Credential Management Patents (Class 726/18)
  • Patent number: 12242593
    Abstract: An agent running on an IoT device of a client's network may receive a default password from a provider network and use the received default password to determine whether the password assigned to the IoT device has been changed from the default password to a different one. The agent may retrieve a salt string, a hashing algorithm, and a hashed string from a password database of the IoT device, combine the salt string with the received default password to generate a salted default password, and apply the hashing algorithm to the salted default password to generate a new hashed string. The agent may then compare the new hashed string to the hashed string retrieved from the password database. If they match, then the agent sends an indication to the provider network that the default password is still assigned to the IoT device.
    Type: Grant
    Filed: December 6, 2021
    Date of Patent: March 4, 2025
    Assignee: Amazon Technologies, Inc.
    Inventor: Eknath Venkataramani
  • Patent number: 12175098
    Abstract: According to one embodiment, a storage device includes a nonvolatile memory and a controller. The controller manages first user identification information and first authentication information including a hash value calculated from the first user identification information and a first device identification information of a first client device. The controller receives an access request to the nonvolatile memory, user identification information, and authentication information transmitted from an external device, and accepts the access request in a case where the user identification information received matches the first user identification information, and the authentication information received matches the first authentication information.
    Type: Grant
    Filed: February 27, 2023
    Date of Patent: December 24, 2024
    Assignee: Kioxia Corporation
    Inventor: Hirotomo Kobayashi
  • Patent number: 12174756
    Abstract: Embodiments of systems and methods for managing an Information Handling System (IHS) using a workspace orchestration system are described. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, upon a request to instantiate a workspace on the IHS, receive a user identity of a user of the workspace. Using the user identity of the user, the instructions may further cause the IHS to obtain, from a database, one or more policies associated with the user, and instantiate the workspace using the obtained policies. The policies identify one or more applications to be implemented in the workspace, application settings to be applied to each of the applications, or workspace settings to be applied to the workspace.
    Type: Grant
    Filed: August 1, 2023
    Date of Patent: December 24, 2024
    Assignee: Dell Products, L.P.
    Inventors: Vivek Viswanathan Iyer, Gokul Thiruchengode Vajravel, Michael S. Gatson
  • Patent number: 12153691
    Abstract: Described embodiments relate to a computer-implemented method comprising: receiving, from an authorisation server, an access credentials read request associated with a user. The access credentials read request comprises one or more access credential identifiers and one or more parameter values, wherein the one or more parameter values are derived from a current state of a set of requirements for authorising modifications to access credentials. The method further comprises traversing a first event log associated with the user to determine one or more access credential values associated with the respective one or more access credential identifiers based on the one or more parameter values and transmitting, to the authorisation server, the one or more access credential values.
    Type: Grant
    Filed: March 11, 2022
    Date of Patent: November 26, 2024
    Assignee: XERO Limited
    Inventor: Justin Thirkell
  • Patent number: 12153727
    Abstract: In various examples, the present disclosure describes methods and systems for interacting with virtual objects in an XR environment. A handheld input device including a transparent portion is held by a user while engaged in the XR environment. Camera tracking information is received from an external camera tracking system for tracking a position of the user's hand, for example, through the transparent portion of the device, and a position and orientation of the handheld input device is determined based on the camera tracking information. Touch information representative of touch inputs on a touch sensitive surface of the handheld input device may also be received. In examples, the position of the handheld input device and the touch inputs may be fed into a computing system for controlling interactions with virtual objects in the XR environment.
    Type: Grant
    Filed: June 30, 2023
    Date of Patent: November 26, 2024
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Roeland Petrus Hubertus Vertegaal, Hemant Surale
  • Patent number: 12135805
    Abstract: An information handling system may include at least one processor and a non-transitory, computer-reading medium having instructions thereon that are executable by the at least one processor for: providing access to one or more objects via a plurality of application programming interface (API) endpoints; receiving a call to a particular API endpoint from an app; and determining, based on a security identifier (SID) of the app, whether the call should be allowed; wherein the SID of the app is based on one or more custom capabilities defined in a manifest of the app.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: November 5, 2024
    Assignee: Dell Products L.P.
    Inventors: Mohit Arora, Danilo O. Tan, Zheng Yuan
  • Patent number: 12099457
    Abstract: Systems, apparatuses, and methods related to a controller for managing multiple types of memory are described. A controller includes a front end portion, a central controller portion, a back end portion, and a management unit can manage a first type of memory device that operates according to a first set of timing characteristics and a second type of memory device that operates according to a second set of timing characteristics. The central controller portion is configured to cause performance of a memory operation and comprises a cache memory to buffer data associated performance of the memory operation, a security component configured to encrypt the data before storing the data in the first type of memory device or the second type of memory device, and error correction code (ECC) circuitry to ECC encode and ECC decode the data.
    Type: Grant
    Filed: February 16, 2022
    Date of Patent: September 24, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Emanuele Confalonieri, Daniele Balluchi, Paolo Amato, Danilo Caraccio, Marco Sforzin
  • Patent number: 12101347
    Abstract: The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.
    Type: Grant
    Filed: May 8, 2023
    Date of Patent: September 24, 2024
    Assignee: GOOGLE LLC
    Inventors: Christopher B. Key, Paul E. Holzberger, Jr.
  • Patent number: 12088579
    Abstract: Systems, methods, and devices are described for secure account login and authentication. A set of key options including a correct key option and information indicative of a hash value are received from an authentication server. A user is prompted to select one of the set of key options. The key option selected by the user is received. A subset of PIN elements of a user-registered PIN to be input by the user is identified based on the hash value. The user is prompted to enter the subset of PIN elements. The subset of PIN elements entered by the user are received. An encoded PIN is generated based on the key option selected by the user and the subset of PIN elements entered by the user. The encoded PIN is transmitted to the authentication client that is configured to make an authentication decision based on the encoded PIN.
    Type: Grant
    Filed: November 29, 2021
    Date of Patent: September 10, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Prabhakaran Sethuraman
  • Patent number: 12081059
    Abstract: The disclosed system may include multiple electronic components and multiple charger battery modules. Each charger battery module may include: at least one battery configured to drive at least one of the electronic components, at least one battery charger configured to charge the battery, and a microcontroller configured to control the charging and discharging of the battery. The system may also include a central controller that may be configured to control the various charger battery modules through each charger battery module's associated microcontroller. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: January 17, 2022
    Date of Patent: September 3, 2024
    Assignee: Meta Platforms Technologies, LLC
    Inventors: Sachin Ramesh Chandra, Karthik Kadirvel, Ankur Gupta
  • Patent number: 12072969
    Abstract: A processor may receive authentication data related to inputs of a user to predetermined authentication prompts. The processor may select devices from a set of registered devices to use for providing a first password prompt to the user. The processor may identify one or more output formats for each of the selected devices. The processor may generate a first password prompt having two or more password prompt components, where each password prompt component has an output format. The processor may send the two or more password prompt components to respective selected devices.
    Type: Grant
    Filed: June 22, 2021
    Date of Patent: August 27, 2024
    Assignee: Kyndryl, Inc.
    Inventors: Archana Dixit, Amol Bhaskar Mahamuni
  • Patent number: 12019726
    Abstract: Certain aspects of the present disclosure provide techniques for improved domain adaptation in machine learning. A feature tensor is generated by processing input data using a feature extractor. A first set of logits is generated by processing the feature tensor using a domain-agnostic classifier, and a second set of logits is generated by processing the feature tensor using a domain-specific classifier. A loss is computed based at least in part on the first set of logits and the second set of logits, where the loss includes a divergence loss component. The feature extractor, the domain-agnostic classifier, and the domain-specific classifier are refined using the loss.
    Type: Grant
    Filed: March 18, 2022
    Date of Patent: June 25, 2024
    Assignee: QUALCOMM Incorporated
    Inventors: Debasmit Das, Sungrack Yun, Fatih Murat Porikli
  • Patent number: 12003498
    Abstract: In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies secured network access credentials, and the computer processor creates or modifies credentials for establishing a secured network connection. In these aspects, the computer processor generates code-based indicia that contain at least part of the secured network access credentials. In other aspects, a computer processor scans the code-based indicia and extracts the network access credentials. In these aspects, the computer processor employs the network access credentials to establish the secured network connection. In additional aspects, a network router apparatus renders the code-based indicia to an active display. In further aspects, a network router apparatus conditions grant of network access to a device on receipt from the device of an answer to a security question included in the secured network access credentials.
    Type: Grant
    Filed: February 19, 2021
    Date of Patent: June 4, 2024
    Assignee: NETGEAR, Inc.
    Inventor: Ye Zhang
  • Patent number: 12002468
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.
    Type: Grant
    Filed: May 8, 2023
    Date of Patent: June 4, 2024
    Assignee: Google LLC
    Inventor: Matthew Sharifi
  • Patent number: 12001558
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.
    Type: Grant
    Filed: April 26, 2021
    Date of Patent: June 4, 2024
    Assignee: MCAFEE, LLC
    Inventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
  • Patent number: 11930108
    Abstract: Various embodiments include systems and methods to implement a password requirement conformity check. During a password reset process, a proposed password is received. A homomorphic encryption operation may be performed on the proposed password to generate a first character string. The first character string may be compared to a previous character string associated with a previous password to determine a password similarity metric. The password similarity metric may or may not satisfy at least a distance threshold. Responsive to determining that the password similarity metric does not satisfy the distance threshold, there may be a rejection of the proposed password and a prompt to receive an alternative proposed password during the password reset process.
    Type: Grant
    Filed: February 8, 2022
    Date of Patent: March 12, 2024
    Assignee: Rapid7, Inc.
    Inventors: Roy Hodgman, Vasudha Shivamoggi
  • Patent number: 11901068
    Abstract: A method of processing blood includes receiving from a touch screen user input data for a protocol for a wash procedure. The user input data includes a numeric value. The method includes storing the protocol in a memory, receiving an identifier from a user, determining if the identifier permits the user to modify the protocol and receiving a modification of the protocol from the user. The method includes providing a plurality of authorizations, a second authorization being a default and an administrator authorization permitting the user to change a setting. The method includes comparing a password to a password stored in memory and, if there is a match, determining that the password is associated with an administrator. If a command to change the setting is received, the command is applied to change the setting. The blood is processed employing a wash procedure using the modified protocol and the changed setting.
    Type: Grant
    Filed: September 1, 2021
    Date of Patent: February 13, 2024
    Assignee: Fenwal, Inc.
    Inventors: Steven Binninger, Christopher J. Wegener, Alaina Schlinker, Bret M. Olson
  • Patent number: 11874949
    Abstract: A system for authorizing an external device to access computerized records. The system includes a server. The server includes a computerized records data-store. The computerized records data-store stores multiple computer executable files associated with subjects. The system includes a communication network which facilitates communication between at least two of the subjects, the server, and the external device. The system includes a contextual authorization device for authorizing access to the external device for the computerized records. The contextual authorization device includes a database storing a set of custom rules. The contextual authorization device further includes a Global Positioning System-based tracking device, a credentialing engine, and a user behavior analytics engine. The contextual authorization device further includes an access module to process authorization of the external device for access of the computerized records.
    Type: Grant
    Filed: February 24, 2021
    Date of Patent: January 16, 2024
    Assignee: Intellectual Frontiers LLC
    Inventor: Shahid N. Shah
  • Patent number: 11860993
    Abstract: A method of operating an electronic device includes generating scramble control codes. The scramble codes are generated by generating a random number, shifting the random number to produce a shifted random number, generating control signals by selecting different subsets of the shifted random number, and generating scramble control words by selecting different subsets of the random number based upon the control signals. The method further includes receiving a password comprised of sub-words and scrambling those sub-words according to the scramble control codes, retrieving a verification word comprised of sub-words and scrambling those sub-words according to the scramble control codes, and comparing the scrambled sub-words of the password to the scrambled sub-words of the verification word to thereby authenticate an external device that provided the password.
    Type: Grant
    Filed: August 6, 2021
    Date of Patent: January 2, 2024
    Assignee: STMicroelectronics International N.V.
    Inventor: Dhulipalla Phaneendra Kumar
  • Patent number: 11803332
    Abstract: Systems, apparatuses, and methods related to a controller for managing sideband communications are described. A controller includes a front end portion, a central controller portion, a back end portion, and a management unit can manage a first type of memory device that operates according to a first set of timing characteristics and a second type of memory device that operates according to a second set of timing characteristics. The controller can provide an additional layer of encryption or decryption for sideband communications between the host and the memory devices connected to the controller. The front end portion receives sideband communications through an interface and is stored by a cache memory within the central controller portion which also comprises an auxiliary security component to encrypt the sideband communications. The back end portion provides a route to the memory devices and the management unit applies the encryption or decryption to the sideband communication.
    Type: Grant
    Filed: March 25, 2022
    Date of Patent: October 31, 2023
    Assignee: Micron Technology, Inc.
    Inventors: Massimiliano Patriarca, Massimiliano Turconi, Angelo Alberto Rovelli
  • Patent number: 11736506
    Abstract: A monitoring apparatus includes: an acquisition unit sequentially receiving messages on a network; a first calculation unit calculating a difference between data values of two continuous messages; a second calculation unit calculating a difference between reception time points of two continuous messages; a first determination unit determining whether a received message is an abnormal message based on the difference calculated by the first calculation unit or the second calculation unit; a second determination unit determining whether a received message is a suspicious message based on the difference calculated by the first calculation unit or the second calculation unit; and a recording unit recording, when the second determination unit determines that the received message is the suspicious message, as a history, data values and reception time points of the suspicious message and a predetermined number of messages received before and after reception of the suspicious message.
    Type: Grant
    Filed: April 9, 2021
    Date of Patent: August 22, 2023
    Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHA
    Inventor: Tomokazu Moriya
  • Patent number: 11706238
    Abstract: The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.
    Type: Grant
    Filed: August 24, 2020
    Date of Patent: July 18, 2023
    Assignee: Google LLC
    Inventors: Christopher B. Key, Paul E. Holzberger, Jr.
  • Patent number: 11682396
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: June 20, 2023
    Assignee: Google LLC
    Inventor: Matthew Sharifi
  • Patent number: 11636225
    Abstract: A system and method for managing access to entity identity data are described. The system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a remote device as being associated with an entity; receive, via the communications module and from the remote device, pre-consent data identifying one or more third parties permitted to access entity identity data for the entity; store, in the memory, the pre-consent data in association with the entity; receive, via the communications module and from a digital identity network, a signal representing a request to release the entity identity data to the third party; determine, based on the pre-consent data, that the entity identity data is to be released to the third party; and initiate release of the entity identity data to a computing device associated with the third party.
    Type: Grant
    Filed: May 22, 2020
    Date of Patent: April 25, 2023
    Assignee: The Toronto-Dominion Bank
    Inventors: Milos Dunjic, David Samuel Tax, Kevin Wayne Faragher, Harjot Singh Panag
  • Patent number: 11475105
    Abstract: Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: October 18, 2022
    Assignee: RightQuestion, LLC
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 11468162
    Abstract: In accordance with some embodiments, the method includes: detecting, via the one or more input devices, a request to display information for password protected accounts; and, in response to detecting the request, concurrently displaying, on the display device: a representation of a first password protected account that is associated with a credential having one or more security issues, wherein the representation of the first password protected account is visually associated with an alert indicator indicating the one or more security issues associated with the credential of the first password protected account; and a representation of a second password protected account that is associated with a credential having one or more security issues, wherein the representation of the second password protected account is visually associated with an alert indicator indicating the one or more security issues associated with the credential of the second password protected account.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: October 11, 2022
    Assignee: APPLE INC.
    Inventors: Conrad A. Shultz, Richard J. Mondello, Reza Abbasian, Ivan Krstic, Darin Adler, Charilaos Papadopoulos, Maureen Grace Daum, Guillaume Borios, Patrick Robert Burns, Alexander David Sanciangco, Brent Michael Ledvina, Chelsea Elizabeth Pugh, Kyle Brogle, Marc J. Krochmal, Jacob Klapper, Paul Russell Knight, Connor David Graham, Shengkai Wu, I-Ting Liu, Steven Jon Falkenburg
  • Patent number: 11461501
    Abstract: A portable terminal device (1) sets a security level for each application in accordance with position, and stores the level in a memory (102). The security level determines whether each application is displayed or made executable on a display portion (114a) in locked state and unlocked state. A control unit (101) refers to the security level and determines the application displayed on the display portion (114a) in accordance with position information acquired by a position information acquisition unit (GPS reception unit) (104), and makes executable the application selected by the user. Thus, the portable terminal device (1) offers user-friendliness while ensuring security strength.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: October 4, 2022
    Assignee: Maxell, Ltd.
    Inventors: Motoyuki Suzuki, Kazuhiko Yoshizawa
  • Patent number: 11463467
    Abstract: Disclosed is a computer-implemented method for analyzing server for security vulnerabilities. The method includes selecting a first server from a plurality of servers, wherein the first sever includes a plurality of accounts. The method includes identifying, by a password vulnerability scanner, weak accounts in the plurality of accounts including a first weak account. The method includes determining, by a user risk engine, a user risk score for a user associated with the weak account. The method includes determining, by a server risk engine, a server risk score for the first server, wherein the server risk score is based on a set of server factors and a set of data factors. The method includes generating, by a smart risk scorer, an overall risk score for the first server. The method includes categorizing, based on the overall risk score of the first sever, a risk level for the first server.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: October 4, 2022
    Assignee: KYNDRYL, INC.
    Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, John Richard Feezell, Andre Luis Soares
  • Patent number: 11429722
    Abstract: An example system with a pre-OS (Operating System) environment, the pre-OS environment includes a private memory that is isolated from a processor of the system. The pre-OS environment also includes an embedded controller (EC) coupled to the private memory, where the EC includes an embedded key. The EC is to execute instructions to generate an encryption key based on the embedded key; generate a signature key; obtain data; produce an integrity-verification tag based on a hash of the obtained data, where the hash employs the signature key; encrypt the obtained data based on the encryption key; store the encrypted data in the private memory; and store the integrity-verification tag in the private memory in association with the stored encrypted data.
    Type: Grant
    Filed: January 29, 2018
    Date of Patent: August 30, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeffrey Kevin Jeansonne, Rosilet Retnamoni Braduke, Joshua Serratelli Schiffman, David Plaquin
  • Patent number: 11388194
    Abstract: An identity verification method and a verifying device, where the verifying device receives an account for requesting password reset. When the account is invalid, the verifying device sends a fake identification and a first verification request to a requesting device. The verification request mentioned requests a user to determine whether to send verification information to a first communication address. The fake identification and the first communication address are associated with the first account.
    Type: Grant
    Filed: June 11, 2020
    Date of Patent: July 12, 2022
    Assignee: HUAWEI CLOUD COMPUTING TECHNOLOGIES CO., LTD.
    Inventor: Duanhao Ou
  • Patent number: 11361068
    Abstract: Various systems and methods are provided for using dummy characters to provide enhanced security of a user's login credentials. The functionality disclosed herein provides specific steps for the creation, evaluation, storage, and use of such dummy characters in conjunction with a user's login credentials. Dummy characters can be thought of as characters that are not part of a user's actual password, but which are mixed in and around the actual characters when the password is being entered, in order to protect a user's true password from prying eyes and nefarious actors. Dummy characters can be associated with a specific user and/or a specific device or devices associated with a specific user. The functionality provided herein prevents a nefarious actor from simply repeating an entire password string (including the dummy characters) on a device that is not associated with the user whose credentials the nefarious actor is attempting to misappropriate.
    Type: Grant
    Filed: November 27, 2019
    Date of Patent: June 14, 2022
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam
  • Patent number: 11356849
    Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: June 7, 2022
    Assignee: EM MICROELECTRONIC-MARIN S.A.
    Inventors: Stéphanie Salgado, Julian Guilloux
  • Patent number: 11251960
    Abstract: Techniques for providing a server-based Wi-Fi Protected Setup (WPS) PIN procedure are described. In an example, a computing device generates a PIN associated with a WPS-PIN procedure. The computing device encrypts the PIN to generate an encrypted PIN based on a public key associated with a server. Further, the computing device sends, to another computing device that is communicatively coupled with the server via an access point, a WPS probe request that includes the encrypted PIN. Based on the WPS probe request, the computing device receives, from at least one of the other computing devices or the server, a credential associated with the access point. The computing devices connects to the access point based on the credential.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: February 15, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: QingYun Wei, Andrew Roths, James Edwin Christy
  • Patent number: 11252562
    Abstract: The invention relates to a method for securing a command to be applied to a motor vehicle, characterized in that said method comprises: a first step of generating first data, via a vehicle electronic control unit; a second step of sending said first data to a mobile terminal comprising a screen, via the electronic control unit; a third step of displaying the first data on the screen of the mobile terminal; a fourth step in which a human user processes the first data in order to obtain second data; a fifth step of sending the second data to the electronic control unit via the mobile terminal; a sixth step of comparing said second data to a key of the first data, via the electronic control unit; if the second data is validated by the key of the first data, a seventh step of activating the motor vehicle via the electronic control unit, in order to implement at least part of the control.
    Type: Grant
    Filed: June 25, 2014
    Date of Patent: February 15, 2022
    Assignee: VALEO SECURITE HABITACLE
    Inventors: Eric Menard, Frédéric Gehin, Fabienne Masson
  • Patent number: 11210431
    Abstract: In some examples, a computing device may determine, based on sensor data, that the computing device is in a public environment. In response, the computing device may display an entry wheel to enable a user to enter a password. The entry wheel may include multiple input symbols arranged equidistant around a circle. In some cases, one or more geometric patterns linking a portion of the input symbols may be displayed. After receiving an individual character of the password, the computing device may display the entry wheel rotated a number of positions in either a clockwise or counter-clockwise direction and display zero or more of the geometric patterns. After all the characters of the password have been received, the computing device may determine if the password matches a previously stored password. If the password matches, the computing device may transition from a low power state to an active state.
    Type: Grant
    Filed: June 7, 2019
    Date of Patent: December 28, 2021
    Assignee: Dell Products L.P.
    Inventors: Sathish Kumar Bikumala, Parminder Singh Sethi, Lakshmi Saroja Nalam, Sean Creedon
  • Patent number: 11195170
    Abstract: a user profile of behavior of a specific user is generated, including obtaining a plurality of dummy user profiles. An initial behavioral dataset relating to the behavior of the specific user during a specific transaction is collected, and compared to each of the plurality of dummy user profiles. When the initial behavioral dataset matches at least one of the plurality of dummy user profiles, the method further includes initiating a new user profile of the specific user to be equivalent to the at least a portion of at least one of the plurality of dummy user profiles, and further training the new user profile based on the initial behavioral dataset, to modify the new user profile to more accurately reflect behavior of the specific user.
    Type: Grant
    Filed: May 31, 2021
    Date of Patent: December 7, 2021
    Assignee: BEHAVIOSEC INC
    Inventors: Tony Libell, Jorge Diez Ferreras
  • Patent number: 11188633
    Abstract: A password authentication device includes a display control unit that displays plurality of input key groups, an input operation unit operated by a user to select a soft key on the display screen to enable the input of a password, a sight line detection sensor that detects the direction of the line of sight of a user who operates the input operation unit, an operation target specifying part that specifies an input key group located at the end of the line of sight of the user among the plurality of input key groups, based on the direction of the line of sight detected by the sight line detection sensor, and a password acquisition part assumes an operation in the input operation unit as an operation for the input key group specified by the operation target specifying part and acquires a password inputted through the input operation unit.
    Type: Grant
    Filed: June 19, 2019
    Date of Patent: November 30, 2021
    Assignee: KYOCERA DOCUMENT SOLUTIONS INC.
    Inventor: Toru Michigami
  • Patent number: 11184353
    Abstract: The embodiments set forth systems and techniques to authenticate a user device for device services, such as by transferring or extending a trusted device status from a separate and trusted associated user device, which can be paired with the user device. This can be done automatically without requiring the user to sign in at or on behalf of the user device, and the automated process can include verifying a trusted status for the associated user device, receiving data items from both devices, evaluating the data items, and facilitating an authentication of the user device when the evaluating returns a favorable result. Data items can include provisioned machine identifiers, temporally limited one-time user passwords, and a provisioned password reset key. Authentication or trusted device status transfer can be achieved by way of an authentication token that is given to the user device.
    Type: Grant
    Filed: February 20, 2019
    Date of Patent: November 23, 2021
    Assignee: Apple Inc.
    Inventors: James C. Wilson, Lestat Ali, Aniwat Arromratana
  • Patent number: 11182784
    Abstract: Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: November 23, 2021
    Assignee: CAPITAL ONE SERVICES, LLC
    Inventors: Kaitlin Newman, Kimberly Haynes, Charles Nathan Crank, Andrew Cogswell, Colin Hart, Jeffrey Rule, Lara Mossler, Latika Gulati, Abdelkader Benkreira, Sarah Jane Cunningham, Sophie Bermudez, Michael Mossoba, Wayne Lutz
  • Patent number: 11151245
    Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: October 19, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Lei Liu, Ning Ge, Steven J. Simske, Helen A. Holder
  • Patent number: 11144629
    Abstract: Systems and methods for multi-factor authentication using graphical passwords. An access request that includes an identifier and which identifies a protected resource is received from a client device. An interface is generated having a plurality of graphical objects for presentation at random locations on a display of the client device as defined by an object map. The plurality of graphical objects include a null object and a set of user-defined objects associated with the identifier that define a graphical password. Input data including an input event for each detected interaction with the interface is received. Each input event identifies a position on the display at which a corresponding interaction was detected. Using the object map, it is determined that the input data satisfies the graphical password. Access to the protected resource is granted in response to determining that the input data satisfies the graphical password.
    Type: Grant
    Filed: October 15, 2019
    Date of Patent: October 12, 2021
    Assignee: AMADEUS S.A.S.
    Inventors: Mohamed-Amine Maaroufi, Florent Maupay
  • Patent number: 11140169
    Abstract: A system includes an interface, a tenant authentication processor, and an application routing processor. The interface is configured to receive a first request for access. The tenant authentication processor is configured to provide a tenant token request to a tenant process associated with the first request; receive a tenant token from the tenant process; determine a signed tenant token based on the tenant token and a key; and provide the signed tenant token for access to an application routing platform. The application routing processor of the application routing platform is configured to receive an API call comprising the signed tenant token; determine that the signed tenant token is valid; determine an application platform token; determine routing information to an application platform based on the API call; and provide the application platform the API call and the application platform token using the routing information to gain access to the application platform.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: October 5, 2021
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Dylan Owen, Jonathan David Ruggiero
  • Patent number: 11134382
    Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: September 28, 2021
    Assignee: EM Microelectronic-Marin SA
    Inventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
  • Patent number: 11120123
    Abstract: In accordance with some embodiments, a method is performed at an electronic device with a display device and one or more input devices. The method includes displaying, via the display device, a user interface that includes a new-password field. The method includes detecting, via the one or more input devices, a user input that corresponds to selection of the new-password field. In response to detecting the user input that corresponds to selection of the new-password field, the method includes displaying, on the display device, a representation of a new automatically-generated password in the new-password field and displaying, on the display device, an affordance to accept the new automatically-generated password and an affordance to decline to use the new automatically-generated password.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: September 14, 2021
    Assignee: Apple Inc.
    Inventors: Conrad A. Shultz, Richard J. Mondello, Reza Abbasian, Ivan Krstic, Darin Adler, Charilaos Papadopoulos, Maureen Grace Daum, Guillaume Borios, Patrick Robert Burns, Alexander David Sanciangco, Brent Michael Ledvina, Chelsea Elizabeth Pugh, Kyle Brogle, Marc J. Krochmal, Jacob Klapper, Paul Russell Knight, Connor David Graham, Shengkai Wu, I-Ting Liu, Steven Jon Falkenburg
  • Patent number: 11119648
    Abstract: A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chris R. Bean, Stephen R. F. Head, Sophie D. Green, Madeleine R. Neil Smith
  • Patent number: 11106352
    Abstract: While displaying the wake screen user interface, in response to detecting a first input that is directed to a portion of the wake screen user interface: if the first input includes first movement in a first direction, the computer system displays of a home screen user interface; and the first movement is in a second direction, the computer system displays a widget screen user interface that is different from the wake screen user interface and the home screen user interface, wherein the widget screen user interface includes a plurality of user interface objects corresponding to different applications, wherein a respective user interface object of the plurality of user interface objects contains application content from an application corresponding to the respective user interface object, and when selected, causes display of an application corresponding to the respective user interface object.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: August 31, 2021
    Assignee: APPLE INC.
    Inventor: William M. Tyler
  • Patent number: 11102200
    Abstract: In general, the techniques of this disclosure describe a computing device that is configured to verify an identity of a user based on authentication factors received from multiple authentication devices. The computing device, which may be configured to operate as a server device, may receive an authentication factor from at least three authentication devices in a group of three or more authentication devices via a guard device. The computing device may determine a probability that the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. If the probability exceeds a threshold authentication probability, the computing device may send an authentication confirmation to a client device.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: August 24, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Benjamin L. Burnett, Ranga Ramanujan
  • Patent number: 11089012
    Abstract: A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: August 10, 2021
    Assignee: ASSA ABLOY AB
    Inventors: Masha Leah Davis, Mark Robinton, Peter F. Klammer
  • Patent number: 11082418
    Abstract: A system, method, apparatus, and computer program product for a privacy ensured brokered identity federation system. The privacy ensured brokered identity federation system connects a user in a brokered identity federation environment that blinds relying parties (RP) from credential service providers (CSP), blinds CSPs from RPs, and blinds a user's identity and data from the federation middleware hubs. The system utilizes ring signatures to attest to CSPs that a valid RP of the federation is making a request. The process utilizes CSP ring signatures to assure RPs that a valid CSP of the federation has provided a response. The process utilizes per transaction encryption keys created by the RP to ensure the federation has no access to data messages. It can further ensure that only the correct RP can decrypt a CSP response.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: August 3, 2021
    Assignee: Avalanche Cloud Corporation
    Inventors: Mark A. Nelson, George S. Rathbun, Scott Kern
  • Patent number: RE48707
    Abstract: A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic engine. The display element array includes one or more segments, and the driver outputs are configured to drive the one or more segments, respectively. The host controller is configured to send commands and data to the driver controller via the communication interface and the cryptographic engine is configured to encrypt communication data between the display element array and the host controller.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: August 24, 2021
    Assignee: BBPOS LIMITED
    Inventors: Chi Wah Lo, Hwai Sian Tsai