Solely Password Entry (no Record Or Token) Patents (Class 713/183)
  • Patent number: 8856531
    Abstract: Methods, computer program products, and systems are provided for using a single shared secured connection among all servers in a cluster by efficiently establishing and securely disseminating a shared key between the servers. In particular, this is done by using a Diffie-Hellman key agreement scheme among the servers using an ordered list of servers generated on-the-fly.
    Type: Grant
    Filed: June 27, 2011
    Date of Patent: October 7, 2014
    Assignee: EMC Corporation
    Inventors: Peter Alan Robinson, Kanchan Kaur, Sean Parkinson
  • Patent number: 8856529
    Abstract: Methods and systems provide secure functions for a mobile client. A circuit may include a memory configured to store a server access key and a first function authentication key. The circuit may also include authentication circuitry configured to access the server access key to authenticate access to a server to download a function capsule comprising a first function and to access the first function authentication key to authenticate use of the first function of the function capsule.
    Type: Grant
    Filed: December 18, 2013
    Date of Patent: October 7, 2014
    Assignee: Broadcom Corporation
    Inventors: Edward H. Frank, Mark Buer, Jeyhan Karaoguz
  • Publication number: 20140298031
    Abstract: By comparing a chip unique password, certification for activating a debug function can be established on the chip unique password. Thus, even when the chip unique password is lost due to negligence, not only certification for activating debugging on other motherboards of the same model number can remain unaffected, but also risks caused by replacing a chip or by a private key leakage from a system manufacturer are eliminated.
    Type: Application
    Filed: March 26, 2014
    Publication date: October 2, 2014
    Applicant: MStar Semiconductor, Inc.
    Inventor: Chien-Hsing Huang
  • Patent number: 8850217
    Abstract: A method comprises detecting zapping to or from one or more services; determining whether the zapping includes termination of a password-protected service; and sending a trigger message (248, 256, 262) only if the zapping includes termination of a password-protected service (X, Y, Z). In one embodiment, the trigger message is sent to a smartcard (SC). In one embodiment, the password-protected service is password-protected for parental control. In one embodiment, the method further includes requesting a password when the zapping includes zapping to a password-protected service. In one embodiment, the password-protected service is a pincode-protected service.
    Type: Grant
    Filed: August 19, 2009
    Date of Patent: September 30, 2014
    Assignee: Nokia Corporation
    Inventors: Anja Jerichow, Martin Jansky, Kyösti Koivisto, Matti Puputti
  • Patent number: 8848044
    Abstract: This invention is to provide an image processing apparatus, an image processing method, a program, and a display in which both of a secret image and a public image can be efficiently displayed with high picture quality without reducing contrast of the public image. One of output images is a secret image which displays an input secret image as one of input images in a partial area of a screen, all the output images including the secret image have a relationship to become, when a luminance value of each pixel thereof is totaled, an input public image as one of the input images; and during a period in which at least the secret image is being outputted, shutter glasses disposed between a display to which the image signals are inputted and user's eyes are set to a light transmission state.
    Type: Grant
    Filed: January 22, 2008
    Date of Patent: September 30, 2014
    Assignee: Nec Corporation
    Inventors: Daigo Miyasaka, Masao Imai, Fujio Okumura
  • Patent number: 8850603
    Abstract: A method for entering a passcode within a mobile device begins with receiving an indication of a user attempt to access the mobile device. A passcode entry display including a plurality of touch points is generated responsive to the indication. Each of the plurality of touch points includes at least two visual identifiers associated therewith. The passcode entry display is displayed on an interface of the mobile device and the passcode is received responsive to user selection of a sequences of the plurality of touch points associated with a predetermined sequence of at least one of the visual identifiers. The arrangement of the at least two visual identifier associated with the plurality of touch points of each passcode entry display differs from an arrangement of the at least two visual identifiers in a previous and a subsequent passcode entry display.
    Type: Grant
    Filed: August 8, 2012
    Date of Patent: September 30, 2014
    Assignee: MetroPCS Wireless Inc.
    Inventor: Mark Methenitis
  • Patent number: 8850519
    Abstract: Systems and methods for providing authentication using an arrangement of dynamic graphical images. The graphical images can be arranged as a grid or matrix for presentation on a device display for authentication of a user. The kinds of graphical images can be derived from a designated authentication category and non-authenticating categories. A series of password elements corresponding to the graphical images can be displayed with the graphical images. The user may enter the series of one or more password elements corresponding to graphical images from the authentication category which combine to form a password entry. An authentication server can compare the password entry to an authentication password corresponding to the particular arrangement of dynamic graphical images. The selection of graphical images, their arrangement and their corresponding password elements, may dynamically change in between authentication processes.
    Type: Grant
    Filed: December 23, 2010
    Date of Patent: September 30, 2014
    Assignee: Confident Technologies, Inc.
    Inventors: Steven L. Osborn, Nicholas A. Davis, James L. Sontag, Joel Norvell
  • Patent number: 8844023
    Abstract: A semiconductor memory may be provided with a built-in test mode that is accessible through a password protection scheme. This enables access to a built-in test mode after manufacturing, if desired. At the same time, the password protection prevents use of the built-in test mode to bypass security features of the memory.
    Type: Grant
    Filed: December 2, 2008
    Date of Patent: September 23, 2014
    Assignee: Micron Technology, Inc.
    Inventors: Antonino La Malfa, Marco Messina
  • Patent number: 8844004
    Abstract: Various embodiments herein include at least one of systems, methods, and software to receive and process credential requests for remote support of computer applications. One embodiment includes receiving a credentials request in a first environment from a second environment in response to an incident in the first environment. This embodiment further includes processing the received credentials request within the first environment by approving the request, activating credentials, and sending the credentials to the second environment. This embodiment may further include receiving, within the first environment, a message indicating the incident is resolved and deactivating the credentials.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: September 23, 2014
    Assignee: SAP AG
    Inventors: Klaus Dickgiesser, Gunter Hoffelder, Wolfram Bonheim, Thorsten Burkert, Andreas Wolber
  • Patent number: 8843755
    Abstract: An apparatus lets a user to determine a pool of images and then forms from the pool of images a set of images for user authentication and divides the set of images into two mutually exclusive subsets: a key image subset comprising images referred to as key images and a decoy image subset comprising images referred to as decoy images. The apparatus displays the key images to the user to teach the key images to the user. Then, to authenticate the user, the apparatus produces an assortment of decoy images and key images, and displays the assortment to the user. The apparatus receives from the user identification of images held as key images and verifies whether the identification of key images matched with the key images selected by the processor.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: September 23, 2014
    Assignee: Nokia Corporation
    Inventors: Andreas Petrus Heiner, Paul Michael Dunphy
  • Patent number: 8838959
    Abstract: A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the domains and applications on the network may be required, by design, to maintain a separate password infrastructure. For these systems, the CPR establishes a secure and authenticated communication channel and software on the system interfaces with the password infrastructure to synchronize the password in the system password infrastructure with the password in the CPR. For other systems not required to maintain a separate password infrastructure, the CPR performs password services by responding to requests from those systems seeking to validate user IDs and passwords. The CPR enables an administrator to modify network privileges and enables a user to alter passwords on the network through a single interface.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: September 16, 2014
    Assignee: Rockstar Consortium US LP
    Inventor: Christopher Raymond Lewis
  • Patent number: 8839398
    Abstract: A security token access device, a user device such as a computing device or communications device, and a method for managing multiple connections between multiple user devices and the access device. The access device maintains connection information, including security information, for each user device securely paired with the access device. Each time a new user device is paired with the access device, the access device transmits a notification to the user devices already paired to the user device. A user may provide instructions to the access device to terminate a pairing with one of the user devices by overwriting at least a portion of the connection information associated with the designated user device. A user device may further request a listing of all user devices currently paired with the access device.
    Type: Grant
    Filed: January 16, 2012
    Date of Patent: September 16, 2014
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Herbert Anthony Little
  • Patent number: 8839453
    Abstract: Mobile devices provide security based on geographic location. With such a technique, a mobile device may automatically check its current location against geographic information as to the location(s) in which it is permitted to operate. When the user attempts access to the device, the mobile device will prompt the user for his/her credential only if the geographic location matches an allowed location. The user gains access then by inputting information corresponding to the credential, e.g. username and password, of a valid user. In the examples, if the geographic location does not match an allowed location, the mobile device provides a warning to the user, and the user is not allowed to enter any credential information. Optionally, the mobile device may send an alert message about the device being taken outside a specified boundary, e.g. to report the situation to other personnel.
    Type: Grant
    Filed: April 12, 2010
    Date of Patent: September 16, 2014
    Assignee: Cellco Partnership
    Inventor: Kumar Sanjeev
  • Patent number: 8838987
    Abstract: Various methods and systems are provided for allowing a user to select a non-numeric PIN or password and use that to access content instead of a conventional numerical PIN. A series of visual, textual, and/or audio “digits” form the PIN, where each succeeding digit may be related to one or more of the preceding digits.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: September 16, 2014
    Assignee: Ebay Inc.
    Inventor: Carl Stone
  • Patent number: 8838988
    Abstract: Aspects of the present invention provide a solution for verifying the integrity of a transaction. In response to receipt of a confirmed electronic transaction from a user, a one time password is forwarded to the user. The user then initiates a telephonic communication with a verifier on the user's wireless device and provides the one time password to the verifier. The verifier authenticates the mobile telephonic device based on the device's caller identification number and determines whether the one time password provided by the user matches the one forwarded to the user. After the user is authenticated, the verifier communicates the details of the transaction that were received and the user confirms whether the details match those originally entered.
    Type: Grant
    Filed: April 12, 2011
    Date of Patent: September 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: Jose F. Bravo, Jeffery L. Crume
  • Patent number: 8832788
    Abstract: A server computing system receives a request to authenticate the identity of a user. The user may wish to perform an action that requires the user's identity to first be verified. In response to the request, the server computing system automatically contacts trusted associates that are listed in policy data for the user and determines whether the trusted associates validate the identity of the user. The server computing system provides one-time passwords to the user for the trusted associates that have validated the identity of the user. Subsequently, the user can combine the one-time passwords to form an authentication password, which can be used to determine whether the user is allowed to perform the action.
    Type: Grant
    Filed: November 1, 2011
    Date of Patent: September 9, 2014
    Assignee: Symantec Corporation
    Inventors: Douglas E. Gibson, Keith Newstadt
  • Patent number: 8832807
    Abstract: Apparatus and method for computer-based or mobile-device-based electronic generation and verification of dynamic password, or one-time-password (OTP), that does not require initial synchronization, nor re-synchronization, between a client OTP generator and the corresponding OTP server, is provided. It employs the general OTP principles and methods to ensure the single-use of the password credential and the security strength of the OTP, and it utilizes instant dynamic parameter(s) communications for equivalent instant synchronization (EQ-sync). It can also be used to ensure integrity and authenticity of an online transaction request.
    Type: Grant
    Filed: August 2, 2011
    Date of Patent: September 9, 2014
    Inventors: Christine E. Kuo, David E. Kuo, Hui-Hsin Wu, James S. Kuo
  • Patent number: 8832817
    Abstract: A computer-implemented method includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: September 9, 2014
    Assignee: Google Inc.
    Inventor: Gabriel A. Cohen
  • Patent number: 8832810
    Abstract: Methods, systems, and products authenticate a user to a device. A user selects or submits a media file for authentication. Features in the media file are compared to a set of criteria for authentication. The number of matching criteria, that are within a range of values for each criterion in the set of criteria, are determined. The number of matching criteria is compared to a threshold value. When the number of matching criteria equals or exceeds the threshold value, then the user that selected or submitted the media file is authenticated.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: September 9, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: William Roberts Cheswick, David Kormann
  • Patent number: 8826421
    Abstract: According to embodiments of the present invention, a computing device provides a security rules subset of a server-side protection element to a pre-validation component deployed at a client side. The computing device validates the user input based on the security rules. The computing device determines, in response to detecting a user input violation and that a violated security rule has/or has not been provided to the pre-validation component, the user as a first or second class of users. The computing device performs different security protection actions to the first and second class of users. The computing device asynchronously performs a dynamic update to the security rule subset provided to the pre-validation component. The security rule subset is screened from the security rules of the server-side protection means. A policy for screening the security rule subset is selected.
    Type: Grant
    Filed: November 5, 2010
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Lin Luo, Fan Jing Meng, Shun Xiang Yang, Yu Zhang
  • Patent number: 8826374
    Abstract: A method and apparatus for processing an electronic document in a secure manner is provided. A scanner may verify that the configuration state of a file server has not changed since a prior configuration state by issuing a request to a security server. The security server may process the request to determine whether the configuration state of the file server has changed since the file server was registered with the security server. The security server may also verify that the scanner issued a request to store an electronic document using a file server or that the file server received the request. A storage medium of a file server may be protected against unauthorized removal of the storage medium by storing, separate from the storage medium, a password required to access the storage medium, and when the file server is powered on, the password is provided to the storage medium.
    Type: Grant
    Filed: August 7, 2012
    Date of Patent: September 2, 2014
    Assignee: Ricoh Company, Ltd.
    Inventor: Brian Smithson
  • Patent number: 8826417
    Abstract: A processor-based system, including systems without keyboards, may receive user inputs prior to booting. This may done using the graphics controller to generate a window which allows the user to input information. The system firmware may then compare any user inputs, such as passwords, and may determine whether or not to actually initiate system booting.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: September 2, 2014
    Assignee: Intel Corporation
    Inventors: Wah Yiu Kwong, Wayne L. Proefrock
  • Patent number: 8819443
    Abstract: A storage device comprises a non-volatile storage media and a processor that is operative to receive, via an interface with one or more host devices, a first entered password needed for accessing data stored in the non-volatile storage media, generate a first number, combine the first entered password and the first number, generate a cryptographic key based on the combination of the first entered password and the first number, encrypt the received first entered password using the cryptographic key, and store the encrypted first entered password and the first number in the non-volatile media. The processor may be further operative to receive a request for authentication; provide a reply comprising the first number; receive a second number calculated based on a cryptographic combination of the first number and a second entered password, and authenticate the host device if the second number successfully decrypts the encrypted first entered password.
    Type: Grant
    Filed: February 14, 2012
    Date of Patent: August 26, 2014
    Assignee: Western Digital Technologies, Inc.
    Inventor: James S. Lin
  • Patent number: 8819768
    Abstract: A cloud service access and information gateway receives, from a user device, a request to access a cloud service. The cloud service access and information gateway determines an identity of a user making the request to access the cloud service and compares the identity of the user to a password vault control policy. The cloud service access and information gateway determines, based on the comparing, one or more sections of a split password vault to which the user has access. The split password vault comprises a first section storing a first set of log-in credentials and a second section storing a second set of log-in credentials.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: August 26, 2014
    Inventors: Robert Koeten, Nicolas Popp
  • Patent number: 8819428
    Abstract: A key is securely injected into a POS PIN pad processor in its usual operating environment. In response to entry of a personal identification number (PIN) into a PIN pad, the processor puts the PIN into a PIN block; puts additional random data into the PIN block; and encrypts the entire PIN block using asymmetric cryptography with a public key derived from the injected key residing in the PIN pad processor. The corresponding private key may be held securely and secretly by an acquirer processor for decrypting the PIN block to retrieve the PIN. The encrypted random data defends the PIN against dictionary attacks. Time stamp data and constant data encrypted with the PIN block enables a defense of the PIN against replay attacks and tampering. The method may also include accepting the PIN from a mobile phone in communication with the processor.
    Type: Grant
    Filed: October 11, 2012
    Date of Patent: August 26, 2014
    Assignee: EBAY Inc.
    Inventor: Attaullah Baig
  • Patent number: 8819444
    Abstract: A method for single sign-on (SSO) that provides decentralized credential management using end-to-end security. Credential (and other personal user information) management is decentralized in that encryption is performed locally on the user's computer. The user's encrypted credentials may be stored by the login server and/or a plurality of distributed servers/databases (such as a cloud). The login server never has access to the user's credentials or other personal information. When the user wants to use single sign-on, he enters his password into his browser and the browser submits the encrypted/hashed password to the login server for validation. Upon validation, the browser receives the user's encrypted credentials. The credentials are decrypted by the browser and provided to relevant websites to automatically log the user in.
    Type: Grant
    Filed: December 27, 2011
    Date of Patent: August 26, 2014
    Inventors: Majid Shahbazi, Mahmood Shahbazi
  • Patent number: 8819804
    Abstract: Various systems and methods distribute enforcement of browser rules. For example, one method can involve receiving, from a browser control client, information indicating that a user is accessing the Internet via a browser. The information received from the client can include a login name submitted by the user via the browser. The browser is installed on a computing device, and the browser control client is also installed on the computing device. The method can then send, to the browser control client, a set of one or more browser rules associated with the login name for enforcement on the computing device, in response to receipt of the information.
    Type: Grant
    Filed: October 29, 2010
    Date of Patent: August 26, 2014
    Assignee: Symantec Corporation
    Inventor: Anand D. Sankruthi
  • Patent number: 8811618
    Abstract: A ciphering key management technique for use in a WLAN receiver is provided where a hash table is stored that has a first and a second table portion. The first table portion stores transmitter address data and the second table portion stores at least one cipher key. It is determined whether a transmitter address matches transmitter address data in the first table portion, and if so, a corresponding cipher key stored in the second table portion is determined for use in decrypting the received data. The hash table technique allows for a fast search for the correct cipher key. Embodiments are described that allow for dynamically adding and removing keys without blocking the search.
    Type: Grant
    Filed: July 26, 2004
    Date of Patent: August 19, 2014
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Ingo Kuehn, Uwe Eckhardt, Axel Wachtler, Falk Tischer
  • Patent number: 8812862
    Abstract: A system for registering a password derivation pattern for deriving a password to be used in user verification includes a terminal device and a server. The terminal device is configured to display a presentation pattern, the presentation pattern including a plurality of elements, each of the plurality elements being assigned with predetermined characters, so as to cause the user to input a character assigned to a specific element with respect to the presentation pattern. The server is connected with the terminal device via a communication channel. The server is configured to repeat the process of displaying a new presentation pattern until the password derivation pattern is specified based on the character inputted by the user. The server is configured to store the specified password derivation pattern.
    Type: Grant
    Filed: September 15, 2011
    Date of Patent: August 19, 2014
    Assignee: Passlogy Company Ltd.
    Inventor: Hideharu Ogawa
  • Patent number: 8812861
    Abstract: A method and system for protection of and secure access to a computer system or computer network. The method includes the steps of receiving a first login account identifier, such as a user name from a user in communication with the computer system or network. A determination is made if the user is recognized and enrolled from the first login account from the first login account identifier. If the user is recognized, a grid of randomly generated visual images is displayed including one visual image from an image category which has been preselected by the user upon enrollment. An image category identifier is randomly assigned to each visual image in the grid. An image category identifier, second login account identifier, such as a password, is entered and received. If the login account identifier and the image category is validated, access is permitted to the computer system or network.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: August 19, 2014
    Assignee: Confident Technologies, Inc.
    Inventors: Steven L. Osborn, Nicholas A. Davis, James L. Sontag, Joel Norvell
  • Patent number: 8810365
    Abstract: An authentication string, such as a password, consists of characters. Each of the characters in the authentication string is randomly associated with a defined location on a device. For example, an area on a touch screen can be associated with a character in the authentication string. When a user selects a location associated with the character, feedback is provided that identifies the character. When the user selects a location that is not associated with the character, feedback is provided that does not identify the character. If the user responds by indicating that the associated location matches the character, the character is authenticated. If the user responds by indicating that a location not associated with the character is a match, the character is not authenticated. This process is then repeated for each character in the authentication string.
    Type: Grant
    Filed: April 8, 2011
    Date of Patent: August 19, 2014
    Assignee: Avaya Inc.
    Inventor: Douglas M. Grover
  • Patent number: 8806573
    Abstract: Techniques are provided for the controlled scheduling of the authentication of devices in a lossy network, such as a mesh network. An authenticator device that is configured to authenticate devices in a lossy network receives an authentication start message from a particular device to be authenticated. The authenticator device determines a schedule for engaging in an authentication procedure for the particular device based on an indication of current network utilization.
    Type: Grant
    Filed: August 9, 2011
    Date of Patent: August 12, 2014
    Assignee: Cisco Technology, Inc.
    Inventors: Atul Mahamuni, Navindra Yadav, Jonathan Hui, Alec Woo, Wei Hong
  • Publication number: 20140223189
    Abstract: A method for unlocking a screen of a device, including: detecting an inputting operation on the device for inputting an unlock password, the inputting operation causing one character to be inputted to the device; performing, in response to the detecting, a comparison to determine whether all input characters corresponding to a password indicator displayed on the screen match a preset password; and unlocking the screen of the device if it is determined that all the input characters corresponding to the password indicator match the preset password.
    Type: Application
    Filed: December 30, 2013
    Publication date: August 7, 2014
    Applicant: Xiaomi Inc.
    Inventors: Chengxing Gao, Weixing Li, Tao Peng
  • Patent number: 8793501
    Abstract: A mobile communication terminal having a password notification function and a method for notifying a user of a password in the mobile communication terminal that allow the transmission of a stored password or a newly generated random password to a previously selected medium by entering a secondary password when an input password is not identical to the stored password. The method includes checking whether a password notification function is set; requesting input of a stored password, receiving an input password, and checking whether the input password is identical to the stored password. If the input password is not identical to the stored password, the method further includes requesting input of a stored secondary password, checking whether an input secondary password is identical to the stored secondary password, and sending a password if the input secondary password is identical to the stored secondary password.
    Type: Grant
    Filed: October 28, 2013
    Date of Patent: July 29, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Kyong-Su Kim
  • Patent number: 8789143
    Abstract: According to one embodiment, an apparatus may store a plurality of tokens indicating a user is requesting access to a resource over a network. The apparatus may determine a condition associated with accessing the resource based on the plurality of tokens. The condition may be determined in addition to a determination to grant or deny access to the resource. The condition may include an obligation to be fulfilled and a message providing instruction regarding how to fulfill the obligation. The apparatus may generate a decision token representing the condition, and communicate the decision token to a resource provider to facilitate enforcement of the condition.
    Type: Grant
    Filed: August 15, 2011
    Date of Patent: July 22, 2014
    Assignee: Bank of America Corporation
    Inventors: Rakesh Radhakrishnan, Cynthia Ann Frick, Radu Marian, Abdulkader Omar Barbir, Rajat P. Badhwar
  • Patent number: 8788834
    Abstract: A computer-implemented method for altering the state of a computing device via a contacting sequence is described. A contacting sequence is detected on a display of the computing device in a first state. The contacting sequence is compared to at least one contacting sequence stored in a database. A determination is made whether the detected contacting sequence matches at least one contacting sequence stored in the database. If the detected sequence matches at least one contacting sequence stored in the database, the first state of the computing device is altered to a second state.
    Type: Grant
    Filed: May 25, 2010
    Date of Patent: July 22, 2014
    Assignee: Symantec Corporation
    Inventor: Xiaolu Sang
  • Patent number: 8789206
    Abstract: A user sets a design and uses that to get access to a resource. The design can include lines, and distances of lines, directions and locations. The design can require a user to select a color and can include colors and amounts by which the different entered parts need to overlap.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: July 22, 2014
    Assignee: Harris Technology, LLC
    Inventor: Scott C. Harris
  • Patent number: 8788833
    Abstract: According to one embodiment, an electronic apparatus comprises a communication module and a connection control module. The communication module is configured to execute close proximity wireless transfer. The connection control module is configured to start an operation of establishing a connection between the communication module and an external device which is in close proximity to the communication module if an identifier of the external device wirelessly transmitted from the external device is included in a connection permission list. The connection control module is configured to display a password entry screen if the identifier is not included in the connection permission list, and to add, if a password entered on the password entry screen matches with a registered password, the identifier to the connection permission list and start the operation of establishing the connection between the communication module and the external device.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: July 22, 2014
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Kotaro Fukui
  • Patent number: 8787569
    Abstract: Method to secure the communication of components within self-service automats that are linked to each other by a bus system, having a transmitter and a receiver, characterized in that data are exchanged as tuples (C, A, R, N, Z) on the transport layer of the bus system where C are the message data M encrypted with an encryption key, A are the message data M authenticated with an authentication key, R represents the role of a component on the bus system of active or passive participants, N represents a message counter, Z represents a session counter.
    Type: Grant
    Filed: October 22, 2009
    Date of Patent: July 22, 2014
    Assignee: Wincor Nixdorf International GmbH
    Inventors: Volker Krummel, Michael Nolte, Matthias Runowski, Johannes Bloemer
  • Publication number: 20140201536
    Abstract: Protecting the security of an entity by using passcodes is disclosed. A user's passcode device generates a passcode. In an embodiment, the passcode is generated in response to receipt of user information. The passcode is received by another system, which authenticates the passcode by at least generating a passcode from a passcode generator, and comparing the generated passcode with the received passcode. The passcode is temporary. At a later use a different passcode is generated from a different passcode generator. In these embodiments, there are asymmetric secrets stored on the passcode device and by the administrator. This adds more security so that if the backend servers are breached, the adversary cannot generate valid passcodes. In some embodiments, the passcode depends on the rounded time.
    Type: Application
    Filed: March 5, 2013
    Publication date: July 17, 2014
    Applicant: Biogy, Inc.
    Inventor: Michael Stephen Fiske
  • Patent number: 8782776
    Abstract: A simple, customizable and intuitive virtual combination unlock method and system. More specifically, an unlock system and method is disclosed which includes a virtual combination lock, where the virtual combination lock includes several rows of user-selectable images such as pictures or icons as the virtual combination wheels. In certain embodiments, the images are accessed via the user's database. To unlock the device, the user touches and drags pre-selected images into alignment with each other. Security can be adjusted by changing the number of images that need to be aligned to unlock the device.
    Type: Grant
    Filed: January 4, 2012
    Date of Patent: July 15, 2014
    Assignee: Dell Products L.P.
    Inventor: Roy Stedman
  • Patent number: 8782418
    Abstract: An entertainment device comprises communication means operable to receive media data from a media data source, storage means operable to store the received media data, in which the storage means limits the duration of access to the media data which was received from the media data source.
    Type: Grant
    Filed: November 13, 2007
    Date of Patent: July 15, 2014
    Assignee: Sony Computer Entertainment Europe Limited
    Inventors: Emmanuel James Poitier, Richard Eliot Bates
  • Publication number: 20140195814
    Abstract: The invention discloses a method and a system to decrypt private contents stored in a device and the invention belongs to the field of computer security. The method may include: receiving a contents ID and a decrypting password from a first user; decrypting the encrypted private contents corresponding to the contents ID using the decrypting password; displaying the decrypted private contents when the decryption is successful; and displaying preset contents when the decryption is not successful. The system may include: a receiving module, a decryption module, and a display module. The present invention can improve the security of the private contents.
    Type: Application
    Filed: September 27, 2013
    Publication date: July 10, 2014
    Applicant: Tencent Technology (Shenzhen) Company Limited
    Inventor: Danhua LI
  • Patent number: 8776200
    Abstract: The present invention relates to a method for inputting a password into an electronic terminal, wherein the method comprises: a step of saving a password character string inputted by the user through an input unit in a storage unit; a step of randomly placing adjacent characters from within the password character string into adjacent input buttons—defined as any two input buttons connected in a straight line without passing another input button—which are arranged in a two-dimensional field by a control unit, wherein the total number of input buttons is greater than the number of characters included in the password character string; a step in which the control unit places a character not included in the password character string into an input button in which a character included in the password character string has not been placed; a step in which a display unit displays each input button displaying a placed character; a step in which an input unit receives the input character string from the user; and a step
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: July 8, 2014
    Inventor: JongBin Ryu
  • Patent number: 8769706
    Abstract: A system, method and computer program product for a user to verify that a network resource address is trusted. At least one entity registration is stored at a server. Each entity registration comprises an identity of an entity and entity addressing information associated with the identity of the entity. The existence of at least one entity whose identity is included in the at least one entity registration is confirmed. A query comprising a target addressing information is received from a client. If the target addressing information matches the entity addressing information, the identity of the entity associated with the entity addressing information is determined and a result comprising the identity of the entity associated with the entity addressing information matching the target addressing information is transmitted to the client. If no entity addressing information matches the target addressing information, an indication of such is transmitted to the client.
    Type: Grant
    Filed: July 26, 2007
    Date of Patent: July 1, 2014
    Assignee: International Business Machines Corporation
    Inventors: Hong Deng, Jodi E. Everdon, Colette A. Manoni, Renata Rand McFadden, Jennifer A. Thompson
  • Patent number: 8769624
    Abstract: Techniques are provided for granting authorization to restricted content on a display device from an authorizing device. In one embodiment, the display device may operate in a display mode where only unrestricted content is accessible. To access restricted content, the display device may transmit an authorization request signal to the authorizing device. The authorizing device, having received the authorization request, prompts an authorized user to enter an authentication input, such as a password or gesture, on the authorizing device. Upon verification of the authentication input, the authorizing device is authenticated. An authorization signal is transmitted to the display device, and the display device may operate in an authorized mode, having access to otherwise restricted content or functions.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: July 1, 2014
    Assignee: Apple Inc.
    Inventor: Stephen Hayden Cotterill
  • Patent number: 8769304
    Abstract: According to an embodiment of the present invention, a method for using information in conjunction with a data repository includes encrypting data associated with the information with an encryption key, sending at least the encrypted data to the data repository, and possibly deleting the information. The method also includes receiving a request for the information from a remote device, and sending a request for the encrypted data to the data repository. The method further includes receiving the encrypted data from the data repository, decrypting the encrypted data using the encryption key, and sending the information to the remote device.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: July 1, 2014
    Assignee: OneID Inc.
    Inventor: Steven Todd Kirsch
  • Publication number: 20140181529
    Abstract: The present invention includes a device and method to authenticate a user to a computer prior to the user having access to the computer or network. As user name and password protocols are nearly ubiquitous in authentication applications used today, there have been developed many nefarious techniques to defeat the security of such systems. It is relatively easy to write a computer program to guess passwords and then use those passwords to defeat security and cause harm and mischief to a computer, its users and others. To thwart such activity, the present invention provides a novel device that can be provided within a keyboard, in a computer, or in a third device having connectivity thereto. The device in conjunction with the method provides a secure password mode and a challenge/response protocol to verify that the password is entered in response to a particular request for a password.
    Type: Application
    Filed: December 20, 2013
    Publication date: June 26, 2014
    Applicant: ADVANCED BIOMETRIC CONTROLS, LLC
    Inventor: Arthur W. Joyce, III
  • Patent number: 8762697
    Abstract: A method comprises receiving user input during a boot process requesting a list of selectable boot devices to be provided from which the user can select one of the devices to boot a system. The method further comprises precluding a function from being performed, the function otherwise permitting a user to select the device to be used to boot the system.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: June 24, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Paul J. Broyles, Jeffrey P. Kenline
  • Patent number: 8763142
    Abstract: A payment processing system for accepting manually-entered payment-card numbers. Rather than entering a payment-card account number into an application module, the card number is instead captured and stored within a tokenizer prior to being sent to the application module. The tokenizer then returns a random token to the calling application as a pointer to the original payment-card number. The token has no algorithmic relationship with the original payment-card number, so that the payment-card number cannot be derived based on the token itself. Since the token is not considered cardholder data, the token may be used in an application module without the module or its connected hardware from being subject to regulatory standards compliance. Some embodiments involve browser-based schemes, and some embodiments involve PIN-entry device-based schemes.
    Type: Grant
    Filed: August 23, 2011
    Date of Patent: June 24, 2014
    Assignee: Princeton Payment Solutions
    Inventors: Kevin M. McGuire, Rush Taggart, John Alex Chapman