Solely Password Entry (no Record Or Token) Patents (Class 713/183)
-
Patent number: 8595507Abstract: Apparatus, systems, and methods may operate to invoke multiple authentication mechanisms, by a client node, to encrypt N split-keys using credentials associated with corresponding ones of the authentication mechanisms. Further activity may include transforming the split-keys to provide N encrypted split-keys, and storing each of the encrypted split-keys with an associated local user identity and an identity of corresponding ones of the authentication mechanisms. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: February 16, 2011Date of Patent: November 26, 2013Assignee: Novell, Inc.Inventors: Santosh Kumar Panchapakesan, Vinayak Hegde
-
Patent number: 8594333Abstract: A device includes a key store memory that stores one or more cryptographic keys. A rule set memory stores a set of rules for accessing the cryptographic keys. A key store arbitration module grants access to the cryptographic keys in accordance with the set of rules. The device can be used in conjunction with a key ladder. The device can include a one-time programmable memory and a load module that transfers the cryptographic keys from the one one-time programmable memory to the key store memory and the set of rules to the rule set memory. A validation module can validate the cryptographic keys and the set of rules stored in the key store and rule set memories, based on a signature defined by a signature rule.Type: GrantFiled: January 4, 2010Date of Patent: November 26, 2013Assignee: VIXS Systems, IncInventors: Paul D. Ducharme, Wendy Wai Yin Cheung, Albert Yunsang Wong, Shijun Huang, Norman V. D. Stewart
-
Patent number: 8595807Abstract: A method, a system, and a device for implementing device addition in a Wireless Fidelity (Wi-Fi) Device to Device (D2D) network are provided, which belong to the field of communication. The method includes: receiving, by a first D2D client device, a first add request message forwarded by a D2D master device, in which the first add request message carries an identifier of a new device to be added to the D2D network; receiving a first Personal Identification Number (PIN) code of the new device; and forwarding the received first PIN code to the D2D master device, in which the first PIN code of the new device is used for implementing that the D2D master device performs Wi-Fi Protected Setup (WPS) security configuration of the new device according to the first PIN code.Type: GrantFiled: May 16, 2011Date of Patent: November 26, 2013Assignee: Huawei Device Co., Ltd.Inventors: Yongli Yang, Zhiming Ding, Guiming Shu, Xilei Liu
-
Patent number: 8595794Abstract: Auditing a communication is disclosed. Credentials are received from a client. It is determined whether the client is authorized to communicate with a remote resource. If it is determined that the communication with the remote resource is allowed, a communication is forwarded from the local resource to the remote resource.Type: GrantFiled: April 13, 2007Date of Patent: November 26, 2013Assignee: Xceedium, Inc.Inventor: David Van
-
Patent number: 8595850Abstract: A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information may include sensitive numbers such as social security numbers, credit card numbers or other private numbers. A tokenization system may include multiple physically distinct hardware platforms each having a tokenization server and a database. A tokenization server may run portions of a sensitive number through a predetermined number of rounds of a Feistel network. Each round of the Feistel network may include tokenizing portions of the sensitive number using a fractional token table stored an associated database and modifying the tokenized portions by reversibly adding portions of the sensitive number to the tokenized portions. The fractional token table may include partial sensitive numbers and corresponding partial tokens.Type: GrantFiled: February 1, 2012Date of Patent: November 26, 2013Assignee: Voltage Security, Inc.Inventors: Terence Spies, Richard T. Minner
-
Patent number: 8595809Abstract: A reusable authentication component may be integrated into a web page to communicate with an authentication server and authenticate a user to the web page. The reusable authentication component may implement a complex authentication process, including multiple user interfaces to receive multiple assurances of user identity and user confirmation of previously stored mutual authentication data. The authentication process may be performed by the authentication component without refreshing or redirecting the parent web page until completion of a successful user authentication, after which the parent web page may receive authentication data and refresh to provide user specific and/or secure user data on the web page.Type: GrantFiled: February 21, 2012Date of Patent: November 26, 2013Assignee: Bank of America CorporationInventors: Pavan Chayanam, Todd Inskeep, Eric William Miller, Clay Newton, David Charles Shroyer
-
Patent number: 8595509Abstract: A system controlling online access to a study course verifies the identity of an individual taking a study course over a global computer network from a first computer at a node of the network. The first computer has a biometric identification program and communicates over the network with a second computer that is at a network node other than a node of the first computer. The second computer includes study program material. The first computer operates a biometric reader, which obtains a first set of biometric data from the individual and a second set of biometric data from the individual while access is granted to course material. The biometric identification program compares the first set of data with the second set of data to make a verification of the identity of the individual and communicates the verification to the second computer.Type: GrantFiled: September 16, 2011Date of Patent: November 26, 2013Inventor: Armen Geosimonian
-
Patent number: 8590020Abstract: A system and method is presented for authentication, so as to control access to a resource. A set of objects (for example, a set of images) is established in advance between the user and the service for which the user is to be authenticated. During the authentication, the user, instead of inputting an alpha-numeric password, will be sent several sets (e.g., tables) containing the previously specified objects (e.g., images) in some arrangement (e.g., spatial pattern) among other objects (images). In order to authenticate, the user is shown additional tables, and must determine, as to each, whether it contains the same set of specified objects in the same spatial relationship as in the first table shown. After the user has correctly identified which tables reflect the specified objects in the requisite pattern, the user will be considered authenticated, and will then be granted access to the requested resource (for example, a bank account).Type: GrantFiled: January 22, 2008Date of Patent: November 19, 2013Inventor: Veronika Orlovskaya
-
Patent number: 8590017Abstract: Embodiments of the invention relate to partial authentication to access incremental information. An aspect of the invention concerns a method of authorizing access to information that comprises providing an initial segment of a password wherein the password includes password segments each associated with an incremental portion of the information. In response to the initial password segment satisfying an expected value, the method may authorize access to the information portion associated with the initial password segment. The method may authorize access to other information portions associated with subsequent segments of the password in response to the subsequent password segments satisfying respectively expected values.Type: GrantFiled: February 28, 2011Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Hernan Badenes, Mateo Nicolas Bengualid, Julian Ariel Cerruti, Hongxia Jin, Jeffrey Scott Pierce
-
Patent number: 8589669Abstract: A data protecting method for a rewritable non-volatile memory module having a first storage area and a second storage area and a memory controller and a memory storage device using the same are provided. The method includes providing default configuration information in response to a boot command from a host system, wherein the host system cannot recognize the second storage area according to the default configuration information. The method also includes requesting the host system to re-boot when a user identification code and a user password receiving from the host system pass an authentication procedure, and providing first configuration information to the host system after re-booting the host system. The host system can recognize the second storage area according to the first configuration information. Accordingly, the method can effectively protect data stored in the rewritable non-volatile memory module.Type: GrantFiled: April 17, 2012Date of Patent: November 19, 2013Assignee: Phison Electronics Corp.Inventors: Yi-Hung Peng, Ching-Hsien Wang, Chia-Jung Hsu
-
Patent number: 8588418Abstract: A communication session is established, via a wireless communication link, with a mobile communication device that is connected to a computer system. The mobile communication device is enumerated by the computer system as a locally attached mass storage device. An authentication executable file is sent to the mobile communication device. A response generated by the computer system executing the authentication executable file is received from the mobile communication device. Based on the response generated by the computer system executing the authentication executable file, access to a data file that is stored by a mass storage system via a network is granted.Type: GrantFiled: September 22, 2008Date of Patent: November 19, 2013Assignee: Sprint Communications Company L.P.Inventors: Jeffrey R. Contino, Warren B. Cope, Douglas Alan Olding
-
Patent number: 8583705Abstract: The exchange of documents for signature can be performed efficiently using an automatic routing system that associates a document with appropriate identifying metadata. The routing can be facilitated through facsimile in which the metadata is encoded on a return facsimile cover sheet that is routed with the document. Appropriate central exchange servers have appropriate input and out subsystems to perform the document routing. The executed documents can be conveniently archived for efficient document storage and access, such as network access to one or more of the parties.Type: GrantFiled: July 2, 2010Date of Patent: November 12, 2013Assignee: Adobe Systems IncorporatedInventors: Dan A. Foygel, Jason M. Lemkin, Jeffrey M. Zwelling
-
Patent number: 8583935Abstract: Multiple levels of wireless network resource granting. A user who has an authorized key, e.g., an encryption key or a key indicating that they have paid for service, gets a first, better level of access to the network resources. One without the key is granted lesser access, e.g., less total bandwidth, less bandwidth speed, no access to files or the like.Type: GrantFiled: January 23, 2013Date of Patent: November 12, 2013Assignee: Lone Star WiFi LLCInventor: Scott C. Harris
-
Patent number: 8583097Abstract: A method for joining a conference call from a communication device, the communication device having a locked state and an unlocked state. The method includes displaying an interface on the communication device while the communication device is in the locked state, the interface including an option to join a scheduled conference call, receiving an input for selection of the option while the communication device is in the locked state, unlocking the communication device to the unlocked state, and sending a communication to a second communication device for establishing a conference call session.Type: GrantFiled: March 23, 2011Date of Patent: November 12, 2013Assignee: BlackBerry LimitedInventor: Michael Scott Colbert
-
Patent number: 8578458Abstract: In at least one implementation a method includes receiving an identifier associated with a device, entering the identifier into a network controller device, inviting the device associated with the identifier to join a network, admitting the device associated with the identifier to the network, sending the device associated with the identifier a name of the network, and confirming that the device has joined the network as a device recognized by the network controller device.Type: GrantFiled: March 3, 2011Date of Patent: November 5, 2013Assignee: Lantiq Deutschland GmbHInventors: Vladimir Oksman, Pramod Pandey, Joon Bae Kim
-
Patent number: 8578476Abstract: A system and method is provided for determining a risk associated with a login transaction. A password received during the login attempt and determination is made regarding whether the received password is derived form user information. A risk is determined based on a determination that the received password is derived from the user information.Type: GrantFiled: March 23, 2012Date of Patent: November 5, 2013Assignee: CA, Inc.Inventor: Venkata Babji Sama
-
Patent number: 8578473Abstract: A method of verifying a password and methods of encryption and decryption using a key generated from a one-time pad. In one embodiment, the method of verifying includes: (1) receiving a password attempt, (2) retrieving a pointer from memory, (3) searching a one-time pad based on the pointer to retrieve a password, (4) comparing the password attempt with the password and (5) generating a new pointer if the password attempt matches the password.Type: GrantFiled: March 25, 2009Date of Patent: November 5, 2013Assignee: LSI CorporationInventor: Lloyd W. Sadler
-
Patent number: 8572391Abstract: A system and method may allow for flexible transaction processing based on for example the risk assessment of a transaction and/or a user or party to a transaction. Based on a risk level, for example, a level of authentication for the transaction may be set or altered.Type: GrantFiled: September 13, 2004Date of Patent: October 29, 2013Assignee: EMC CorporationInventors: Lior Golan, Amir Orad, Naftali Bennett
-
Patent number: 8572393Abstract: A mobile communication terminal having a password notification function and a method for notifying a user of a password in the mobile communication terminal that allow the transmission of a stored password or a newly generated random password to a previously selected medium by entering a secondary password when an input password is not identical to the stored password. The method includes checking whether a password notification function is set; requesting input of a stored password, receiving an input password, and checking whether the input password is identical to the stored password. If the input password is not identical to the stored password, the method further includes requesting input of a stored secondary password, checking whether an input secondary password is identical to the stored secondary password, and sending a password if the input secondary password is identical to the stored secondary password.Type: GrantFiled: August 14, 2007Date of Patent: October 29, 2013Assignee: Samsung Electronics Co., Ltd.Inventor: Kyong-Su Kim
-
Patent number: 8572392Abstract: An input personal identification number (PIN) is encrypted, identification information to identify a computer that has generated an encrypted PIN is associated with the encrypted PIN, and the associated information is sent to a recording medium. When the recording medium is again connected to the computer, it is checked whether the identification information is present in the recording medium. If the identification information is present in the recording medium, the encrypted PIN associated with the identification information is decrypted. These processes can be performed on both computer side and recording medium side.Type: GrantFiled: June 27, 2006Date of Patent: October 29, 2013Assignee: Fujitsu LimitedInventor: Nobutaka Ishidera
-
Patent number: 8572754Abstract: Systems and methods for facilitating unlocking a device connected locally to a client, utilizing a server located remotely from the client and the device, are provided in accordance with various aspects of the subject technology. In one aspect, a system includes a proxy configured to receive, at the client, at least one string descriptor request from the server over a network, where the at least one string descriptor request is associated with switching an interface of the device from a first interface type to a second interface type. The system further includes a stub driver configured to receive the at least one string descriptor request from the proxy, and to direct the at least one string descriptor request to the device.Type: GrantFiled: February 25, 2011Date of Patent: October 29, 2013Assignee: Wyse Technology Inc.Inventors: SriramKumar Raju, Puneet Kaushik
-
Patent number: 8566602Abstract: Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.Type: GrantFiled: December 15, 2006Date of Patent: October 22, 2013Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey Aaron
-
Patent number: 8566953Abstract: A named object view of a report is generated from an electronic data file. Objects in the file to be published are identified in the file. A named object view of the report associated with the file is generated by displaying published identified objects according to associated viewing rights. A viewer at a client is presented with the named object view of the report, according to the viewing rights, such that the viewer's attention is focused on the published objects.Type: GrantFiled: September 24, 2007Date of Patent: October 22, 2013Assignee: Microsoft CorporationInventors: John Campbell, Boaz Chen, Daniel Battagin, Eran Megiddo, Yariv Ben-Tovim
-
Patent number: 8566945Abstract: A recursive web crawling and analysis tool that includes conducting an initial crawl of a target to identify testable or analyzable objects. The objects are then parsed to identify vulnerabilities, as well as additional objects that can be analyzed. An attack is then launched against the analyzable objects in an effort to break or verify the vulnerabilities. During this attack, additional analyzable objects may be discovered. If such additional objects are discovered, the web crawler is invoked on the additional objects as well, and the results of the crawl are fed back into the parser and attacker functions.Type: GrantFiled: February 11, 2005Date of Patent: October 22, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventor: Caleb Sima
-
Patent number: 8566603Abstract: A storage device that supports Trusted Computer Group (TCG) security allows management of TCG security features by a Basic Input/Output System (BIOS) using non-TCG security commands supported by the BIOS. In one implementation, a BIOS that does not support TCG security but does support ATA security can use ATA drive unlock to invoke TCG drive unlock on the storage device. Further, the storage device can be transitioned among multiple security operating modes (e.g., Undeclared, ATA security or TCG security).Type: GrantFiled: June 14, 2010Date of Patent: October 22, 2013Assignee: Seagate Technology LLCInventors: Jason R. Cox, Christopher J. Demattio, Monty A. Forehand, Michael B. Danielson, James C. Hatfield, Manuel A. Offenberg
-
Patent number: 8560698Abstract: A plurality of subgroups of identifiers are identified including at least a first subgroup of identifiers and a second subgroup of identifiers within an identifier range. A first set of identifiers is selected in the first subgroup. The first set of identifiers in the first subgroup is compared with a second set of identifiers in the second subgroup and a first set of common identifiers is identified using metadata of the second set of identifiers. A third set of identifiers is generated by eliminating the first set of common identifiers from the first set of identifiers. The third set of identifiers is compared with a fourth set of identifiers in a repository of stored identifiers, to identify a second set of common identifiers. A fifth set of identifiers is generated by eliminating the second set of common identifiers from the third set of identifiers.Type: GrantFiled: June 27, 2010Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Shrinivas Kulkarni, Nisanth M. Simon
-
Patent number: 8560860Abstract: Methods and systems are provided to assist users with the entry of strong passwords. The password may be considered strong if it satisfies one or more requirements. A set of these requirements may be selected and then presented to the user. The requirements may be randomly selected one by one or as a group. The requirements may also be presented to the user one by one in a random order or in the form of a list with a random order. As characters for the password are entered, the user may then be notified when one or more the requirements have been satisfied.Type: GrantFiled: July 1, 2005Date of Patent: October 15, 2013Assignee: Red Hat, Inc.Inventors: Seth Nickell, Bryan William Clark
-
Patent number: 8560859Abstract: A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.Type: GrantFiled: March 15, 2013Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Vincent Boucher, Sebastien Chabrolles, Benoit Granier, Arnaud Mante
-
Patent number: 8561139Abstract: A router based authentication system provides packet level authentication of incoming data packets and eliminates the risk of having data packets come in to the network whose source cannot be authenticated. In Router Based Authentication System (RBAS), a prior art router is adapted with an authentication function that works in conjunction with a security function in the client. Alternatively, a new router can be built that embeds an authentication function. The router based authentication function includes: (i) an ability to receive a telephone call and verify the caller by comparing with pre-stored caller id, (ii) generate a random alphanumeric code, deliver to the caller, and save in the system, (iii) reject all packets from the client that do not have a passkey embedded in the header of the packet.Type: GrantFiled: February 20, 2009Date of Patent: October 15, 2013Inventor: Tara Chand Singhal
-
Patent number: 8555373Abstract: A high-speed security device for network connected industrial controls provides hybrid processing in tandem hardware and software security components. The software security component establishes state-less data identifying each packet that requires high-speed processing and loads a data table in the hardware component. The hardware component may then allow packets matching data of the data table to bypass the software component while passing other non-matching packets to the software component for more sophisticated state analysis.Type: GrantFiled: February 14, 2008Date of Patent: October 8, 2013Assignee: Rockwell Automation Technologies, Inc.Inventors: Brian A. Batke, Sivaram Balasubramanian
-
Publication number: 20130262872Abstract: An electronic apparatus, a peripheral device, and a system for encrypting and decrypting the electronic apparatus via the peripheral device are provided. The electronic apparatus stores a password which a user sets in a ROM of the electronic apparatus and writes the password to the peripheral device. Only when the electronic apparatus is connected to the peripheral device, the electronic apparatus fetches a password from the peripheral device, and if the electronic apparatus determines that the fetches password is the same as the stored password in the electronic apparatus, the electronic apparatus performs a function of turning on or unlocking the electronic apparatus.Type: ApplicationFiled: November 29, 2012Publication date: October 3, 2013Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.Inventors: ZHENG-CHAO XU, JIAN-HUNG HUNG, MIN YANG, XIN-SHU WANG
-
Patent number: 8549314Abstract: Password generation and extraction is described. In one aspect, a user inputs multiple characters, including a user password, variable characters, and multiple terminator characters. Locations of the terminator characters are identified and used to extract the user password from the multiple characters input by the user.Type: GrantFiled: April 29, 2010Date of Patent: October 1, 2013Assignee: King Saud UniversityInventors: Hanan Ahmed Hossni Mahmoud Abd Alla, Khaled Soliman Alghathbar
-
Patent number: 8549319Abstract: A system and algorithms to authenticate a person where a system only has some standard personal text data about the person, and cannot have a real biometric template obtained using an enrollment procedure. The authentication allows access to restricted resources by the person. This method is especially useful when it is used as an auxiliary authentication service with other methods such as password or Callback that dramatically lower the chances for an imposter.Type: GrantFiled: January 18, 2012Date of Patent: October 1, 2013Assignee: Memphis Technologies, IncInventors: Yaron Menczel, Yair Shachar, Josef Brikman
-
Patent number: 8549598Abstract: A multifunction apparatus 21 of the present invention communicates with an information processing apparatus 51 via a communication network 50. The multifunction apparatus 21 includes an apparatus control section 7, a second web server section 8, and a web browser section 5 which communicates with a first web server section 53 or the second web server section 8. The apparatus control section 7 transmits login information entered by a user to an authentication server 91. The web browser section 5 (i) accepts, from the first web server section 53, control information for informing the second web server section 8 of a control instruction to obtain user related information from the authentication server 91 and (ii) carries out an informing process in which the second web server section 8 is informed of the control instruction. The apparatus control section 7 obtains the user related information from the authentication server 91 in accordance with the control instruction received by the second web server section 8.Type: GrantFiled: April 25, 2011Date of Patent: October 1, 2013Assignee: Sharp Kabushiki KaishaInventor: Kunihiko Tsujimoto
-
Patent number: 8549590Abstract: Certain embodiments of the invention may include systems and methods for identity authentication using an social network. According to an exemplary embodiment of the invention, a method is provided for authenticating an identity of a target person. The method can include determining, from a first system graph, connections between one or more hypothetical identities and a plurality of related entities associated with the one or more hypothetical identities; determining, from a second system graph, one or more real entities associated with the target person; identifying matches comprising common real entities associated with the target person and related entities associated with the one or more hypothetical identities based at least in part on the determined connections; and providing an indication of identity authentication of the target person based at least in part on the identified matches.Type: GrantFiled: July 3, 2012Date of Patent: October 1, 2013Assignee: LexisNexis Risk Solutions FL Inc.Inventors: Johannes Philippus de Villiers Prichard, Jesse C P B Shaw
-
Patent number: 8549315Abstract: A password management system and method for securing networked client terminals and mobile devices is provided. More specifically, the present invention provides a system and method for encrypting randomly generated administrator-level passwords and providing a means for decrypting the randomly generated passwords for single-use unrestricted access to a designated terminal or mobile device. When unrestricted access to the terminal or mobile device is required, the encrypted administrator-level password is decrypted using a shared symmetric key, which is generated during encryption of the administrator password, to reveal the administrator-level password for the terminal or mobile device. The administrator-level password is a single-use password, wherein upon use of the administrator-level password a new administrator-level password may be automatically generated for the corresponding terminal or mobile device.Type: GrantFiled: September 14, 2012Date of Patent: October 1, 2013Assignee: JPMorgan Chase Bank, N.A.Inventors: Matthew J. Read, Craig S. Ames, Vinit Nangia, Pavel Lobashov, Josiah Lam
-
Patent number: 8548926Abstract: A prompt-response card issuing system providing temporary financial transaction cards includes a communications module, a personal account number (PAN) mapping module, and a security measure determination module. The communications module communicates with a plurality of financial card issuers, each having different profile standards for generating security measures, and also receives, from an issuer, an authorization for a new PAN associated with a financial account of a cardholder. The PAN module maps the new PAN to a temporary personal account number (TPAN) for the cardholder. The security measure determination module determines at least one security measure requirement according to a system profile standard of said prompt-response card issuing system rather than the system profile standard of the authorizing issuer.Type: GrantFiled: April 13, 2011Date of Patent: October 1, 2013Assignee: Mastercard International IncorporatedInventors: Daniel F. Balistierri, Patricia Bateson, Alex Cunescu, Chris Lomax, Jan Lundequist, Dawn Pendel
-
Patent number: 8549606Abstract: There is provided a device for protecting a digital content. The device includes a digital content processing section that causes a digital content to be protected using security information; and an encrypting section that encrypts the security information, using a key acquired from a Digital Right Management system of an electronic ticket system.Type: GrantFiled: October 26, 2005Date of Patent: October 1, 2013Assignee: Fuji Xerox Co., Ltd.Inventor: Kazuo Saito
-
Patent number: 8543834Abstract: Methods, systems, and apparatus for voice authentication and command. In an aspect, a method comprises: receiving, by a data processing apparatus that is operating in a locked mode, audio data that encodes an utterance of a user, wherein the locked mode prevents the data processing apparatus from performing at least one action; providing, while the data processing apparatus is operating in the locked mode, the audio data to a voice biometric engine and a voice action engine; receiving, while the data processing apparatus is operating in the locked mode, an indication from the voice biometric engine that the user has been biometrically authenticated; and in response to receiving the indication, triggering the voice action engine to process a voice action that is associated with the utterance.Type: GrantFiled: September 19, 2012Date of Patent: September 24, 2013Assignee: Google Inc.Inventor: Hugo B. Barra
-
Patent number: 8539247Abstract: A method is disclosed for password checking. After input is received, a proposed password included in the input is parsed into symbols. At least one of the symbols includes two or more characters. A probably metric is determined based on a sequence of symbols. The probability metric is used to determine whether or not the password is secure.Type: GrantFiled: June 22, 2010Date of Patent: September 17, 2013Assignee: Cisco Technology, Inc.Inventors: David A. McGrew, Andrew D. Persaud
-
Patent number: 8539599Abstract: Provided personal information from a user may be determined, the provided personal information being associated with network publication thereof. A comparison of the provided personal information with password-related information may be performed. Based on the comparison, it may be determined that a risk level associated with the network publication relative to password security of at least one password associated with the password-related information exceeds a predetermined risk level. The user may be notified that the network publication of the provided personal information is associated with potential compromise of the password security of the at least one password.Type: GrantFiled: December 28, 2010Date of Patent: September 17, 2013Assignee: SAP AGInventors: Laurent Gomez, Slim Trabelsi, Aymen Mouelhi
-
Patent number: 8539574Abstract: A system and method for permitting user access to a computer controlled device. A display device displays a group of items to the user. Some of the items are known to the user and some are unknown to the user. An input device receives user input from the user. The user input indicates the presence or absence of the known items within the group of items without specifically identifying which items are known and which items are unknown. A computer is programmed to automatically compare the user input to a predetermined answer. If the user input is correct an access device allows access. In one preferred embodiment the user input includes a count of the number of known items within the group of items. In another preferred embodiment the group of items includes subgroups. The user input includes an identification of which subgroup has the largest number of known items. In another preferred embodiment the group of items is displayed in a grid. The known items are displayed in a pattern within the grid.Type: GrantFiled: September 9, 2010Date of Patent: September 17, 2013Inventor: Christopher Michael Knox
-
Patent number: 8533783Abstract: Some embodiments provide a system that enables access to an online account. During operation, the system receives a login attempt containing a login for the online account through a login interface associated with the online account. Next, the system receives, from the user, user-initiated communications outside of the login interface requesting automatic access to the online account. The system then identifies the online account using the user-initiated communications. Finally, the system temporarily enables the automatic access to the online account using the login from the login attempt without requiring additional authentication information from the login attempt.Type: GrantFiled: February 12, 2009Date of Patent: September 10, 2013Assignee: Intuit Inc.Inventor: Girish Mallenahally Channakeshava
-
Patent number: 8533484Abstract: A method for password-protected physical transfer of password-protected devices including at a receiving location, generating at least one security file including an encrypted element generated using a one-way encryption function utilizing at least one secure code, transmitting the at least one security file to a shipping location at which the password-protected devices are located, at the shipping location, using at least one shipping location password, loading the at least one security file into at least one password-protected device, shipping the at least one password-protected device to the receiving location and at the receiving location, employing the at least one secure code to supply an input to the at least one password-protected device and employing the at least one security file to enable establishment of at least one receiving location password for the at least one password-protected device which replaces the at least one shipping location password.Type: GrantFiled: March 29, 2010Date of Patent: September 10, 2013Assignee: Verifone, Inc.Inventors: Paul Andrew Serotta, Jeffery Allen Reich, Chris Anthony Madden
-
Patent number: 8528105Abstract: A system and method for using a host electronic computing device to prevent access to data in a preselected memory portion of an electronic computing device remote from the host electronic computing device. Each of the electronic computing devices is adapted for selective electronic communication with the other. The system and method comprises a first software program for the remote device, the first software program comprising a unique identifier, a current expiration time value, a comparator for comparing the current expiration time value against a time-based parameter of the remote device, and a security trigger. The system and method further comprises a second software program for the host device, where the second software program includes means for identifying the remote device, means for accessing an expiration time reset schedule, and means for resetting the current expiration time value.Type: GrantFiled: March 9, 2012Date of Patent: September 3, 2013Inventor: Timothy T. Miller
-
Patent number: 8528060Abstract: Efficient secure password protocols are constructed that remain secure against offline dictionary attacks even when a large, but bounded, part of the storage of a server responsible for password verification is retrieved by an adversary through a remote or local connection. A registration algorithm and a verification algorithm accomplish the goal of defeating a dictionary attack. A password protocol where a server, on input of a login and a password, carefully selects several locations from the password files, properly combines their content according to some special function, and stores the result of this function as a tag that can be associated with this password and used in a verification phase to verify access by users.Type: GrantFiled: December 22, 2006Date of Patent: September 3, 2013Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Richard J. Lipton, Sheldon Walfish
-
Patent number: 8527887Abstract: A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices and computer readable medium for implementing the method are also provided.Type: GrantFiled: July 19, 2006Date of Patent: September 3, 2013Assignee: Research In Motion LimitedInventors: Michael K. Brown, Neil Adams, George Babu, Herbert Little, Michael S. Brown
-
Patent number: 8526608Abstract: A printing system and printer with an electronic signature capability, and a method thereof are provided. To print security documents using an electronic signature stored in a portable memory, the printing system of the invention includes a portable memory for storing an electronic signature. A memory interface connects detachably to the portable memory. A printer receives the electronic signature from the memory interface, composes the received electronic signature with print data, and executes a print operation. Accordingly, a stamping or signature process on numerous documents can be facilitated, and excessive stamping or signature execution can be prevented. Moreover, the electronic signature of the invention can be executed on various types of forms or documents.Type: GrantFiled: March 9, 2011Date of Patent: September 3, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Eun-ah Song, Hyun-sun Jung, Yong-geun Kim
-
Patent number: 8522324Abstract: A method and system for controlling access of a user to a secondary system. A primary system sends a random string to a user system that is connected to the secondary system. The user is logged on the user system. The primary system receives from the user system first authentication information including an encryption of the random string by a private key of the user. The primary system generates a user-specific key consisting of the encryption of the random string. The primary system generates second authentication information from protected secondary authentication data stored in the primary system via application of the user-specific key to the protected secondary authentication data. The primary system provides the second authentication information to the secondary system to enable access of the user to the secondary system.Type: GrantFiled: May 16, 2012Date of Patent: August 27, 2013Assignee: International Business Machines CorporationInventor: Stephan Feil
-
Patent number: 8522328Abstract: In a method for managing use information of a measurement device, an operating interface of the device is locked before the device is operated. When a user starts to use the device, the method provides a login interface to verify whether the user is authorized to login the operating interface. If the user is authorized to login the operating interface, the operating interface is unlocked and the method records first information of starting to operate the device. After finishing the operation or when an elapsed time of the device not in use is greater than a predetermined time, the method controls the user to log out the operating interface, records second information of finishing the operation, and the operating interface is locked. The first information and the second information are saved in a text file.Type: GrantFiled: August 31, 2011Date of Patent: August 27, 2013Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventors: Jun-Yang Feng, Fa-Sheng Huang