Credential Management Patents (Class 726/18)
-
Patent number: 12242593Abstract: An agent running on an IoT device of a client's network may receive a default password from a provider network and use the received default password to determine whether the password assigned to the IoT device has been changed from the default password to a different one. The agent may retrieve a salt string, a hashing algorithm, and a hashed string from a password database of the IoT device, combine the salt string with the received default password to generate a salted default password, and apply the hashing algorithm to the salted default password to generate a new hashed string. The agent may then compare the new hashed string to the hashed string retrieved from the password database. If they match, then the agent sends an indication to the provider network that the default password is still assigned to the IoT device.Type: GrantFiled: December 6, 2021Date of Patent: March 4, 2025Assignee: Amazon Technologies, Inc.Inventor: Eknath Venkataramani
-
Patent number: 12175098Abstract: According to one embodiment, a storage device includes a nonvolatile memory and a controller. The controller manages first user identification information and first authentication information including a hash value calculated from the first user identification information and a first device identification information of a first client device. The controller receives an access request to the nonvolatile memory, user identification information, and authentication information transmitted from an external device, and accepts the access request in a case where the user identification information received matches the first user identification information, and the authentication information received matches the first authentication information.Type: GrantFiled: February 27, 2023Date of Patent: December 24, 2024Assignee: Kioxia CorporationInventor: Hirotomo Kobayashi
-
Patent number: 12174756Abstract: Embodiments of systems and methods for managing an Information Handling System (IHS) using a workspace orchestration system are described. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to, upon a request to instantiate a workspace on the IHS, receive a user identity of a user of the workspace. Using the user identity of the user, the instructions may further cause the IHS to obtain, from a database, one or more policies associated with the user, and instantiate the workspace using the obtained policies. The policies identify one or more applications to be implemented in the workspace, application settings to be applied to each of the applications, or workspace settings to be applied to the workspace.Type: GrantFiled: August 1, 2023Date of Patent: December 24, 2024Assignee: Dell Products, L.P.Inventors: Vivek Viswanathan Iyer, Gokul Thiruchengode Vajravel, Michael S. Gatson
-
Patent number: 12153691Abstract: Described embodiments relate to a computer-implemented method comprising: receiving, from an authorisation server, an access credentials read request associated with a user. The access credentials read request comprises one or more access credential identifiers and one or more parameter values, wherein the one or more parameter values are derived from a current state of a set of requirements for authorising modifications to access credentials. The method further comprises traversing a first event log associated with the user to determine one or more access credential values associated with the respective one or more access credential identifiers based on the one or more parameter values and transmitting, to the authorisation server, the one or more access credential values.Type: GrantFiled: March 11, 2022Date of Patent: November 26, 2024Assignee: XERO LimitedInventor: Justin Thirkell
-
Patent number: 12153727Abstract: In various examples, the present disclosure describes methods and systems for interacting with virtual objects in an XR environment. A handheld input device including a transparent portion is held by a user while engaged in the XR environment. Camera tracking information is received from an external camera tracking system for tracking a position of the user's hand, for example, through the transparent portion of the device, and a position and orientation of the handheld input device is determined based on the camera tracking information. Touch information representative of touch inputs on a touch sensitive surface of the handheld input device may also be received. In examples, the position of the handheld input device and the touch inputs may be fed into a computing system for controlling interactions with virtual objects in the XR environment.Type: GrantFiled: June 30, 2023Date of Patent: November 26, 2024Assignee: HUAWEI TECHNOLOGIES CO., LTD.Inventors: Roeland Petrus Hubertus Vertegaal, Hemant Surale
-
Patent number: 12135805Abstract: An information handling system may include at least one processor and a non-transitory, computer-reading medium having instructions thereon that are executable by the at least one processor for: providing access to one or more objects via a plurality of application programming interface (API) endpoints; receiving a call to a particular API endpoint from an app; and determining, based on a security identifier (SID) of the app, whether the call should be allowed; wherein the SID of the app is based on one or more custom capabilities defined in a manifest of the app.Type: GrantFiled: July 23, 2021Date of Patent: November 5, 2024Assignee: Dell Products L.P.Inventors: Mohit Arora, Danilo O. Tan, Zheng Yuan
-
Patent number: 12099457Abstract: Systems, apparatuses, and methods related to a controller for managing multiple types of memory are described. A controller includes a front end portion, a central controller portion, a back end portion, and a management unit can manage a first type of memory device that operates according to a first set of timing characteristics and a second type of memory device that operates according to a second set of timing characteristics. The central controller portion is configured to cause performance of a memory operation and comprises a cache memory to buffer data associated performance of the memory operation, a security component configured to encrypt the data before storing the data in the first type of memory device or the second type of memory device, and error correction code (ECC) circuitry to ECC encode and ECC decode the data.Type: GrantFiled: February 16, 2022Date of Patent: September 24, 2024Assignee: Micron Technology, Inc.Inventors: Emanuele Confalonieri, Daniele Balluchi, Paolo Amato, Danilo Caraccio, Marco Sforzin
-
Patent number: 12101347Abstract: The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.Type: GrantFiled: May 8, 2023Date of Patent: September 24, 2024Assignee: GOOGLE LLCInventors: Christopher B. Key, Paul E. Holzberger, Jr.
-
Patent number: 12088579Abstract: Systems, methods, and devices are described for secure account login and authentication. A set of key options including a correct key option and information indicative of a hash value are received from an authentication server. A user is prompted to select one of the set of key options. The key option selected by the user is received. A subset of PIN elements of a user-registered PIN to be input by the user is identified based on the hash value. The user is prompted to enter the subset of PIN elements. The subset of PIN elements entered by the user are received. An encoded PIN is generated based on the key option selected by the user and the subset of PIN elements entered by the user. The encoded PIN is transmitted to the authentication client that is configured to make an authentication decision based on the encoded PIN.Type: GrantFiled: November 29, 2021Date of Patent: September 10, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Prabhakaran Sethuraman
-
Patent number: 12081059Abstract: The disclosed system may include multiple electronic components and multiple charger battery modules. Each charger battery module may include: at least one battery configured to drive at least one of the electronic components, at least one battery charger configured to charge the battery, and a microcontroller configured to control the charging and discharging of the battery. The system may also include a central controller that may be configured to control the various charger battery modules through each charger battery module's associated microcontroller. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: January 17, 2022Date of Patent: September 3, 2024Assignee: Meta Platforms Technologies, LLCInventors: Sachin Ramesh Chandra, Karthik Kadirvel, Ankur Gupta
-
Patent number: 12072969Abstract: A processor may receive authentication data related to inputs of a user to predetermined authentication prompts. The processor may select devices from a set of registered devices to use for providing a first password prompt to the user. The processor may identify one or more output formats for each of the selected devices. The processor may generate a first password prompt having two or more password prompt components, where each password prompt component has an output format. The processor may send the two or more password prompt components to respective selected devices.Type: GrantFiled: June 22, 2021Date of Patent: August 27, 2024Assignee: Kyndryl, Inc.Inventors: Archana Dixit, Amol Bhaskar Mahamuni
-
Patent number: 12019726Abstract: Certain aspects of the present disclosure provide techniques for improved domain adaptation in machine learning. A feature tensor is generated by processing input data using a feature extractor. A first set of logits is generated by processing the feature tensor using a domain-agnostic classifier, and a second set of logits is generated by processing the feature tensor using a domain-specific classifier. A loss is computed based at least in part on the first set of logits and the second set of logits, where the loss includes a divergence loss component. The feature extractor, the domain-agnostic classifier, and the domain-specific classifier are refined using the loss.Type: GrantFiled: March 18, 2022Date of Patent: June 25, 2024Assignee: QUALCOMM IncorporatedInventors: Debasmit Das, Sungrack Yun, Fatih Murat Porikli
-
Patent number: 12003498Abstract: In various aspects, code-based indicia contain secured network access credentials. In some aspects, a computer processor receives user input that specifies secured network access credentials, and the computer processor creates or modifies credentials for establishing a secured network connection. In these aspects, the computer processor generates code-based indicia that contain at least part of the secured network access credentials. In other aspects, a computer processor scans the code-based indicia and extracts the network access credentials. In these aspects, the computer processor employs the network access credentials to establish the secured network connection. In additional aspects, a network router apparatus renders the code-based indicia to an active display. In further aspects, a network router apparatus conditions grant of network access to a device on receipt from the device of an answer to a security question included in the secured network access credentials.Type: GrantFiled: February 19, 2021Date of Patent: June 4, 2024Assignee: NETGEAR, Inc.Inventor: Ye Zhang
-
Patent number: 12002468Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.Type: GrantFiled: May 8, 2023Date of Patent: June 4, 2024Assignee: Google LLCInventor: Matthew Sharifi
-
Patent number: 12001558Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to verify application permission safety.Type: GrantFiled: April 26, 2021Date of Patent: June 4, 2024Assignee: MCAFEE, LLCInventors: Dattatraya Kulkarni, Himanshu Srivastava, Raj Vardhan, Raja Sinha, Srikanth Nalluri, Tirumaleswar Reddy Konda
-
Patent number: 11930108Abstract: Various embodiments include systems and methods to implement a password requirement conformity check. During a password reset process, a proposed password is received. A homomorphic encryption operation may be performed on the proposed password to generate a first character string. The first character string may be compared to a previous character string associated with a previous password to determine a password similarity metric. The password similarity metric may or may not satisfy at least a distance threshold. Responsive to determining that the password similarity metric does not satisfy the distance threshold, there may be a rejection of the proposed password and a prompt to receive an alternative proposed password during the password reset process.Type: GrantFiled: February 8, 2022Date of Patent: March 12, 2024Assignee: Rapid7, Inc.Inventors: Roy Hodgman, Vasudha Shivamoggi
-
Patent number: 11901068Abstract: A method of processing blood includes receiving from a touch screen user input data for a protocol for a wash procedure. The user input data includes a numeric value. The method includes storing the protocol in a memory, receiving an identifier from a user, determining if the identifier permits the user to modify the protocol and receiving a modification of the protocol from the user. The method includes providing a plurality of authorizations, a second authorization being a default and an administrator authorization permitting the user to change a setting. The method includes comparing a password to a password stored in memory and, if there is a match, determining that the password is associated with an administrator. If a command to change the setting is received, the command is applied to change the setting. The blood is processed employing a wash procedure using the modified protocol and the changed setting.Type: GrantFiled: September 1, 2021Date of Patent: February 13, 2024Assignee: Fenwal, Inc.Inventors: Steven Binninger, Christopher J. Wegener, Alaina Schlinker, Bret M. Olson
-
Patent number: 11874949Abstract: A system for authorizing an external device to access computerized records. The system includes a server. The server includes a computerized records data-store. The computerized records data-store stores multiple computer executable files associated with subjects. The system includes a communication network which facilitates communication between at least two of the subjects, the server, and the external device. The system includes a contextual authorization device for authorizing access to the external device for the computerized records. The contextual authorization device includes a database storing a set of custom rules. The contextual authorization device further includes a Global Positioning System-based tracking device, a credentialing engine, and a user behavior analytics engine. The contextual authorization device further includes an access module to process authorization of the external device for access of the computerized records.Type: GrantFiled: February 24, 2021Date of Patent: January 16, 2024Assignee: Intellectual Frontiers LLCInventor: Shahid N. Shah
-
Patent number: 11860993Abstract: A method of operating an electronic device includes generating scramble control codes. The scramble codes are generated by generating a random number, shifting the random number to produce a shifted random number, generating control signals by selecting different subsets of the shifted random number, and generating scramble control words by selecting different subsets of the random number based upon the control signals. The method further includes receiving a password comprised of sub-words and scrambling those sub-words according to the scramble control codes, retrieving a verification word comprised of sub-words and scrambling those sub-words according to the scramble control codes, and comparing the scrambled sub-words of the password to the scrambled sub-words of the verification word to thereby authenticate an external device that provided the password.Type: GrantFiled: August 6, 2021Date of Patent: January 2, 2024Assignee: STMicroelectronics International N.V.Inventor: Dhulipalla Phaneendra Kumar
-
Patent number: 11803332Abstract: Systems, apparatuses, and methods related to a controller for managing sideband communications are described. A controller includes a front end portion, a central controller portion, a back end portion, and a management unit can manage a first type of memory device that operates according to a first set of timing characteristics and a second type of memory device that operates according to a second set of timing characteristics. The controller can provide an additional layer of encryption or decryption for sideband communications between the host and the memory devices connected to the controller. The front end portion receives sideband communications through an interface and is stored by a cache memory within the central controller portion which also comprises an auxiliary security component to encrypt the sideband communications. The back end portion provides a route to the memory devices and the management unit applies the encryption or decryption to the sideband communication.Type: GrantFiled: March 25, 2022Date of Patent: October 31, 2023Assignee: Micron Technology, Inc.Inventors: Massimiliano Patriarca, Massimiliano Turconi, Angelo Alberto Rovelli
-
Patent number: 11736506Abstract: A monitoring apparatus includes: an acquisition unit sequentially receiving messages on a network; a first calculation unit calculating a difference between data values of two continuous messages; a second calculation unit calculating a difference between reception time points of two continuous messages; a first determination unit determining whether a received message is an abnormal message based on the difference calculated by the first calculation unit or the second calculation unit; a second determination unit determining whether a received message is a suspicious message based on the difference calculated by the first calculation unit or the second calculation unit; and a recording unit recording, when the second determination unit determines that the received message is the suspicious message, as a history, data values and reception time points of the suspicious message and a predetermined number of messages received before and after reception of the suspicious message.Type: GrantFiled: April 9, 2021Date of Patent: August 22, 2023Assignee: TOYOTA JIDOSHA KABUSHIKI KAISHAInventor: Tomokazu Moriya
-
Patent number: 11706238Abstract: The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.Type: GrantFiled: August 24, 2020Date of Patent: July 18, 2023Assignee: Google LLCInventors: Christopher B. Key, Paul E. Holzberger, Jr.
-
Patent number: 11682396Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.Type: GrantFiled: June 21, 2021Date of Patent: June 20, 2023Assignee: Google LLCInventor: Matthew Sharifi
-
Patent number: 11636225Abstract: A system and method for managing access to entity identity data are described. The system comprises a communications module; a processor coupled with the communications module; and a memory coupled to the processor and storing processor-executable instructions which, when executed by the processor, configure the processor to authenticate a remote device as being associated with an entity; receive, via the communications module and from the remote device, pre-consent data identifying one or more third parties permitted to access entity identity data for the entity; store, in the memory, the pre-consent data in association with the entity; receive, via the communications module and from a digital identity network, a signal representing a request to release the entity identity data to the third party; determine, based on the pre-consent data, that the entity identity data is to be released to the third party; and initiate release of the entity identity data to a computing device associated with the third party.Type: GrantFiled: May 22, 2020Date of Patent: April 25, 2023Assignee: The Toronto-Dominion BankInventors: Milos Dunjic, David Samuel Tax, Kevin Wayne Faragher, Harjot Singh Panag
-
Patent number: 11475105Abstract: Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.Type: GrantFiled: December 15, 2020Date of Patent: October 18, 2022Assignee: RightQuestion, LLCInventor: Bjorn Markus Jakobsson
-
Patent number: 11468162Abstract: In accordance with some embodiments, the method includes: detecting, via the one or more input devices, a request to display information for password protected accounts; and, in response to detecting the request, concurrently displaying, on the display device: a representation of a first password protected account that is associated with a credential having one or more security issues, wherein the representation of the first password protected account is visually associated with an alert indicator indicating the one or more security issues associated with the credential of the first password protected account; and a representation of a second password protected account that is associated with a credential having one or more security issues, wherein the representation of the second password protected account is visually associated with an alert indicator indicating the one or more security issues associated with the credential of the second password protected account.Type: GrantFiled: November 7, 2019Date of Patent: October 11, 2022Assignee: APPLE INC.Inventors: Conrad A. Shultz, Richard J. Mondello, Reza Abbasian, Ivan Krstic, Darin Adler, Charilaos Papadopoulos, Maureen Grace Daum, Guillaume Borios, Patrick Robert Burns, Alexander David Sanciangco, Brent Michael Ledvina, Chelsea Elizabeth Pugh, Kyle Brogle, Marc J. Krochmal, Jacob Klapper, Paul Russell Knight, Connor David Graham, Shengkai Wu, I-Ting Liu, Steven Jon Falkenburg
-
Patent number: 11461501Abstract: A portable terminal device (1) sets a security level for each application in accordance with position, and stores the level in a memory (102). The security level determines whether each application is displayed or made executable on a display portion (114a) in locked state and unlocked state. A control unit (101) refers to the security level and determines the application displayed on the display portion (114a) in accordance with position information acquired by a position information acquisition unit (GPS reception unit) (104), and makes executable the application selected by the user. Thus, the portable terminal device (1) offers user-friendliness while ensuring security strength.Type: GrantFiled: July 2, 2020Date of Patent: October 4, 2022Assignee: Maxell, Ltd.Inventors: Motoyuki Suzuki, Kazuhiko Yoshizawa
-
Patent number: 11463467Abstract: Disclosed is a computer-implemented method for analyzing server for security vulnerabilities. The method includes selecting a first server from a plurality of servers, wherein the first sever includes a plurality of accounts. The method includes identifying, by a password vulnerability scanner, weak accounts in the plurality of accounts including a first weak account. The method includes determining, by a user risk engine, a user risk score for a user associated with the weak account. The method includes determining, by a server risk engine, a server risk score for the first server, wherein the server risk score is based on a set of server factors and a set of data factors. The method includes generating, by a smart risk scorer, an overall risk score for the first server. The method includes categorizing, based on the overall risk score of the first sever, a risk level for the first server.Type: GrantFiled: January 9, 2020Date of Patent: October 4, 2022Assignee: KYNDRYL, INC.Inventors: Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, John Richard Feezell, Andre Luis Soares
-
Patent number: 11429722Abstract: An example system with a pre-OS (Operating System) environment, the pre-OS environment includes a private memory that is isolated from a processor of the system. The pre-OS environment also includes an embedded controller (EC) coupled to the private memory, where the EC includes an embedded key. The EC is to execute instructions to generate an encryption key based on the embedded key; generate a signature key; obtain data; produce an integrity-verification tag based on a hash of the obtained data, where the hash employs the signature key; encrypt the obtained data based on the encryption key; store the encrypted data in the private memory; and store the integrity-verification tag in the private memory in association with the stored encrypted data.Type: GrantFiled: January 29, 2018Date of Patent: August 30, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jeffrey Kevin Jeansonne, Rosilet Retnamoni Braduke, Joshua Serratelli Schiffman, David Plaquin
-
Patent number: 11388194Abstract: An identity verification method and a verifying device, where the verifying device receives an account for requesting password reset. When the account is invalid, the verifying device sends a fake identification and a first verification request to a requesting device. The verification request mentioned requests a user to determine whether to send verification information to a first communication address. The fake identification and the first communication address are associated with the first account.Type: GrantFiled: June 11, 2020Date of Patent: July 12, 2022Assignee: HUAWEI CLOUD COMPUTING TECHNOLOGIES CO., LTD.Inventor: Duanhao Ou
-
Patent number: 11361068Abstract: Various systems and methods are provided for using dummy characters to provide enhanced security of a user's login credentials. The functionality disclosed herein provides specific steps for the creation, evaluation, storage, and use of such dummy characters in conjunction with a user's login credentials. Dummy characters can be thought of as characters that are not part of a user's actual password, but which are mixed in and around the actual characters when the password is being entered, in order to protect a user's true password from prying eyes and nefarious actors. Dummy characters can be associated with a specific user and/or a specific device or devices associated with a specific user. The functionality provided herein prevents a nefarious actor from simply repeating an entire password string (including the dummy characters) on a device that is not associated with the user whose credentials the nefarious actor is attempting to misappropriate.Type: GrantFiled: November 27, 2019Date of Patent: June 14, 2022Assignee: Dell Products L.P.Inventors: Parminder Singh Sethi, Lakshmi Saroja Nalam
-
Patent number: 11356849Abstract: A method of authenticating a transponder communicating with a server, including: calculating a one-time password in the transponder with a dedicated algorithm, on the basis of the state of a counter and a physical quantity, such as a transmission delay determined in the transponder during reading by a reading device; transmitting the password to the server by the reading device, which determines a transmission delay of the transponder, and transmitting to the server, in addition to the password, the information about the transmission delay determined in the reading device; decrypting by the dedicated algorithm the password, and checking if the decrypted transmission delay of the received password corresponds to the transmission delay determined by the reading device within a determined temporal margin, and if the state of the counter is different from a received previous state of the counter so as to authenticate the transponder.Type: GrantFiled: November 19, 2019Date of Patent: June 7, 2022Assignee: EM MICROELECTRONIC-MARIN S.A.Inventors: Stéphanie Salgado, Julian Guilloux
-
Patent number: 11251960Abstract: Techniques for providing a server-based Wi-Fi Protected Setup (WPS) PIN procedure are described. In an example, a computing device generates a PIN associated with a WPS-PIN procedure. The computing device encrypts the PIN to generate an encrypted PIN based on a public key associated with a server. Further, the computing device sends, to another computing device that is communicatively coupled with the server via an access point, a WPS probe request that includes the encrypted PIN. Based on the WPS probe request, the computing device receives, from at least one of the other computing devices or the server, a credential associated with the access point. The computing devices connects to the access point based on the credential.Type: GrantFiled: October 19, 2018Date of Patent: February 15, 2022Assignee: Amazon Technologies, Inc.Inventors: QingYun Wei, Andrew Roths, James Edwin Christy
-
Patent number: 11252562Abstract: The invention relates to a method for securing a command to be applied to a motor vehicle, characterized in that said method comprises: a first step of generating first data, via a vehicle electronic control unit; a second step of sending said first data to a mobile terminal comprising a screen, via the electronic control unit; a third step of displaying the first data on the screen of the mobile terminal; a fourth step in which a human user processes the first data in order to obtain second data; a fifth step of sending the second data to the electronic control unit via the mobile terminal; a sixth step of comparing said second data to a key of the first data, via the electronic control unit; if the second data is validated by the key of the first data, a seventh step of activating the motor vehicle via the electronic control unit, in order to implement at least part of the control.Type: GrantFiled: June 25, 2014Date of Patent: February 15, 2022Assignee: VALEO SECURITE HABITACLEInventors: Eric Menard, Frédéric Gehin, Fabienne Masson
-
Patent number: 11210431Abstract: In some examples, a computing device may determine, based on sensor data, that the computing device is in a public environment. In response, the computing device may display an entry wheel to enable a user to enter a password. The entry wheel may include multiple input symbols arranged equidistant around a circle. In some cases, one or more geometric patterns linking a portion of the input symbols may be displayed. After receiving an individual character of the password, the computing device may display the entry wheel rotated a number of positions in either a clockwise or counter-clockwise direction and display zero or more of the geometric patterns. After all the characters of the password have been received, the computing device may determine if the password matches a previously stored password. If the password matches, the computing device may transition from a low power state to an active state.Type: GrantFiled: June 7, 2019Date of Patent: December 28, 2021Assignee: Dell Products L.P.Inventors: Sathish Kumar Bikumala, Parminder Singh Sethi, Lakshmi Saroja Nalam, Sean Creedon
-
Patent number: 11195170Abstract: a user profile of behavior of a specific user is generated, including obtaining a plurality of dummy user profiles. An initial behavioral dataset relating to the behavior of the specific user during a specific transaction is collected, and compared to each of the plurality of dummy user profiles. When the initial behavioral dataset matches at least one of the plurality of dummy user profiles, the method further includes initiating a new user profile of the specific user to be equivalent to the at least a portion of at least one of the plurality of dummy user profiles, and further training the new user profile based on the initial behavioral dataset, to modify the new user profile to more accurately reflect behavior of the specific user.Type: GrantFiled: May 31, 2021Date of Patent: December 7, 2021Assignee: BEHAVIOSEC INCInventors: Tony Libell, Jorge Diez Ferreras
-
Patent number: 11188633Abstract: A password authentication device includes a display control unit that displays plurality of input key groups, an input operation unit operated by a user to select a soft key on the display screen to enable the input of a password, a sight line detection sensor that detects the direction of the line of sight of a user who operates the input operation unit, an operation target specifying part that specifies an input key group located at the end of the line of sight of the user among the plurality of input key groups, based on the direction of the line of sight detected by the sight line detection sensor, and a password acquisition part assumes an operation in the input operation unit as an operation for the input key group specified by the operation target specifying part and acquires a password inputted through the input operation unit.Type: GrantFiled: June 19, 2019Date of Patent: November 30, 2021Assignee: KYOCERA DOCUMENT SOLUTIONS INC.Inventor: Toru Michigami
-
Patent number: 11184353Abstract: The embodiments set forth systems and techniques to authenticate a user device for device services, such as by transferring or extending a trusted device status from a separate and trusted associated user device, which can be paired with the user device. This can be done automatically without requiring the user to sign in at or on behalf of the user device, and the automated process can include verifying a trusted status for the associated user device, receiving data items from both devices, evaluating the data items, and facilitating an authentication of the user device when the evaluating returns a favorable result. Data items can include provisioned machine identifiers, temporally limited one-time user passwords, and a provisioned password reset key. Authentication or trusted device status transfer can be achieved by way of an authentication token that is given to the user device.Type: GrantFiled: February 20, 2019Date of Patent: November 23, 2021Assignee: Apple Inc.Inventors: James C. Wilson, Lestat Ali, Aniwat Arromratana
-
Patent number: 11182784Abstract: Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.Type: GrantFiled: October 21, 2019Date of Patent: November 23, 2021Assignee: CAPITAL ONE SERVICES, LLCInventors: Kaitlin Newman, Kimberly Haynes, Charles Nathan Crank, Andrew Cogswell, Colin Hart, Jeffrey Rule, Lara Mossler, Latika Gulati, Abdelkader Benkreira, Sarah Jane Cunningham, Sophie Bermudez, Michael Mossoba, Wayne Lutz
-
Patent number: 11151245Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.Type: GrantFiled: September 9, 2016Date of Patent: October 19, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Lei Liu, Ning Ge, Steven J. Simske, Helen A. Holder
-
Patent number: 11144629Abstract: Systems and methods for multi-factor authentication using graphical passwords. An access request that includes an identifier and which identifies a protected resource is received from a client device. An interface is generated having a plurality of graphical objects for presentation at random locations on a display of the client device as defined by an object map. The plurality of graphical objects include a null object and a set of user-defined objects associated with the identifier that define a graphical password. Input data including an input event for each detected interaction with the interface is received. Each input event identifies a position on the display at which a corresponding interaction was detected. Using the object map, it is determined that the input data satisfies the graphical password. Access to the protected resource is granted in response to determining that the input data satisfies the graphical password.Type: GrantFiled: October 15, 2019Date of Patent: October 12, 2021Assignee: AMADEUS S.A.S.Inventors: Mohamed-Amine Maaroufi, Florent Maupay
-
Patent number: 11140169Abstract: A system includes an interface, a tenant authentication processor, and an application routing processor. The interface is configured to receive a first request for access. The tenant authentication processor is configured to provide a tenant token request to a tenant process associated with the first request; receive a tenant token from the tenant process; determine a signed tenant token based on the tenant token and a key; and provide the signed tenant token for access to an application routing platform. The application routing processor of the application routing platform is configured to receive an API call comprising the signed tenant token; determine that the signed tenant token is valid; determine an application platform token; determine routing information to an application platform based on the API call; and provide the application platform the API call and the application platform token using the routing information to gain access to the application platform.Type: GrantFiled: October 31, 2018Date of Patent: October 5, 2021Assignee: Workday, Inc.Inventors: Bjorn Hamel, Dylan Owen, Jonathan David Ruggiero
-
Patent number: 11134382Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.Type: GrantFiled: February 5, 2019Date of Patent: September 28, 2021Assignee: EM Microelectronic-Marin SAInventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
-
Patent number: 11120123Abstract: In accordance with some embodiments, a method is performed at an electronic device with a display device and one or more input devices. The method includes displaying, via the display device, a user interface that includes a new-password field. The method includes detecting, via the one or more input devices, a user input that corresponds to selection of the new-password field. In response to detecting the user input that corresponds to selection of the new-password field, the method includes displaying, on the display device, a representation of a new automatically-generated password in the new-password field and displaying, on the display device, an affordance to accept the new automatically-generated password and an affordance to decline to use the new automatically-generated password.Type: GrantFiled: May 30, 2019Date of Patent: September 14, 2021Assignee: Apple Inc.Inventors: Conrad A. Shultz, Richard J. Mondello, Reza Abbasian, Ivan Krstic, Darin Adler, Charilaos Papadopoulos, Maureen Grace Daum, Guillaume Borios, Patrick Robert Burns, Alexander David Sanciangco, Brent Michael Ledvina, Chelsea Elizabeth Pugh, Kyle Brogle, Marc J. Krochmal, Jacob Klapper, Paul Russell Knight, Connor David Graham, Shengkai Wu, I-Ting Liu, Steven Jon Falkenburg
-
Patent number: 11119648Abstract: A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.Type: GrantFiled: November 7, 2019Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chris R. Bean, Stephen R. F. Head, Sophie D. Green, Madeleine R. Neil Smith
-
Patent number: 11106352Abstract: While displaying the wake screen user interface, in response to detecting a first input that is directed to a portion of the wake screen user interface: if the first input includes first movement in a first direction, the computer system displays of a home screen user interface; and the first movement is in a second direction, the computer system displays a widget screen user interface that is different from the wake screen user interface and the home screen user interface, wherein the widget screen user interface includes a plurality of user interface objects corresponding to different applications, wherein a respective user interface object of the plurality of user interface objects contains application content from an application corresponding to the respective user interface object, and when selected, causes display of an application corresponding to the respective user interface object.Type: GrantFiled: June 29, 2020Date of Patent: August 31, 2021Assignee: APPLE INC.Inventor: William M. Tyler
-
Patent number: 11102200Abstract: In general, the techniques of this disclosure describe a computing device that is configured to verify an identity of a user based on authentication factors received from multiple authentication devices. The computing device, which may be configured to operate as a server device, may receive an authentication factor from at least three authentication devices in a group of three or more authentication devices via a guard device. The computing device may determine a probability that the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. If the probability exceeds a threshold authentication probability, the computing device may send an authentication confirmation to a client device.Type: GrantFiled: January 12, 2018Date of Patent: August 24, 2021Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Benjamin L. Burnett, Ranga Ramanujan
-
Patent number: 11089012Abstract: A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.Type: GrantFiled: September 18, 2017Date of Patent: August 10, 2021Assignee: ASSA ABLOY ABInventors: Masha Leah Davis, Mark Robinton, Peter F. Klammer
-
Patent number: 11082418Abstract: A system, method, apparatus, and computer program product for a privacy ensured brokered identity federation system. The privacy ensured brokered identity federation system connects a user in a brokered identity federation environment that blinds relying parties (RP) from credential service providers (CSP), blinds CSPs from RPs, and blinds a user's identity and data from the federation middleware hubs. The system utilizes ring signatures to attest to CSPs that a valid RP of the federation is making a request. The process utilizes CSP ring signatures to assure RPs that a valid CSP of the federation has provided a response. The process utilizes per transaction encryption keys created by the RP to ensure the federation has no access to data messages. It can further ensure that only the correct RP can decrypt a CSP response.Type: GrantFiled: February 13, 2018Date of Patent: August 3, 2021Assignee: Avalanche Cloud CorporationInventors: Mark A. Nelson, George S. Rathbun, Scott Kern
-
Patent number: RE48707Abstract: A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic engine. The display element array includes one or more segments, and the driver outputs are configured to drive the one or more segments, respectively. The host controller is configured to send commands and data to the driver controller via the communication interface and the cryptographic engine is configured to encrypt communication data between the display element array and the host controller.Type: GrantFiled: April 24, 2019Date of Patent: August 24, 2021Assignee: BBPOS LIMITEDInventors: Chi Wah Lo, Hwai Sian Tsai