests.Type: GrantFiled: November 26, 2001Date of Patent: July 1, 2003Assignee: International Business Machines CorporationInventor: Francois-Dominique Gilles Armingaud
-
Patent number: 6583714Abstract: The invention concerns a method of protecting a radiocommunications terminal against unauthorized use, the terminal being adapted to send and receive a plurality of types of user information and a plurality of types of terminal information. According to the invention, when no user information is transmitted, the terminal is automatically switched to a secure mode in which the sending of at least one type of user information is prohibited and the sending of at least one type of terminal information is authorized, secure mode being canceled by entering a predetermined code. The invention applies in particular to GSM mobile terminals.Type: GrantFiled: October 7, 1999Date of Patent: June 24, 2003Assignee: AlcatelInventors: Ronan Gabou, Xavier Marty, Luc Davenas
-
Patent number: 6556127Abstract: A method to enable a user of a system to obtain access to one or more services, for example, to enable a caller to access some information on a remote server. The system first prompts the caller to identify himself by entering a subscriber code. A speaker verification is then made using a voice comparison between the caller's voice and a voice reference associated with the subscriber the caller claims to be. Access to the requested services is given if the outcome of said voice comparison is positive. If the system does not store a sufficiently good voice reference to verify the identity of the subscriber the user claims to be with a predetermined degree of reliability, the caller is prompted to enter a confidential PIN code. If the PIN code entered is correct, access to the requested services is given and a new voice reference is stored.Type: GrantFiled: April 13, 1999Date of Patent: April 29, 2003Assignee: Swisscom AGInventors: Thomas Moser, Robert Van Kommer
-
Patent number: 6501380Abstract: A protected device is provided which may normally operate in a first state of normal operation. A first event may cause the protected device to go into a second state of alert where the protected device still operates normally but additionally provides warnings to a user. For example, during the second state of alert a user may be warned that an access code needs to be entered to prevent degradation or altering of the operation of the protected device. The first event may be triggered or may depend on one or more sub-events some of which may occur with some probability and some of which may automatically occur or may be deterministic. If a second event occurs prior to the user providing an access code then the protected device would transition from the second state (normal operation with warnings) to a third state in which the operation of the protected device would be altered or degraded.Type: GrantFiled: November 10, 2000Date of Patent: December 31, 2002Assignee: Lucent Technologies Inc.Inventor: Bjorn Markus Jakobsson
-
Publication number: 20020171546Abstract: A universal, customizable computer security system including a set of security input signals each relating to a possible security event and a rules engine with a universal software interface responsive to the security input signals. The rules engine is configurable to perform one or more security actions in response to each security input signal. The rules engine further includes a user interface program to allow a user to select one or more customized security actions for a combination of one or more chosen security input signals, and a universal software output interface responsive to the selected security actions.Type: ApplicationFiled: April 17, 2002Publication date: November 21, 2002Inventors: Thomas P. Evans, W. David Lee, C. Gail Greenwald, Christopher Verplaetse
-
Patent number: 6307470Abstract: If a determining element 101 determines, according to signals issued by sensors 20 to 2n, that a data processing apparatus 10 has been taken out, an alarm element 105 issues an alarm. A power supply password requestor 103 causes, if the determining element 101 determines at the time of turning on the power supply to the data processing apparatus 10 that the data processing apparatus 10 has been taken out, a password to be entered and, if the entered password is found illegitimate, effects control so as not to start up the data processing apparatus 10.Type: GrantFiled: November 22, 1999Date of Patent: October 23, 2001Assignee: NEC CorporationInventor: Takahisa Shirakawa
-
Patent number: 6188309Abstract: An intelligent credit card incudes a keypad for inputting numbers and other information, a processor for controlling the operation of the credit card, a power source, and an output device for selectively outputting the credit card number when the card is activated. The output device is a magnetic strip. A user inputs a sequence of numbers using the keypad. The received sequence of numbers are compared to a stored PIN number. If the sequence of numbers matches the PIN number, the card is activated, and the credit card number is output using the output device.Type: GrantFiled: January 7, 1998Date of Patent: February 13, 2001Assignee: AT&T CorpInventor: Ronald M. Levine