Solely Password Entry (no Record Or Token) Patents (Class 713/183)
  • Patent number: 8595507
    Abstract: Apparatus, systems, and methods may operate to invoke multiple authentication mechanisms, by a client node, to encrypt N split-keys using credentials associated with corresponding ones of the authentication mechanisms. Further activity may include transforming the split-keys to provide N encrypted split-keys, and storing each of the encrypted split-keys with an associated local user identity and an identity of corresponding ones of the authentication mechanisms. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: February 16, 2011
    Date of Patent: November 26, 2013
    Assignee: Novell, Inc.
    Inventors: Santosh Kumar Panchapakesan, Vinayak Hegde
  • Patent number: 8594333
    Abstract: A device includes a key store memory that stores one or more cryptographic keys. A rule set memory stores a set of rules for accessing the cryptographic keys. A key store arbitration module grants access to the cryptographic keys in accordance with the set of rules. The device can be used in conjunction with a key ladder. The device can include a one-time programmable memory and a load module that transfers the cryptographic keys from the one one-time programmable memory to the key store memory and the set of rules to the rule set memory. A validation module can validate the cryptographic keys and the set of rules stored in the key store and rule set memories, based on a signature defined by a signature rule.
    Type: Grant
    Filed: January 4, 2010
    Date of Patent: November 26, 2013
    Assignee: VIXS Systems, Inc
    Inventors: Paul D. Ducharme, Wendy Wai Yin Cheung, Albert Yunsang Wong, Shijun Huang, Norman V. D. Stewart
  • Patent number: 8595807
    Abstract: A method, a system, and a device for implementing device addition in a Wireless Fidelity (Wi-Fi) Device to Device (D2D) network are provided, which belong to the field of communication. The method includes: receiving, by a first D2D client device, a first add request message forwarded by a D2D master device, in which the first add request message carries an identifier of a new device to be added to the D2D network; receiving a first Personal Identification Number (PIN) code of the new device; and forwarding the received first PIN code to the D2D master device, in which the first PIN code of the new device is used for implementing that the D2D master device performs Wi-Fi Protected Setup (WPS) security configuration of the new device according to the first PIN code.
    Type: Grant
    Filed: May 16, 2011
    Date of Patent: November 26, 2013
    Assignee: Huawei Device Co., Ltd.
    Inventors: Yongli Yang, Zhiming Ding, Guiming Shu, Xilei Liu
  • Patent number: 8595794
    Abstract: Auditing a communication is disclosed. Credentials are received from a client. It is determined whether the client is authorized to communicate with a remote resource. If it is determined that the communication with the remote resource is allowed, a communication is forwarded from the local resource to the remote resource.
    Type: Grant
    Filed: April 13, 2007
    Date of Patent: November 26, 2013
    Assignee: Xceedium, Inc.
    Inventor: David Van
  • Patent number: 8595850
    Abstract: A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information may include sensitive numbers such as social security numbers, credit card numbers or other private numbers. A tokenization system may include multiple physically distinct hardware platforms each having a tokenization server and a database. A tokenization server may run portions of a sensitive number through a predetermined number of rounds of a Feistel network. Each round of the Feistel network may include tokenizing portions of the sensitive number using a fractional token table stored an associated database and modifying the tokenized portions by reversibly adding portions of the sensitive number to the tokenized portions. The fractional token table may include partial sensitive numbers and corresponding partial tokens.
    Type: Grant
    Filed: February 1, 2012
    Date of Patent: November 26, 2013
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Richard T. Minner
  • Patent number: 8595809
    Abstract: A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The reusable authentication component may implement a complex authentication process, including multiple user interfaces to receive multiple assurances of user identity and user confirmation of previously stored mutual authentication data. The authentication process may be performed by the authentication component without refreshing or redirecting the parent web page until completion of a successful user authentication, after which the parent web page may receive authentication data and refresh to provide user specific and/or secure user data on the web page.
    Type: Grant
    Filed: February 21, 2012
    Date of Patent: November 26, 2013
    Assignee: Bank of America Corporation
    Inventors: Pavan Chayanam, Todd Inskeep, Eric William Miller, Clay Newton, David Charles Shroyer
  • Patent number: 8595509
    Abstract: A system controlling online access to a study course verifies the identity of an individual taking a study course over a global computer network from a first computer at a node of the network. The first computer has a biometric identification program and communicates over the network with a second computer that is at a network node other than a node of the first computer. The second computer includes study program material. The first computer operates a biometric reader, which obtains a first set of biometric data from the individual and a second set of biometric data from the individual while access is granted to course material. The biometric identification program compares the first set of data with the second set of data to make a verification of the identity of the individual and communicates the verification to the second computer.
    Type: Grant
    Filed: September 16, 2011
    Date of Patent: November 26, 2013
    Inventor: Armen Geosimonian
  • Patent number: 8590020
    Abstract: A system and method is presented for authentication, so as to control access to a resource. A set of objects (for example, a set of images) is established in advance between the user and the service for which the user is to be authenticated. During the authentication, the user, instead of inputting an alpha-numeric password, will be sent several sets (e.g., tables) containing the previously specified objects (e.g., images) in some arrangement (e.g., spatial pattern) among other objects (images). In order to authenticate, the user is shown additional tables, and must determine, as to each, whether it contains the same set of specified objects in the same spatial relationship as in the first table shown. After the user has correctly identified which tables reflect the specified objects in the requisite pattern, the user will be considered authenticated, and will then be granted access to the requested resource (for example, a bank account).
    Type: Grant
    Filed: January 22, 2008
    Date of Patent: November 19, 2013
    Inventor: Veronika Orlovskaya
  • Patent number: 8590017
    Abstract: Embodiments of the invention relate to partial authentication to access incremental information. An aspect of the invention concerns a method of authorizing access to information that comprises providing an initial segment of a password wherein the password includes password segments each associated with an incremental portion of the information. In response to the initial password segment satisfying an expected value, the method may authorize access to the information portion associated with the initial password segment. The method may authorize access to other information portions associated with subsequent segments of the password in response to the subsequent password segments satisfying respectively expected values.
    Type: Grant
    Filed: February 28, 2011
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Hernan Badenes, Mateo Nicolas Bengualid, Julian Ariel Cerruti, Hongxia Jin, Jeffrey Scott Pierce
  • Patent number: 8589669
    Abstract: A data protecting method for a rewritable non-volatile memory module having a first storage area and a second storage area and a memory controller and a memory storage device using the same are provided. The method includes providing default configuration information in response to a boot command from a host system, wherein the host system cannot recognize the second storage area according to the default configuration information. The method also includes requesting the host system to re-boot when a user identification code and a user password receiving from the host system pass an authentication procedure, and providing first configuration information to the host system after re-booting the host system. The host system can recognize the second storage area according to the first configuration information. Accordingly, the method can effectively protect data stored in the rewritable non-volatile memory module.
    Type: Grant
    Filed: April 17, 2012
    Date of Patent: November 19, 2013
    Assignee: Phison Electronics Corp.
    Inventors: Yi-Hung Peng, Ching-Hsien Wang, Chia-Jung Hsu
  • Patent number: 8588418
    Abstract: A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile communication device is enumerated by the computer system as a locally attached mass storage device. An authentication executable file is sent to the mobile communication device. A response generated by the computer system executing the authentication executable file is received from the mobile communication device. Based on the response generated by the computer system executing the authentication executable file, access to a data file that is stored by a mass storage system via a network is granted.
    Type: Grant
    Filed: September 22, 2008
    Date of Patent: November 19, 2013
    Assignee: Sprint Communications Company L.P.
    Inventors: Jeffrey R. Contino, Warren B. Cope, Douglas Alan Olding
  • Patent number: 8583705
    Abstract: The exchange of documents for signature can be performed efficiently using an automatic routing system that associates a document with appropriate identifying metadata. The routing can be facilitated through facsimile in which the metadata is encoded on a return facsimile cover sheet that is routed with the document. Appropriate central exchange servers have appropriate input and out subsystems to perform the document routing. The executed documents can be conveniently archived for efficient document storage and access, such as network access to one or more of the parties.
    Type: Grant
    Filed: July 2, 2010
    Date of Patent: November 12, 2013
    Assignee: Adobe Systems Incorporated
    Inventors: Dan A. Foygel, Jason M. Lemkin, Jeffrey M. Zwelling
  • Patent number: 8583935
    Abstract: Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.
    Type: Grant
    Filed: January 23, 2013
    Date of Patent: November 12, 2013
    Assignee: Lone Star WiFi LLC
    Inventor: Scott C. Harris
  • Patent number: 8583097
    Abstract: A method for joining a conference call from a communication device, the communication device having a locked state and an unlocked state. The method includes displaying an interface on the communication device while the communication device is in the locked state, the interface including an option to join a scheduled conference call, receiving an input for selection of the option while the communication device is in the locked state, unlocking the communication device to the unlocked state, and sending a communication to a second communication device for establishing a conference call session.
    Type: Grant
    Filed: March 23, 2011
    Date of Patent: November 12, 2013
    Assignee: BlackBerry Limited
    Inventor: Michael Scott Colbert
  • Patent number: 8578458
    Abstract: In at least one implementation a method includes receiving an identifier associated with a device, entering the identifier into a network controller device, inviting the device associated with the identifier to join a network, admitting the device associated with the identifier to the network, sending the device associated with the identifier a name of the network, and confirming that the device has joined the network as a device recognized by the network controller device.
    Type: Grant
    Filed: March 3, 2011
    Date of Patent: November 5, 2013
    Assignee: Lantiq Deutschland GmbH
    Inventors: Vladimir Oksman, Pramod Pandey, Joon Bae Kim
  • Patent number: 8578476
    Abstract: A system and method is provided for determining a risk associated with a login transaction. A password received during the login attempt and determination is made regarding whether the received password is derived form user information. A risk is determined based on a determination that the received password is derived from the user information.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: November 5, 2013
    Assignee: CA, Inc.
    Inventor: Venkata Babji Sama
  • Patent number: 8578473
    Abstract: A method of verifying a password and methods of encryption and decryption using a key generated from a one-time pad. In one embodiment, the method of verifying includes: (1) receiving a password attempt, (2) retrieving a pointer from memory, (3) searching a one-time pad based on the pointer to retrieve a password, (4) comparing the password attempt with the password and (5) generating a new pointer if the password attempt matches the password.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: November 5, 2013
    Assignee: LSI Corporation
    Inventor: Lloyd W. Sadler
  • Patent number: 8572391
    Abstract: A system and method may allow for flexible transaction processing based on for example the risk assessment of a transaction and/or a user or party to a transaction. Based on a risk level, for example, a level of authentication for the transaction may be set or altered.
    Type: Grant
    Filed: September 13, 2004
    Date of Patent: October 29, 2013
    Assignee: EMC Corporation
    Inventors: Lior Golan, Amir Orad, Naftali Bennett
  • Patent number: 8572393
    Abstract: A mobile communication terminal having a password notification function and a method for notifying a user of a password in the mobile communication terminal that allow the transmission of a stored password or a newly generated random password to a previously selected medium by entering a secondary password when an input password is not identical to the stored password. The method includes checking whether a password notification function is set; requesting input of a stored password, receiving an input password, and checking whether the input password is identical to the stored password. If the input password is not identical to the stored password, the method further includes requesting input of a stored secondary password, checking whether an input secondary password is identical to the stored secondary password, and sending a password if the input secondary password is identical to the stored secondary password.
    Type: Grant
    Filed: August 14, 2007
    Date of Patent: October 29, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Kyong-Su Kim
  • Patent number: 8572392
    Abstract: An input personal identification number (PIN) is encrypted, identification information to identify a computer that has generated an encrypted PIN is associated with the encrypted PIN, and the associated information is sent to a recording medium. When the recording medium is again connected to the computer, it is checked whether the identification information is present in the recording medium. If the identification information is present in the recording medium, the encrypted PIN associated with the identification information is decrypted. These processes can be performed on both computer side and recording medium side.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: October 29, 2013
    Assignee: Fujitsu Limited
    Inventor: Nobutaka Ishidera
  • Patent number: 8572754
    Abstract: Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various aspects of the subject technology. In one aspect, a system includes a proxy configured to receive, at the client, at least one string descriptor request from the server over a network, where the at least one string descriptor request is associated with switching an interface of the device from a first interface type to a second interface type. The system further includes a stub driver configured to receive the at least one string descriptor request from the proxy, and to direct the at least one string descriptor request to the device.
    Type: Grant
    Filed: February 25, 2011
    Date of Patent: October 29, 2013
    Assignee: Wyse Technology Inc.
    Inventors: SriramKumar Raju, Puneet Kaushik
  • Patent number: 8566602
    Abstract: Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.
    Type: Grant
    Filed: December 15, 2006
    Date of Patent: October 22, 2013
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Jeffrey Aaron
  • Patent number: 8566953
    Abstract: A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the file is generated by displaying published identified objects according to associated viewing rights. A viewer at a client is presented with the named object view of the report, according to the viewing rights, such that the viewer's attention is focused on the published objects.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: October 22, 2013
    Assignee: Microsoft Corporation
    Inventors: John Campbell, Boaz Chen, Daniel Battagin, Eran Megiddo, Yariv Ben-Tovim
  • Patent number: 8566945
    Abstract: A recursive web crawling and analysis tool that includes conducting an initial crawl of a target to identify testable or analyzable objects. The objects are then parsed to identify vulnerabilities, as well as additional objects that can be analyzed. An attack is then launched against the analyzable objects in an effort to break or verify the vulnerabilities. During this attack, additional analyzable objects may be discovered. If such additional objects are discovered, the web crawler is invoked on the additional objects as well, and the results of the crawl are fed back into the parser and attacker functions.
    Type: Grant
    Filed: February 11, 2005
    Date of Patent: October 22, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Caleb Sima
  • Patent number: 8566603
    Abstract: A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by the BIOS. In one implementation, a BIOS that does not support TCG security but does support ATA security can use ATA drive unlock to invoke TCG drive unlock on the storage device. Further, the storage device can be transitioned among multiple security operating modes (e.g., Undeclared, ATA security or TCG security).
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: October 22, 2013
    Assignee: Seagate Technology LLC
    Inventors: Jason R. Cox, Christopher J. Demattio, Monty A. Forehand, Michael B. Danielson, James C. Hatfield, Manuel A. Offenberg
  • Patent number: 8560698
    Abstract: A plurality of subgroups of identifiers are identified including at least a first subgroup of identifiers and a second subgroup of identifiers within an identifier range. A first set of identifiers is selected in the first subgroup. The first set of identifiers in the first subgroup is compared with a second set of identifiers in the second subgroup and a first set of common identifiers is identified using metadata of the second set of identifiers. A third set of identifiers is generated by eliminating the first set of common identifiers from the first set of identifiers. The third set of identifiers is compared with a fourth set of identifiers in a repository of stored identifiers, to identify a second set of common identifiers. A fifth set of identifiers is generated by eliminating the second set of common identifiers from the third set of identifiers.
    Type: Grant
    Filed: June 27, 2010
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Shrinivas Kulkarni, Nisanth M. Simon
  • Patent number: 8560860
    Abstract: Methods and systems are provided to assist users with the entry of strong passwords. The password may be considered strong if it satisfies one or more requirements. A set of these requirements may be selected and then presented to the user. The requirements may be randomly selected one by one or as a group. The requirements may also be presented to the user one by one in a random order or in the form of a list with a random order. As characters for the password are entered, the user may then be notified when one or more the requirements have been satisfied.
    Type: Grant
    Filed: July 1, 2005
    Date of Patent: October 15, 2013
    Assignee: Red Hat, Inc.
    Inventors: Seth Nickell, Bryan William Clark
  • Patent number: 8560859
    Abstract: A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: October 15, 2013
    Assignee: International Business Machines Corporation
    Inventors: Vincent Boucher, Sebastien Chabrolles, Benoit Granier, Arnaud Mante
  • Patent number: 8561139
    Abstract: A router based authentication system provides packet level authentication of incoming data packets and eliminates the risk of having data packets come in to the network whose source cannot be authenticated. In Router Based Authentication System (RBAS), a prior art router is adapted with an authentication function that works in conjunction with a security function in the client. Alternatively, a new router can be built that embeds an authentication function. The router based authentication function includes: (i) an ability to receive a telephone call and verify the caller by comparing with pre-stored caller id, (ii) generate a random alphanumeric code, deliver to the caller, and save in the system, (iii) reject all packets from the client that do not have a passkey embedded in the header of the packet.
    Type: Grant
    Filed: February 20, 2009
    Date of Patent: October 15, 2013
    Inventor: Tara Chand Singhal
  • Patent number: 8555373
    Abstract: A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The software security component establishes state-less data identifying each packet that requires high-speed processing and loads a data table in the hardware component. The hardware component may then allow packets matching data of the data table to bypass the software component while passing other non-matching packets to the software component for more sophisticated state analysis.
    Type: Grant
    Filed: February 14, 2008
    Date of Patent: October 8, 2013
    Assignee: Rockwell Automation Technologies, Inc.
    Inventors: Brian A. Batke, Sivaram Balasubramanian
  • Publication number: 20130262872
    Abstract: An electronic apparatus, a peripheral device, and a system for encrypting and decrypting the electronic apparatus via the peripheral device are provided. The electronic apparatus stores a password which a user sets in a ROM of the electronic apparatus and writes the password to the peripheral device. Only when the electronic apparatus is connected to the peripheral device, the electronic apparatus fetches a password from the peripheral device, and if the electronic apparatus determines that the fetches password is the same as the stored password in the electronic apparatus, the electronic apparatus performs a function of turning on or unlocking the electronic apparatus.
    Type: Application
    Filed: November 29, 2012
    Publication date: October 3, 2013
    Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.
    Inventors: ZHENG-CHAO XU, JIAN-HUNG HUNG, MIN YANG, XIN-SHU WANG
  • Patent number: 8549314
    Abstract: Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of the terminator characters are identified and used to extract the user password from the multiple characters input by the user.
    Type: Grant
    Filed: April 29, 2010
    Date of Patent: October 1, 2013
    Assignee: King Saud University
    Inventors: Hanan Ahmed Hossni Mahmoud Abd Alla, Khaled Soliman Alghathbar
  • Patent number: 8549319
    Abstract: A system and algorithms to authenticate a person where a system only has some standard personal text data about the person, and cannot have a real biometric template obtained using an enrollment procedure. The authentication allows access to restricted resources by the person. This method is especially useful when it is used as an auxiliary authentication service with other methods such as password or Callback that dramatically lower the chances for an imposter.
    Type: Grant
    Filed: January 18, 2012
    Date of Patent: October 1, 2013
    Assignee: Memphis Technologies, Inc
    Inventors: Yaron Menczel, Yair Shachar, Josef Brikman
  • Patent number: 8549598
    Abstract: A multifunction apparatus 21 of the present invention communicates with an information processing apparatus 51 via a communication network 50. The multifunction apparatus 21 includes an apparatus control section 7, a second web server section 8, and a web browser section 5 which communicates with a first web server section 53 or the second web server section 8. The apparatus control section 7 transmits login information entered by a user to an authentication server 91. The web browser section 5 (i) accepts, from the first web server section 53, control information for informing the second web server section 8 of a control instruction to obtain user related information from the authentication server 91 and (ii) carries out an informing process in which the second web server section 8 is informed of the control instruction. The apparatus control section 7 obtains the user related information from the authentication server 91 in accordance with the control instruction received by the second web server section 8.
    Type: Grant
    Filed: April 25, 2011
    Date of Patent: October 1, 2013
    Assignee: Sharp Kabushiki Kaisha
    Inventor: Kunihiko Tsujimoto
  • Patent number: 8549590
    Abstract: Certain embodiments of the invention may include systems and methods for identity authentication using an social network. According to an exemplary embodiment of the invention, a method is provided for authenticating an identity of a target person. The method can include determining, from a first system graph, connections between one or more hypothetical identities and a plurality of related entities associated with the one or more hypothetical identities; determining, from a second system graph, one or more real entities associated with the target person; identifying matches comprising common real entities associated with the target person and related entities associated with the one or more hypothetical identities based at least in part on the determined connections; and providing an indication of identity authentication of the target person based at least in part on the identified matches.
    Type: Grant
    Filed: July 3, 2012
    Date of Patent: October 1, 2013
    Assignee: LexisNexis Risk Solutions FL Inc.
    Inventors: Johannes Philippus de Villiers Prichard, Jesse C P B Shaw
  • Patent number: 8549315
    Abstract: A password management system and method for securing networked client terminals and mobile devices is provided. More specifically, the present invention provides a system and method for encrypting randomly generated administrator-level passwords and providing a means for decrypting the randomly generated passwords for single-use unrestricted access to a designated terminal or mobile device. When unrestricted access to the terminal or mobile device is required, the encrypted administrator-level password is decrypted using a shared symmetric key, which is generated during encryption of the administrator password, to reveal the administrator-level password for the terminal or mobile device. The administrator-level password is a single-use password, wherein upon use of the administrator-level password a new administrator-level password may be automatically generated for the corresponding terminal or mobile device.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: October 1, 2013
    Assignee: JPMorgan Chase Bank, N.A.
    Inventors: Matthew J. Read, Craig S. Ames, Vinit Nangia, Pavel Lobashov, Josiah Lam
  • Patent number: 8548926
    Abstract: A prompt-response card issuing system providing temporary financial transaction cards includes a communications module, a personal account number (PAN) mapping module, and a security measure determination module. The communications module communicates with a plurality of financial card issuers, each having different profile standards for generating security measures, and also receives, from an issuer, an authorization for a new PAN associated with a financial account of a cardholder. The PAN module maps the new PAN to a temporary personal account number (TPAN) for the cardholder. The security measure determination module determines at least one security measure requirement according to a system profile standard of said prompt-response card issuing system rather than the system profile standard of the authorizing issuer.
    Type: Grant
    Filed: April 13, 2011
    Date of Patent: October 1, 2013
    Assignee: Mastercard International Incorporated
    Inventors: Daniel F. Balistierri, Patricia Bateson, Alex Cunescu, Chris Lomax, Jan Lundequist, Dawn Pendel
  • Patent number: 8549606
    Abstract: There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and an encrypting section that encrypts the security information, using a key acquired from a Digital Right Management system of an electronic ticket system.
    Type: Grant
    Filed: October 26, 2005
    Date of Patent: October 1, 2013
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Kazuo Saito
  • Patent number: 8543834
    Abstract: Methods, systems, and apparatus for voice authentication and command. In an aspect, a method comprises: receiving, by a data processing apparatus that is operating in a locked mode, audio data that encodes an utterance of a user, wherein the locked mode prevents the data processing apparatus from performing at least one action; providing, while the data processing apparatus is operating in the locked mode, the audio data to a voice biometric engine and a voice action engine; receiving, while the data processing apparatus is operating in the locked mode, an indication from the voice biometric engine that the user has been biometrically authenticated; and in response to receiving the indication, triggering the voice action engine to process a voice action that is associated with the utterance.
    Type: Grant
    Filed: September 19, 2012
    Date of Patent: September 24, 2013
    Assignee: Google Inc.
    Inventor: Hugo B. Barra
  • Patent number: 8539247
    Abstract: A method is disclosed for password checking. After input is received, a proposed password included in the input is parsed into symbols. At least one of the symbols includes two or more characters. A probably metric is determined based on a sequence of symbols. The probability metric is used to determine whether or not the password is secure.
    Type: Grant
    Filed: June 22, 2010
    Date of Patent: September 17, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: David A. McGrew, Andrew D. Persaud
  • Patent number: 8539599
    Abstract: Provided personal information from a user may be determined, the provided personal information being associated with network publication thereof. A comparison of the provided personal information with password-related information may be performed. Based on the comparison, it may be determined that a risk level associated with the network publication relative to password security of at least one password associated with the password-related information exceeds a predetermined risk level. The user may be notified that the network publication of the provided personal information is associated with potential compromise of the password security of the at least one password.
    Type: Grant
    Filed: December 28, 2010
    Date of Patent: September 17, 2013
    Assignee: SAP AG
    Inventors: Laurent Gomez, Slim Trabelsi, Aymen Mouelhi
  • Patent number: 8539574
    Abstract: A system and method for permitting user access to a computer controlled device. A display device displays a group of items to the user. Some of the items are known to the user and some are unknown to the user. An input device receives user input from the user. The user input indicates the presence or absence of the known items within the group of items without specifically identifying which items are known and which items are unknown. A computer is programmed to automatically compare the user input to a predetermined answer. If the user input is correct an access device allows access. In one preferred embodiment the user input includes a count of the number of known items within the group of items. In another preferred embodiment the group of items includes subgroups. The user input includes an identification of which subgroup has the largest number of known items. In another preferred embodiment the group of items is displayed in a grid. The known items are displayed in a pattern within the grid.
    Type: Grant
    Filed: September 9, 2010
    Date of Patent: September 17, 2013
    Inventor: Christopher Michael Knox
  • Patent number: 8533783
    Abstract: Some embodiments provide a system that enables access to an online account. During operation, the system receives a login attempt containing a login for the online account through a login interface associated with the online account. Next, the system receives, from the user, user-initiated communications outside of the login interface requesting automatic access to the online account. The system then identifies the online account using the user-initiated communications. Finally, the system temporarily enables the automatic access to the online account using the login from the login attempt without requiring additional authentication information from the login attempt.
    Type: Grant
    Filed: February 12, 2009
    Date of Patent: September 10, 2013
    Assignee: Intuit Inc.
    Inventor: Girish Mallenahally Channakeshava
  • Patent number: 8533484
    Abstract: A method for password-protected physical transfer of password-protected devices including at a receiving location, generating at least one security file including an encrypted element generated using a one-way encryption function utilizing at least one secure code, transmitting the at least one security file to a shipping location at which the password-protected devices are located, at the shipping location, using at least one shipping location password, loading the at least one security file into at least one password-protected device, shipping the at least one password-protected device to the receiving location and at the receiving location, employing the at least one secure code to supply an input to the at least one password-protected device and employing the at least one security file to enable establishment of at least one receiving location password for the at least one password-protected device which replaces the at least one shipping location password.
    Type: Grant
    Filed: March 29, 2010
    Date of Patent: September 10, 2013
    Assignee: Verifone, Inc.
    Inventors: Paul Andrew Serotta, Jeffery Allen Reich, Chris Anthony Madden
  • Patent number: 8528105
    Abstract: A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device. Each of the electronic computing devices is adapted for selective electronic communication with the other. The system and method comprises a first software program for the remote device, the first software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger. The system and method further comprises a second software program for the host device, where the second software program includes means for identifying the remote device, means for accessing an expiration time reset schedule, and means for resetting the current expiration time value.
    Type: Grant
    Filed: March 9, 2012
    Date of Patent: September 3, 2013
    Inventor: Timothy T. Miller
  • Patent number: 8528060
    Abstract: Efficient secure password protocols are constructed that remain secure against offline dictionary attacks even when a large, but bounded, part of the storage of a server responsible for password verification is retrieved by an adversary through a remote or local connection. A registration algorithm and a verification algorithm accomplish the goal of defeating a dictionary attack. A password protocol where a server, on input of a login and a password, carefully selects several locations from the password files, properly combines their content according to some special function, and stores the result of this function as a tag that can be associated with this password and used in a verification phase to verify access by users.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: September 3, 2013
    Assignee: Telcordia Technologies, Inc.
    Inventors: Giovanni Di Crescenzo, Richard J. Lipton, Sheldon Walfish
  • Patent number: 8527887
    Abstract: A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices and computer readable medium for implementing the method are also provided.
    Type: Grant
    Filed: July 19, 2006
    Date of Patent: September 3, 2013
    Assignee: Research In Motion Limited
    Inventors: Michael K. Brown, Neil Adams, George Babu, Herbert Little, Michael S. Brown
  • Patent number: 8526608
    Abstract: A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic signature stored in a portable memory, the printing system of the invention includes a portable memory for storing an electronic signature. A memory interface connects detachably to the portable memory. A printer receives the electronic signature from the memory interface, composes the received electronic signature with print data, and executes a print operation. Accordingly, a stamping or signature process on numerous documents can be facilitated, and excessive stamping or signature execution can be prevented. Moreover, the electronic signature of the invention can be executed on various types of forms or documents.
    Type: Grant
    Filed: March 9, 2011
    Date of Patent: September 3, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Eun-ah Song, Hyun-sun Jung, Yong-geun Kim
  • Patent number: 8522324
    Abstract: A method and system for controlling access of a user to a secondary system. A primary system sends a random string to a user system that is connected to the secondary system. The user is logged on the user system. The primary system receives from the user system first authentication information including an encryption of the random string by a private key of the user. The primary system generates a user-specific key consisting of the encryption of the random string. The primary system generates second authentication information from protected secondary authentication data stored in the primary system via application of the user-specific key to the protected secondary authentication data. The primary system provides the second authentication information to the secondary system to enable access of the user to the secondary system.
    Type: Grant
    Filed: May 16, 2012
    Date of Patent: August 27, 2013
    Assignee: International Business Machines Corporation
    Inventor: Stephan Feil
  • Patent number: 8522328
    Abstract: In a method for managing use information of a measurement device, an operating interface of the device is locked before the device is operated. When a user starts to use the device, the method provides a login interface to verify whether the user is authorized to login the operating interface. If the user is authorized to login the operating interface, the operating interface is unlocked and the method records first information of starting to operate the device. After finishing the operation or when an elapsed time of the device not in use is greater than a predetermined time, the method controls the user to log out the operating interface, records second information of finishing the operation, and the operating interface is locked. The first information and the second information are saved in a text file.
    Type: Grant
    Filed: August 31, 2011
    Date of Patent: August 27, 2013
    Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.
    Inventors: Jun-Yang Feng, Fa-Sheng Huang