Solely Password Entry (no Record Or Token) Patents (Class 713/183)
-
Patent number: 10819754Abstract: A system and method for routing IP-based messaging, voice and video calling, comprising detecting network parameters of a network that a device is connected to, detecting a location of the device and routing the call based on the network parameters and the location.Type: GrantFiled: January 6, 2020Date of Patent: October 27, 2020Assignee: RELIANCE JIO INFOCOMM USA, INC.Inventors: Gautam G. Reddy, Mathew Oommen, Pallavur A. Sankaranaraynan, Chao Kan
-
Patent number: 10810301Abstract: The information processing device includes a registration information obtaining unit, a data generating unit and a transmission processing unit. The registration information obtaining unit obtains user identification information, a login password, and attribute information in association with one another as user registration information. The data generating unit generates incomplete attribute information and complementary attribute information such that the attribute information can be reconstructed by combining the incomplete attribute information and the complementary attribute information with each other. The transmission processing unit transmits the user identification information, the login password, the incomplete attribute information, and the complementary attribute information to another information processing device.Type: GrantFiled: October 28, 2014Date of Patent: October 20, 2020Assignee: Rakuten, Inc.Inventor: Ryosuke Sakai
-
Patent number: 10783238Abstract: A password management service provides automated password management. In one embodiment, a method for automating password changes begins in response to a determination that automated password changes are authorized. In response, a data mining session is initiated. Within the data mining session, a set of third party applications or sites are identified. Then, and responsive to receipt of a password reset flow authorization, a password reset flow to one or more of the third party applications or sites is initiated by the service. Thereafter, and still within the data mining session, and for each of the one or more third party applications or sites, a determination is made whether a password reset confirmation link has been received by the service.Type: GrantFiled: June 29, 2017Date of Patent: September 22, 2020Assignee: LogMeln, Inc.Inventor: Joseph Siegrist
-
Patent number: 10785255Abstract: A scalable, malware detection system features at least one sensor and a cluster including at least one computing node. The computing node includes an analysis coordination system and an object analysis system. The analysis coordination system, when activated as a broker computing node, (i) receives metadata from a sensor, (ii) analyzes the metadata, and (iii) places at least a portion of the metadata into a data store for subsequent use in retrieval of the suspicious object by the object analysis system from the sensor. The object analysis system is configured to (i) retrieve the portion of the metadata, which includes at least a sensor identifier, from the data store, (ii) retrieve the suspicious object from the sensor using at least part of the portion of the metadata retrieved from the data store, and (iii) analyze the suspicious object for malware.Type: GrantFiled: September 30, 2016Date of Patent: September 22, 2020Assignee: FireEye, Inc.Inventors: Alexander Otvagin, Sakthi Subramanian, Krists Krilovs, Diptesh Chatterjee, Prakhyath Rajanna
-
Patent number: 10785215Abstract: To provide a user signature on a network transaction, a security server receives transaction information representing a transaction between a network user and a network site, such as a website, directly from the network site. The security server calculates a one-time-password based on the received transaction information and a secret shared by the security server and the network site, but not by the user. The security server transmits the calculated one-time-password for application as the user's signature on the transaction. The one-time-password is independently calculable by the network site based on the shared secret.Type: GrantFiled: April 9, 2019Date of Patent: September 22, 2020Assignee: Payfone, Inc.Inventor: Ravi Ganesan
-
Patent number: 10776804Abstract: The present invention provides systems for and methods providing a user in a commercial establishment with personalized information, which can include a personalized shopping list, targeted advertisements, health information, nutritional information, promotional offers, offers on sale items, offers on discounted items, manufacturer's coupons, storewide coupons, information on user specific favorite items, and information on user specific staple items. Also disclosed is a device for and method of providing the precise location of a user in a commercial facility comprising a signal receiver and position calculating system that uses one of biangulation and triangulation techniques.Type: GrantFiled: December 20, 2010Date of Patent: September 15, 2020Assignees: CUESOL, INC., AHOLD DELHAIZE LICENSING SARLInventors: Curt V. Avallone, Jacob D. Mark
-
Patent number: 10754634Abstract: A system and method including: receiving an initial application package including at least one binary file of an application; generating an application token, wherein the application token is operable to identify a context; and assembling a customized application package including the initial application package and the application token, wherein: the customized application package and the initial application package share a common hash value according to a predefined hashing algorithm, and the application can be configured based on the application token.Type: GrantFiled: February 25, 2019Date of Patent: August 25, 2020Assignee: Twitter, Inc.Inventors: Andrea S. Falcone, Peter W. Hopkins, Sanford W. Phillips
-
Patent number: 10757574Abstract: Exemplary embodiments may use a contactless card as a secondary form of authentication in a multi-factor authentication for a secure messaging service. The recipient party of a request to initiate a messaging service session (such as a server computing device) may be programmed to use the phone number of the originating device to look up records regarding an identity of a party and their associated phone number as a primary credential and then may require an authentication credential originating from the contactless card as a secondary credential for the initiating party. In some instances, the credential originating from the contactless card is a onetime password that is valid only for a period of time. The recipient party determines whether the onetime password is valid. If both credentials are valid, a secure messaging session may be initiated with the initiating party.Type: GrantFiled: December 26, 2019Date of Patent: August 25, 2020Assignee: Capital One Services, LLCInventors: Jeffrey Rule, Kevin Osborn
-
Patent number: 10742615Abstract: Construction of the static webpage begins. A first portion of content of the static webpage to encrypt is identified, the first portion being less than the entire static webpage. The first portion of content of the static webpage is encrypted. A first decryption key is provided to a first group of user devices, wherein the first decryption key allows each user device in the first group of user devices to decrypt the first encrypted portion of content of the static webpage. The static webpage is provided to a server, wherein the server allows public access to the static webpage.Type: GrantFiled: March 21, 2018Date of Patent: August 11, 2020Assignee: International Business Machines CorporationInventors: Roberto Ragusa, Marco Gianfico, Giulia Carnevale, Ciro Ragusa
-
Patent number: 10723361Abstract: A monitoring apparatus includes a storage unit, a reception unit, a collation information generation unit, and a response unit. The storage unit stores a criterion for determining normality of a frame transmitted from a first electronic device. The reception unit receives the frame from a bus network. The collation information generation unit generates, when the reception unit receives a frame of a first identifier (ID) transmitted from the first electronic device, collation information which is information for collation with the criterion stored in the storage unit, based on the frame. The response unit transmits, when the reception unit receives a frame of a second ID transmitted from the second electronic device, information which is based on the criterion stored in the storage unit and the collation information generated by the collation information generation unit and which enables a check whether the first electronic device is valid, to the second electronic device.Type: GrantFiled: January 25, 2018Date of Patent: July 28, 2020Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.Inventors: Yoshiharu Imamoto, Jun Anzai, Masato Tanabe
-
Patent number: 10706147Abstract: A computer system and associated methods are disclosed for mitigating side-channel attacks using a shared cache. The computer system includes a host having a main memory and a shared cache. The host executes a virtual machine manager (VMM) that supports a plurality of co-located virtual machines (VMs), which can initiate side-channel attacks using the shared cache. The VMM is configured to maintain respective memory maps for the VMs. The VMM is further configured to determine a subset of current host memory pages for a selected VM that can be used in a side-channel attack, relocate the contents of the current host memory pages to replacement host memory pages in the main memory, and modify the subset of entries to change current host memory pages to the respective replacement host memory pages.Type: GrantFiled: May 19, 2017Date of Patent: July 7, 2020Assignee: Amazon Technologies, Inc.Inventors: Martin Thomas Pohlack, Uwe Dannowski
-
Patent number: 10708239Abstract: An edge server disposed on an edge of a cloud network, includes: a processor, wherein when encryption key information relating to a terminal which requests a connection to the edge server and the encryption key information generated before the request, is included in shared information shared between a cloud server and another edge server in the cloud network, the processor is configured to start encryption communication with the terminal using the encryption key information of the shared information.Type: GrantFiled: September 25, 2017Date of Patent: July 7, 2020Assignee: FUJITSU LIMITEDInventors: Satoshi Imai, Motoyoshi Sekiya, Toru Katagiri, Tetsuya Yamada
-
Patent number: 10693661Abstract: Described herein are various technologies pertaining to extracting cryptographic keys from user behavioral biometrics, specifically keystroke dynamics. Such cryptographic keys can be used for, among other things, user authentication throughout computer sessions. Keystroke dynamics are timing data indicating when keys were pressed and when they were released.Type: GrantFiled: November 2, 2017Date of Patent: June 23, 2020Assignee: National Technology & Engineering Solutions of Sandia, LLCInventor: Jason Hamlet
-
Patent number: 10671716Abstract: The present invention relates to a user authentication server which mixedly uses both a password and biometric information. The user authentication server comprise: a variable keypad generation unit for generating a variable keypad including password keys and a biometric authentication key, wherein the position of each password key and the position of the biometric authentication key are changed in each generation of the keypad; an authentication information storage unit for storing authentication information of portable terminal users; and an authentication unit for authenticating a user by remotely providing information of generated variable keypad to a portable terminal, and comparing biometric information and information of the positions of the password keys in accordance with the order of input by the user, received from the portable terminal, with the authentication information stored in the authentication information storage unit.Type: GrantFiled: May 7, 2019Date of Patent: June 2, 2020Assignee: HAREXINFOTECH INC.Inventor: Kyung Yang Park
-
Patent number: 10667083Abstract: A method for determining index grids of a geo-fence, includes: determining a circumscribed grid of the geo-fence, the circumscribed grid being a smallest single grid in a pre-defined granularity system that can contain the geo-fence; with the circumscribed grid as a starting point, subdividing one or more grids containing a boundary of the geo-fence, into finer-grained grids level by level until an index accuracy of a subdivided grid set is not lower than a predetermined precision threshold, wherein the grid set is composed of grids within the geo-fence and grids containing the boundary of the geo-fence, and the index accuracy is a ratio of an area of the geo-fence to a sum of areas of all the grids in the grid set; and taking the grids in the grid set as index grids of the geo-fence.Type: GrantFiled: January 28, 2020Date of Patent: May 26, 2020Assignee: Alibaba Group Holding LimitedInventor: Hui Zhang
-
Patent number: 10667082Abstract: A method for determining index grids of a geo-fence, includes: determining a circumscribed grid of the geo-fence, the circumscribed grid being a smallest single grid in a pre-defined granularity system that can contain the geo-fence; with the circumscribed grid as a starting point, subdividing one or more grids containing a boundary of the geo-fence into finer-grained grids level by level until an index accuracy of a subdivided grid set is not lower than a predetermined precision threshold, wherein the grid set is composed of grids within the geo-fence and grids containing the boundary of the geo-fence, and the index accuracy is a ratio of an area of the geo-fence to a sum of areas of all the grids in the grid set; and taking the grids in the grid set as index grids of the geo-fence.Type: GrantFiled: October 4, 2019Date of Patent: May 26, 2020Assignee: Alibaba Group Holding LimitedInventor: Hui Zhang
-
Patent number: 10652931Abstract: One embodiment provides a method, including: identifying, using a short range wireless device of an electronic device, another user device; transferring, using the short range wireless device, connection data for a wireless local area network (WLAN) access point between the electronic device and the another user device; and connecting, using a processor of the electronic device, to the WLAN using the connection data. Other aspects are described and claimed.Type: GrantFiled: October 16, 2015Date of Patent: May 12, 2020Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Michael Terrell Vanover, Howard Locker, Yaqiang Wu
-
Patent number: 10635476Abstract: Apparatus and methods can be implemented to perform software testing or to perform emulated hardware testing using a cloud architecture that can utilize centralized testing technology and can enable scaling up to test for multiple tenants and scaling up to arbitrary numbers of programs tested for each tenant. A user can configure an initial test virtual machine on a cloud platform for a cloud service over a physical network such as the Internet. Components of the cloud architecture can create a set of clones of the initial test virtual machine and inject tools into each clone for testing. Testing of one or more clones of the set can be conducted in an environment isolated from the physical network and isolated from a backend of the cloud service. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: May 31, 2017Date of Patent: April 28, 2020Assignee: Microsoft Technology Licensing, LLCInventors: William Blum, Patrice Godefroid, David Molnar
-
Patent number: 10621328Abstract: A method of authenticating access on an electronic device. A digital image overlaid by an array of alphanumeric characters is displayed on a three-dimensional display of the electronic device. The digital image includes a three-dimensional representation of a scene and is displayed in three-dimensional coordinates. The array of alphanumeric characters is positioned on the three-dimensional display with respect to the digital image in three dimensions in response to received input. Access to the electronic device is authenticated in response to detecting that a designated character in the digital image is aligned with a designated object in the digital image.Type: GrantFiled: October 3, 2014Date of Patent: April 14, 2020Assignee: BlackBerry LimitedInventors: Jason Tyler Griffin, Jerome Pasquero, Steven Henry Fyke, Neil Patrick Adams, Michael Kenneth Brown
-
Patent number: 10614206Abstract: Examples of techniques for sequential object set passwords are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include presenting, by a processing device, an object set to a user, wherein the object set comprises a plurality of objects in a first order; receiving, by the processing device, a rearranged object set, wherein the rearranged object set comprises the plurality of objects in a second order; comparing the rearranged object set to a known sequential object set stored in a data store; and responsive to determining that the rearranged object set matches a known sequential object set, enabling the user to access a restricted resource.Type: GrantFiled: December 1, 2016Date of Patent: April 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mark E. Maresh, Colm Nolan, Juan F. Vargas, Michael J. Whitney
-
Patent number: 10609017Abstract: Managing passwords is provided. A machine training process is performed using a set of existing passwords to train a machine learning component. Members of a set of semantic categories are used to categorize respective passwords in the set of existing passwords. Password strengths corresponding to a set of candidate passwords are evaluated using the machine learning component. A resource is secured with a candidate password having a password strength greater than or equal to a defined password strength threshold level.Type: GrantFiled: May 10, 2017Date of Patent: March 31, 2020Assignee: International Business Machines CorporationInventors: Suresh Chari, Taesung Lee, Ian Michael Molloy, Youngja Park
-
Patent number: 10607195Abstract: The subject disclosure relates to generating a set of token data for storage at a first data store of a first device, wherein the set of token data comprises at least two or more of flag data, no state data, first state data, second state data, event identification data, or token identification data. In an aspect, the disclosure further includes, assigning the flag data to the no state data within the first data store of the first device. Also, the disclosure includes the reassignment of the flag data from the no state data to the first state data based on an occurrence of a first validation event by a second device.Type: GrantFiled: June 6, 2017Date of Patent: March 31, 2020Inventor: Miroslav Sarbaev
-
Patent number: 10601813Abstract: A system that includes a plurality of cloud servers in signal communication with user devices and an authentication server. Each cloud server is configure to generate a cloud key that is uniquely linked with a user associated with a user device and the cloud server and send the cloud key to the user device. The authentication server is configured to receive a network resource access request comprising the cloud key from the user device, perform multi-factor authentication with the user associated with the user device, and identify a cloud server from among the plurality of cloud servers based on a user profile linked with the user. The authentication server is further configured to send a key validation request to the identified cloud server, receive a key validation response, determine whether the cloud key passes verification, and send a network resource access response to the user device.Type: GrantFiled: October 26, 2017Date of Patent: March 24, 2020Assignee: BANK OF AMERICA CORPORATIONInventor: Manu J. Kurian
-
Patent number: 10599222Abstract: Haptic feedback can be provided by receiving an input character from a first user device, converting the input character to a haptic instruction comprising a plurality of tactile pulses, and outputting the haptic instruction on a second user device to cause the haptic motor of the second user device to vibrate according to the plurality of tactile pulses.Type: GrantFiled: July 12, 2018Date of Patent: March 24, 2020Assignee: International Business Machines CorporationInventors: Calvin C. Bench, Gabriella Campagna, Danchen Sun, Michael L. Kenney
-
Patent number: 10592182Abstract: An electronic apparatus is an electronic apparatus in a system including a terminal device and the electronic apparatus and includes a first communication device that is disposed in a first position and capable of wireless communication with the terminal device, a second communication device that is disposed in a second position and capable of wireless communication with the terminal device, and a processing unit. The first communication device transmits a beacon signal (a first position beacon) including position specifying information for specifying the first position and the second communication device transmits a beacon signal (a second position beacon) including position specifying information for specifying the second position.Type: GrantFiled: October 23, 2018Date of Patent: March 17, 2020Assignee: Seiko Epson CorporationInventor: Yutaka Yoshida
-
Patent number: 10594486Abstract: A method, computer program product, and computing system for receiving a key indicator and an encrypted password concerning an electronic device to be accessed. The key indicator may be processed to identify a decryption key. The encrypted password may be processed with the decryption key to generate a decrypted password.Type: GrantFiled: June 30, 2015Date of Patent: March 17, 2020Assignee: EMC IP Holding Company LLCInventor: Michael Trachtman
-
Patent number: 10586026Abstract: An obfuscation macro can expand obfuscation identification information into a data value during or prior to compiling source code, and insert a de-obfuscation call where the data value is referenced in the source code. An obfuscation utility can scan compiled binaries for data values containing obfuscation identification information. The obfuscation utility identifies and obfuscates data values containing obfuscation identification information within the compiled binaries. The de-obfuscation call de-obfuscates obfuscated data values during runtime.Type: GrantFiled: June 3, 2016Date of Patent: March 10, 2020Assignee: Electronic Arts Inc.Inventor: Alex Zvenigorodsky
-
Patent number: 10581821Abstract: A method for verifying that default passwords have been changed without causing a security lockout, is provided, including enabling user identifiers associated with a plurality of devices, prior to an initial security test, identifying, a default password for a user identifier of each device, attempting a login to each device using the default password for the user identifier of each device, wherein: in response to determining that the login is successful, raising an alert against the user identifier as a security concern and maintaining an enabled state of the user identifier, in response to determining that the login is unsuccessful, disabling the user identifier so that the user identifier is in a non-enabled state, until a security lockout interval elapses, and retrying the login only for each user identifier in an enabled state during one or more subsequent security tests initiated after a predetermined alert interval.Type: GrantFiled: August 10, 2017Date of Patent: March 3, 2020Assignee: International Business Machines CorporationInventors: John J. Auvenshine, Per Lutkemeyer, Christian Sonder
-
Patent number: 10572554Abstract: A personalized way to digitally record a person's physical activities over time serves web searching, business advertising, nostalgia, security and object tracing purposes. The chronological digital history of the person's physical presence over a time includes (i) digital network entries from other members who hold their portable wireless short range device near the person's device and transmit a URL or other key data and (ii) digital member entries such a digital photograph of a store sign. The digital network entries and digital member entries are automatically transmitted to a database located on a telecommunications network at a time of entry. Advertisers can transmit to members when members enter premises of advertiser's store. Upon sign-up online, the authentication data uniquely associated with an account is provided and key data they want to transmit is associated with the account. Digital histories can be used to improve web searching and networking opportunities.Type: GrantFiled: November 12, 2017Date of Patent: February 25, 2020Inventors: Sholem Weisner, Shmuel Nemanov
-
Patent number: 10567377Abstract: A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.Type: GrantFiled: March 23, 2017Date of Patent: February 18, 2020Assignee: Pemian & Corella, LLCInventors: Karen Pomian Lewison, Francisco Corella
-
Patent number: 10531358Abstract: A system and method for routing IP-based messaging, voice and video calling, comprising detecting network parameters of a network that a device is connected to, detecting a location of the device and routing the call based on the network parameters and the location.Type: GrantFiled: July 29, 2016Date of Patent: January 7, 2020Assignee: RELIACE JIO INFOCOMM USA, INC.Inventors: Gautam G. Reddy, Matthew Oommen, Pallavur A. Sankaranaraynan, Chao Kan
-
Patent number: 10530921Abstract: A method for unlocking a terminal screen and a terminal are disclosed. When it is detects that a user triggers an unlocking instruction for a terminal screen, a terminal generates and displays a random number; acquires a standard unlocking password through calculation according to an unlocking rule and the random number; receives an unlocking password input by a user and acquired through calculation according to the unlocking rule; identifies, according to the standard unlocking password, whether the unlocking password input by the user is correct; and when it is identified that the unlocking password input by the user is correct, unlocks the locked terminal screen. Compared with a manner of unlocking a terminal screen by using a fixed unlocking password in the prior art, embodiments of the present disclosure have a beneficial effect of unlocking a terminal screen by using a dynamic password, which improves security of a terminal.Type: GrantFiled: May 12, 2016Date of Patent: January 7, 2020Assignee: TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITEDInventor: Zhigang Zhu
-
Patent number: 10523447Abstract: A secure element (SE) with a notion of time useful for checking secure items is disclosed herein. Use of Public Key Infrastructure (PKI) with secure elements is improved by verifying secure items used by an SE. Methods of obtaining time information by the SE include push, pull, opportunistic, and local interface methods. The SE uses the time information to evaluate arriving and stored public key certificates and to discard those which fail the evaluation. The SE, in some embodiments, uses the time information in cooperation with certificate revocation lists (CRLs) and/or online certificate status protocol (OCSP) stapling procedures.Type: GrantFiled: February 24, 2017Date of Patent: December 31, 2019Assignee: Apple Inc.Inventor: Xiangying Yang
-
Patent number: 10511438Abstract: Methods, apparatus, and systems using dynamic authentication credentials to secure interactions between a user and a computer-based application are disclosed. Dynamic authentication credentials are generated based on a passcode value and a passcode-blinding data element value. The passcode and the passcode-blinding data element values are used to calculate a passcode verifier data element value. The passcode verifier data element value is then used to calculate the dynamic authentication credentials.Type: GrantFiled: December 30, 2016Date of Patent: December 17, 2019Assignee: OneSpan North America Inc.Inventor: Steven Murdoch
-
Patent number: 10496554Abstract: A system on chip, comprising a processing unit for executing processes, a memory unit, and a memory control unit connected between the processing unit and the memory unit, is described. The memory control unit allocates a memory region to a process. The memory control unit comprises a process activity counter which counts a duration of the process or transactions by the process to or from the memory region and which maintains a process activity count representing the counted duration of the process or the counted transactions to or from the memory region. The memory control unit disables the memory region in response to the process activity count exceeding a maximum process activity count. Notably, it blocks the memory region against further transactions by the process and against transactions by any other processes. A method of operating a system on chip is also described.Type: GrantFiled: March 3, 2014Date of Patent: December 3, 2019Assignee: NXP USA, INC.Inventors: Michael Johnston, Alan Devine, Alistair Paul Robertson, Manfred Thanner
-
Patent number: 10491589Abstract: An information processing apparatus includes a processor configured to execute processing. The processing is configured to: receive authentication information for a first terminal device authenticated by an authentication server among a plurality of terminal devices to be authenticated by the same authentication information; obtain authentication information from a second terminal device among the plurality of terminal devices; and authenticate the second terminal device in place of the authentication server based on the authentication information for the first and second terminal devices.Type: GrantFiled: July 30, 2017Date of Patent: November 26, 2019Assignee: Fujitsu Client Computing LimitedInventor: Toshiro Ohbitsu
-
Patent number: 10467628Abstract: A user may provide a financial card to an automated teller machine (ATM) or point of sale (POS) terminal and may be authenticated by providing a gesture and/or an image selection via a mobile device to the ATM or the POS. The gesture and/or image selection may be provided using a touchscreen of the mobile device. The gesture and/or image provided by the user via the mobile device may be compared to a stored gesture and/or image provided by the user during an earlier registration of the financial card. If there is a match between the gesture and/or image provided by the user via the mobile device and the previously stored gesture and/or image, then the user is authenticated and may access an account associated with the financial card.Type: GrantFiled: October 28, 2015Date of Patent: November 5, 2019Assignee: United Services Automobile Association (USAA)Inventors: Christopher Paul Courtright, Bradly Jay Billman
-
Patent number: 10440011Abstract: Techniques for protecting passwords and/or password entry by a user are provided. User identification data for a user can be received from a remote computing device. An identity of the user can be determined based on the user identification data. A password for the user can be determined. A modified keyboard configuration associated with the user can be determined. A request can be transmitted to the remote computing device for the password for the user based on the modified keyboard configuration. A modified password from the remote computing device can be received. A converted password based on the modified password and the modified keyboard configuration can be determined. The converted password can be compared to the password for the user. The user can be authorized when the converted password matches the password for the user.Type: GrantFiled: May 29, 2019Date of Patent: October 8, 2019Assignee: Capital One Services, LLCInventors: Fardin Abdi Taghi Abad, Reza Farivar, Jeremy Edward Goodsitt, Anh Truong, Kenneth Taylor, Mark Louis Watson, Kate Key, Vincent Pham, Austin Grant Walters
-
Patent number: 10430571Abstract: The security of a personal image in an apparently trusted UI is improved through the use of a fingerprint sensor hardwired to a Trusted Execution Environment. The personal image may be a complete or partial representation of a fingerprint sensed by the fingerprint sensor enhanced through emphasis of features of the fingerprint. Alternatively, the personal image may be an object whose movement within the UI is controlled responsive to data received from the fingerprint sensor.Type: GrantFiled: September 6, 2016Date of Patent: October 1, 2019Assignee: BlackBerry LimitedInventors: Neil Patrick Adams, Catalin Visinescu
-
Patent number: 10419485Abstract: A method is provided for identifying a strength of an input picture password formed by performing a sequence of gestures relative to a picture. The method includes storing, in a memory device, a crowdsource history of picture passwords formed by tracking a plurality of picture passwords used to authenticate a plurality of users. Each of the plurality of users has a respective user profile. The method further includes generating, by a processor-based demography-based pattern usage assessment generator, a demography-based pattern usage assessment by analyzing the crowd source history and the user profile of the plurality of users. The method also includes providing, by a user-perceptible indication device, an indication of the strength of the input picture password in accordance with the demography-based pattern usage assessment.Type: GrantFiled: March 8, 2016Date of Patent: September 17, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yuk L. Chan, Heidi Lagares-Greenblatt, Deepti Naphade
-
Patent number: 10419466Abstract: Disclosed herein is a method for use in detection of abnormal behavior of a group of a plurality of entities of a computer system. The method is arranged to be performed by a processing system and comprises: creating a model of normal behavior of the group of entities; and determining, in accordance with the model of normal behavior of the group of entities, a parameter indicative of abnormal behavior of the group of entities. Also disclosed is an equivalent computer readable medium and anomalous behavior detection system.Type: GrantFiled: February 6, 2017Date of Patent: September 17, 2019Assignee: Darktrace LimitedInventors: Matt Ferguson, Maha Kadirkamanathan
-
Patent number: 10412077Abstract: An intermediary can securely migrate a security credential between systems despite different underlying encoding technologies used for authentication by the system. This intermediary can also securely migrate an identity between different authentication technologies. A secure login interface program code that is digitally signed by the intermediary is provided in advance to devices that will source authentication requests. The interface program code is at least secure because it has been digitally signed by the intermediary. An instance of the secure interface program code directs authentication requests entered into the interface instance to the intermediary, which is at least identified by the digital signature. After a successful authentication by a destination system identified by the authentication request, the intermediary can migrate the authenticated security credential to a migration target.Type: GrantFiled: March 21, 2016Date of Patent: September 10, 2019Assignee: CA, Inc.Inventor: Nikhil Kumar
-
Patent number: 10390113Abstract: Provided are a method and an apparatus for controlling device using Bluetooth technology.Type: GrantFiled: September 7, 2016Date of Patent: August 20, 2019Assignee: LG ELECTRONICS INC.Inventors: Younghwan Kwon, Jinkwon Lim, Hyunsik Yang, Minsoo Lee, Jingu Choi
-
Patent number: 10367811Abstract: The present disclosure relates to network security software cooperatively configured on plural nodes to authenticate and authorize devices, applications, users, and data protocol in network communications by exchanging nonpublic identification codes, application identifiers, and data type identifiers via pre-established communication pathways and comparing against pre-established values to provide authorized communication and prevent compromised nodes from spreading malware to other nodes.Type: GrantFiled: April 10, 2018Date of Patent: July 30, 2019Assignee: Stealthpath, Inc.Inventors: Mike Clark, Andrew Gordon, Matt Clark
-
Patent number: 10362019Abstract: Disclosed are various embodiments for managing security credentials. In one embodiment, network content for a network site is obtained in response to a user request. A connection with a remote computing device that stores and manages security credentials for accessing network sites is authenticated using a master security credential and answers to knowledge-based questions. A security credential associated with the network site is provided to the client from the remote computing device based at least in part on the answers. Access to the network site is authenticated according to the security credential.Type: GrantFiled: August 17, 2017Date of Patent: July 23, 2019Assignee: Amazon Technologies, Inc.Inventors: Darren Ernest Canavor, Jesper Mikael Johansson
-
Patent number: 10360412Abstract: A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.Type: GrantFiled: March 7, 2018Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Lorraine Herger, Neal Keller, James R. Kozloski, Matthew A. McCarthy, Clifford A. Pickover, Andrew Wyskida
-
Patent number: 10346642Abstract: A restricted access device such as a cellphone, a tablet or a personal computer, analyzes contemporaneous keyboard inputs of a password and gestures to authenticate the user and enable further access to applications and processes of the restricted access device. The gestures may be facial gestures detected by a camera or may be gestures made by an avatar rendered on a display of the device. The password may be shorted based upon the context of the authentication as well as any gestures occurring during password entry. The gestures may be learned by the restricted access device during the password entry process.Type: GrantFiled: March 7, 2018Date of Patent: July 9, 2019Assignee: International Business Machines CorporationInventors: Lorraine Herger, Neal Keller, James R. Kozloski, Matthew A. McCarthy, Clifford A. Pickover, Andrew Wyskida
-
Patent number: 10331874Abstract: A device may receive an input that indicates a request to initiate a transaction at an ATM device. The device may instruct the user to capture one or more images of the ATM device. The device may determine that an image has been captured and process the image to determine first information that identifies the ATM device. The device may send the first information to a server device and receive a signal that indicates the ATM device has been validated. The device may cause an augmented reality (AR) overlay to be displayed, wherein the AR overlay includes second information related to authenticating the user to the ATM device. The device may determine whether a user action is performed with respect to the second information included in the AR overlay, and perform a device action related to the second information, the ATM device, or the AR overlay.Type: GrantFiled: June 6, 2018Date of Patent: June 25, 2019Assignee: Capital One Services, LLCInventors: Abdelkadar M'Hamed Benkreira, Michael Mossoba, Joshua Edwards
-
Patent number: 10331908Abstract: Systems and methods may be provided for masking data on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online on a public service provider's website. The publishing node may control which users are permitted access to the posted data by defining a policy associated with the data input field. The posted data may be transformed or tokenized to ensure that it is inaccessible to a user (or group of users) unless that user/group is granted access to the decoding key under the policy. In this way, data security and data control may be provided to a publishing user node. Data that has already been posted may be destroyed, for example, by deleting the decryption key or a token.Type: GrantFiled: April 30, 2018Date of Patent: June 25, 2019Assignee: ESW Holdings, Inc.Inventors: Steven Sprague, Michael Sprague
-
Patent number: 10331286Abstract: A portable communication device (1) is capable of setting a sleep mode as an operation mode. An operation receiver (101) receives operations given by a user. A setter (102) sets the operation mode to the sleep mode when the operation receiver (101) receives no operation for a first time period. A displayer (103) displays an indicator on a display when the operation receiver (101) receives a first operation in the sleep mode. A launcher (104) launches, when the operation receiver (101) receives operations for specifying the indicator, an application program associated with the specified indicator.Type: GrantFiled: February 28, 2013Date of Patent: June 25, 2019Assignee: NEC CorporatianInventor: Sho Ryo