Credential Management Patents (Class 726/18)
  • Patent number: 11182784
    Abstract: Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
    Type: Grant
    Filed: October 21, 2019
    Date of Patent: November 23, 2021
    Assignee: CAPITAL ONE SERVICES, LLC
    Inventors: Kaitlin Newman, Kimberly Haynes, Charles Nathan Crank, Andrew Cogswell, Colin Hart, Jeffrey Rule, Lara Mossler, Latika Gulati, Abdelkader Benkreira, Sarah Jane Cunningham, Sophie Bermudez, Michael Mossoba, Wayne Lutz
  • Patent number: 11151245
    Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.
    Type: Grant
    Filed: September 9, 2016
    Date of Patent: October 19, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Lei Liu, Ning Ge, Steven J. Simske, Helen A. Holder
  • Patent number: 11144629
    Abstract: Systems and methods for multi-factor authentication using graphical passwords. An access request that includes an identifier and which identifies a protected resource is received from a client device. An interface is generated having a plurality of graphical objects for presentation at random locations on a display of the client device as defined by an object map. The plurality of graphical objects include a null object and a set of user-defined objects associated with the identifier that define a graphical password. Input data including an input event for each detected interaction with the interface is received. Each input event identifies a position on the display at which a corresponding interaction was detected. Using the object map, it is determined that the input data satisfies the graphical password. Access to the protected resource is granted in response to determining that the input data satisfies the graphical password.
    Type: Grant
    Filed: October 15, 2019
    Date of Patent: October 12, 2021
    Assignee: AMADEUS S.A.S.
    Inventors: Mohamed-Amine Maaroufi, Florent Maupay
  • Patent number: 11140169
    Abstract: A system includes an interface, a tenant authentication processor, and an application routing processor. The interface is configured to receive a first request for access. The tenant authentication processor is configured to provide a tenant token request to a tenant process associated with the first request; receive a tenant token from the tenant process; determine a signed tenant token based on the tenant token and a key; and provide the signed tenant token for access to an application routing platform. The application routing processor of the application routing platform is configured to receive an API call comprising the signed tenant token; determine that the signed tenant token is valid; determine an application platform token; determine routing information to an application platform based on the API call; and provide the application platform the API call and the application platform token using the routing information to gain access to the application platform.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: October 5, 2021
    Assignee: Workday, Inc.
    Inventors: Bjorn Hamel, Dylan Owen, Jonathan David Ruggiero
  • Patent number: 11134382
    Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: September 28, 2021
    Assignee: EM Microelectronic-Marin SA
    Inventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
  • Patent number: 11119648
    Abstract: A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: September 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Chris R. Bean, Stephen R. F. Head, Sophie D. Green, Madeleine R. Neil Smith
  • Patent number: 11120123
    Abstract: In accordance with some embodiments, a method is performed at an electronic device with a display device and one or more input devices. The method includes displaying, via the display device, a user interface that includes a new-password field. The method includes detecting, via the one or more input devices, a user input that corresponds to selection of the new-password field. In response to detecting the user input that corresponds to selection of the new-password field, the method includes displaying, on the display device, a representation of a new automatically-generated password in the new-password field and displaying, on the display device, an affordance to accept the new automatically-generated password and an affordance to decline to use the new automatically-generated password.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: September 14, 2021
    Assignee: Apple Inc.
    Inventors: Conrad A. Shultz, Richard J. Mondello, Reza Abbasian, Ivan Krstic, Darin Adler, Charilaos Papadopoulos, Maureen Grace Daum, Guillaume Borios, Patrick Robert Burns, Alexander David Sanciangco, Brent Michael Ledvina, Chelsea Elizabeth Pugh, Kyle Brogle, Marc J. Krochmal, Jacob Klapper, Paul Russell Knight, Connor David Graham, Shengkai Wu, I-Ting Liu, Steven Jon Falkenburg
  • Patent number: 11106352
    Abstract: While displaying the wake screen user interface, in response to detecting a first input that is directed to a portion of the wake screen user interface: if the first input includes first movement in a first direction, the computer system displays of a home screen user interface; and the first movement is in a second direction, the computer system displays a widget screen user interface that is different from the wake screen user interface and the home screen user interface, wherein the widget screen user interface includes a plurality of user interface objects corresponding to different applications, wherein a respective user interface object of the plurality of user interface objects contains application content from an application corresponding to the respective user interface object, and when selected, causes display of an application corresponding to the respective user interface object.
    Type: Grant
    Filed: June 29, 2020
    Date of Patent: August 31, 2021
    Assignee: APPLE INC.
    Inventor: William M. Tyler
  • Patent number: 11102200
    Abstract: In general, the techniques of this disclosure describe a computing device that is configured to verify an identity of a user based on authentication factors received from multiple authentication devices. The computing device, which may be configured to operate as a server device, may receive an authentication factor from at least three authentication devices in a group of three or more authentication devices via a guard device. The computing device may determine a probability that the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. If the probability exceeds a threshold authentication probability, the computing device may send an authentication confirmation to a client device.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: August 24, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Benjamin L. Burnett, Ranga Ramanujan
  • Patent number: 11089012
    Abstract: A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: August 10, 2021
    Assignee: ASSA ABLOY AB
    Inventors: Masha Leah Davis, Mark Robinton, Peter F. Klammer
  • Patent number: 11082418
    Abstract: A system, method, apparatus, and computer program product for a privacy ensured brokered identity federation system. The privacy ensured brokered identity federation system connects a user in a brokered identity federation environment that blinds relying parties (RP) from credential service providers (CSP), blinds CSPs from RPs, and blinds a user's identity and data from the federation middleware hubs. The system utilizes ring signatures to attest to CSPs that a valid RP of the federation is making a request. The process utilizes CSP ring signatures to assure RPs that a valid CSP of the federation has provided a response. The process utilizes per transaction encryption keys created by the RP to ensure the federation has no access to data messages. It can further ensure that only the correct RP can decrypt a CSP response.
    Type: Grant
    Filed: February 13, 2018
    Date of Patent: August 3, 2021
    Assignee: Avalanche Cloud Corporation
    Inventors: Mark A. Nelson, George S. Rathbun, Scott Kern
  • Patent number: 11062709
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.
    Type: Grant
    Filed: March 2, 2020
    Date of Patent: July 13, 2021
    Assignee: Google LLC
    Inventor: Matthew Sharifi
  • Patent number: 11061999
    Abstract: Embodiments described include systems and methods for incorporating tags in content of network applications. An embedded browser, which is executable on one or more processors of a client device, may detect content from a network application accessed via the embedded browser. A DRM engine of the embedded browser identifies a DRM scheme for the network application from the plurality of DRM schemes and according to the network application. The DRM engine generates a DRM tag for the content according to the DRM scheme identified for the network application. The DRM tag includes a classification of the content. The DRM engine incorporates the DRM tag into the content for managing usage of the content according to the classification.
    Type: Grant
    Filed: November 6, 2018
    Date of Patent: July 13, 2021
    Assignee: Citrix Systems, Inc.
    Inventors: Vipin Borkar, Santosh Sampath, Deepak Sharma, Arvind SankaraSubramanian
  • Patent number: 11057435
    Abstract: A method is provided for identifying a strength of an input picture password formed by performing a sequence of gestures relative to a picture. The method includes storing, in a memory device, a crowdsource history of picture passwords each of which include a picture and a sequence of gestures on the picture. The method further includes generating, by a processor-based demography-based pattern usage assessment generator, a demography-based pattern usage assessment by analyzing the crowd source history. The method also includes providing, by a user-perceptible indication device, an indication of the strength of the input picture password in accordance with the demography-based pattern usage assessment.
    Type: Grant
    Filed: July 18, 2019
    Date of Patent: July 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Yuk L. Chan, Heidi Lagares-Greenblatt, Deepti Naphade
  • Patent number: 11025658
    Abstract: A method includes obtaining messages associated with assets in an enterprise system, splitting each of the messages into a set of tokens, determining a count of a number of occurrences of each of the tokens, and assigning weights to the tokens based at least in part on the counts of the number of occurrences of the tokens. The method also includes determining a score for each of the messages based at least in part on a combined sum of the weights for the set of tokens of that message, generating a summary of the messages by selecting a subset of the messages for based at least in part on the scores. The method further includes identifying remedial actions to be applied to assets in the enterprise system based at least in part on the summary of the messages, and implementing at least one of the identified remedial actions.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: June 1, 2021
    Assignee: EMC IP Holding Company LLC
    Inventors: Sashka T. Davis, Kevin J. Arunski, Zulfikar A. Ramzan, Scott Moore, Abram Q. Thielke, Ed G. Quackenbush, Matthew D. Tharp
  • Patent number: 11025664
    Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.
    Type: Grant
    Filed: January 7, 2020
    Date of Patent: June 1, 2021
    Assignee: SPLUNK INC.
    Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
  • Patent number: 11010044
    Abstract: Methods, systems and devices are provided for input of a sequence of digits such as a PIN code or password. A user can use swipe motions to choose the value of a digit and double tap to accept a digit, and swipe up to confirm that input of the sequence of digits is complete. Embodiments can be implemented on point of sale devices, merchant devices and customer devices including mobile devices.
    Type: Grant
    Filed: May 28, 2019
    Date of Patent: May 18, 2021
    Assignee: Shopify Inc.
    Inventors: Luke James Sartori, Mir Mustafa Ali, Theresa Jia Ying Zeng, David Grant Seal
  • Patent number: 11010762
    Abstract: Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen sensing a first input comprising at least one finger touch; (2) the touch-sensitive screen sensing a release of the first input; (3) the at least one computer processor determining a first number of finger touches in the first input; and (4) the at least one computer processor using the first number of finger touches to identify a first portion of an authentication code.
    Type: Grant
    Filed: October 8, 2018
    Date of Patent: May 18, 2021
    Assignee: VeriFone, Inc.
    Inventors: Imran A. Hajimusa, Glen Robson, Davey Faoro
  • Patent number: 11003723
    Abstract: System and method to acquire data from a deep web are provided. The system includes a processing subsystem. The processing subsystem includes a local virtual private network module configured to create at least one first virtual private network within a router. The system also includes a cloud virtual private network (VPN) module configured to create a plurality of second virtual private networks based on the at least one first virtual private network. The plurality of second virtual private networks is configured to enable an access to the deep web. The system also includes a plurality of virtual computing devices configured to access the deep web by one or more crawlers based on one or more parameters and to acquire the data from the deep web based on the one or more parameters. The system also includes a storage device configured to store the data acquired from the deep web.
    Type: Grant
    Filed: August 22, 2018
    Date of Patent: May 11, 2021
    Assignee: Marlabs Innovations Private Limited
    Inventor: Bimodh Jo Mathew
  • Patent number: 10986086
    Abstract: Techniques for protecting passwords and/or password entry by a user are provided. User identification data for a user can be received from a remote computing device. An identity of the user can be determined based on the user identification data. A password for the user can be determined. A modified keyboard configuration associated with the user can be determined. A request can be transmitted to the remote computing device for the password for the user based on the modified keyboard configuration. A modified password from the remote computing device can be received. A converted password based on the modified password and the modified keyboard configuration can be determined. The converted password can be compared to the password for the user. The user can be authorized when the converted password matches the password for the user.
    Type: Grant
    Filed: August 29, 2019
    Date of Patent: April 20, 2021
    Assignee: Capital One Services, LLC
    Inventors: Fardin Abdi Taghi Abad, Reza Farivar, Jeremy Edward Goodsitt, Anh Truong, Kenneth Taylor, Mark Louis Watson, Kate Key, Vincent Pham, Austin Grant Walters
  • Patent number: 10977343
    Abstract: A display input device includes a reception processing portion, a change processing portion, and a display processing portion. The reception processing portion, based on correspondence information indicating a correspondence between a plurality of characters and a plurality of operation keys used for inputting a password of a preset number of characters, receives an operation of any one of the operation keys as an input operation of a character corresponding to the operation key. The change processing portion changes the correspondence relationship when the operation of the operation key is performed a preset specific number of times that is less than the number of characters of the password, or at a preset specific interval. The display processing portion displays the correspondence information at a predetermined position, different from a position of the operation keys, on an input screen used for inputting the password.
    Type: Grant
    Filed: September 14, 2018
    Date of Patent: April 13, 2021
    Assignee: KYOCERA Document Solutions Inc.
    Inventor: Hiromi Sakata
  • Patent number: 10970482
    Abstract: A piece of text is saved for security verification on a computing device. One or more pieces of related text corresponding to the piece of saved text are generated, where each text element of the one or more pieces of related text is generated based on its proximity to the corresponding text element of the piece of saved text on one or more keyboards on the computing device. A piece of input text is received for information verification. A piece of input text is compared with the piece of saved text and the one or more pieces of related text. A determination is made that the piece of input text matches one of the one or more pieces of related text and input guidance for re-entering a piece of text for security authentication is provided.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: April 6, 2021
    Assignee: Advanced New Technologies Co., Ltd.
    Inventor: Yong He
  • Patent number: 10949524
    Abstract: User authentication techniques are provided using a scene composed of selected objects. An exemplary method comprises obtaining enrollment information from a user, wherein the enrollment information comprises a first scene comprised of a first selection of objects; initiating a challenge to the user in connection with an authentication request by the user to access a protected resource; processing a second scene comprised of a second selection of objects submitted by the user in response to the challenge, and wherein the processing comprises determining a likelihood that the submitted second scene comprised of the second selection of objects matches the first scene comprised of the first selection of objects submitted by the user with the enrollment information; and resolving the authentication request based on the likelihood. Objects in the first selection of objects are optionally selected from a catalog and arranged into the first scene.
    Type: Grant
    Filed: October 31, 2018
    Date of Patent: March 16, 2021
    Assignee: RSA Security LLC
    Inventors: Brian Mullins, Salah Machani, Millie Ng
  • Patent number: 10891374
    Abstract: The disclosed computer-implemented method for improving performance of cascade classifiers for protecting against computer malware may include receiving a training dataset usable to train a cascade classifier of a machine-learning classification system. A sample to add to the training dataset may be received. A weight for the sample may be calculated. The training dataset may be modified using the sample and the weight. A weighted training for the cascade classifier of the machine-learning classification system may be performed using the modified training dataset. Computer malware may be identified using the cascade classifier. In response to identifying the computer malware, a security action may be performed to protect the one or more computing devices from the computer malware. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: March 28, 2018
    Date of Patent: January 12, 2021
    Assignee: CA, INC.
    Inventors: Ryan Curtin, Keith Kenemer
  • Patent number: 10868807
    Abstract: Systems and methods for determining a pictograph password sequence and association phrase are provided. In some example embodiments, an assigned pictograph sequence request is received from a client device, with the request causing the system to generate a template pictograph sequence, generate an association phrase based on the template pictograph sequence, store the template pictograph sequence and associated phrase on a memory, and transmit instructions to cause a display of the template pictograph sequence and the association phrase. In some example embodiments, the system requires an input of a pictograph sequence that matches the template pictograph sequence in order for a user to view content. In some example embodiments, the template pictograph sequence may be replaced by a user pictograph sequence.
    Type: Grant
    Filed: December 6, 2018
    Date of Patent: December 15, 2020
    Assignee: Snap Inc.
    Inventors: Eric Buehl, Michael Cieslak
  • Patent number: 10867026
    Abstract: Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided through an input unit of a personal mobile device of the authorized user of the security system, are accessed. One or more signatures of the authorized user are defined and stored in a signature map. Subsequently, user identification input is received from an unauthenticated user using the personal mobile device. The user identification input received from the unauthenticated user is compared to one or more defined signatures in the signature map. The unauthenticated user is determined to be the authorized user if the received user identification input matches one of the defined signatures. The unauthenticated user is allowed to control the security system based on the determination that the unauthenticated user is the authorized user.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: December 15, 2020
    Assignee: Alarm.com Incorporated
    Inventors: Stephen Scott Trundle, Alison Jane Slavin
  • Patent number: 10862682
    Abstract: The present disclosure describes methods of encrypting and decrypting blocks of data stored in computer readable memory for a device using a block cipher with a nonce. In particular, methods of encrypting and decrypting blocks of data where the value of the nonce is based on previous execution instructions of a program executed by the device for a previously executed block are described. Embodiments disclosed include a method of encrypting blocks of data bits stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data: generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed block of data; and encrypting the block of data with the nonce and key using the block cipher.
    Type: Grant
    Filed: July 20, 2015
    Date of Patent: December 8, 2020
    Assignee: NXP B.V.
    Inventor: Hugues de Perthuis
  • Patent number: 10855692
    Abstract: A system, method, and computer-readable medium are disclosed for generating an adaptive trust profile via an adaptive trust profile operation. In various embodiments the adaptive trust profile operation includes: monitoring a plurality of electronically-observable actions of an entity, the plurality of electronically-observable actions of the entity corresponding to a respective plurality of events enacted by the entity, the monitoring comprising monitoring at least one of the plurality of electronically-observable actions via a protected endpoint; converting the plurality of electronically-observable actions of the entity to electronic information representing the plurality of actions of the entity; and generating an adaptive trust profile based upon the action of the entity.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: December 1, 2020
    Assignee: Forcepoint, LLC
    Inventor: Richard A. Ford
  • Patent number: 10853472
    Abstract: In one embodiment, an apparatus includes a non-volatile storage to store a seed value and a signature that is based on an iterative execution of a function for a predetermined number of intervals. The apparatus may further include the security processor coupled to the non-volatile storage, where the security processor is to independently recover a credential for an updated version of the firmware based at least in part on the seed value and a security version number for the updated version of the firmware. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: December 1, 2020
    Assignee: Intel Corporation
    Inventors: Xiaoyu Ruan, William A. Stevens, Jr.
  • Patent number: 10838668
    Abstract: A managing device used in an apparatus managing system including a print relational apparatus, terminals of users and a storing device manages the print relational apparatus and the users. The storing device stores user information of each user. The managing device includes a user authorizing part, a notification transmitting part and an information changing part. The user authorizing part authorizes, based on use history of the apparatus of each user, the user whose a nonuse period of the apparatus exceeds a predetermined period, as a registration erasure candidate user. The notification transmitting part transmits a registration erasure proposal notification having a proposal to erase registration of the candidate user to the terminal of a management user. The information changing part erases registration of the candidate user by erasing or changing the user information of the candidate user, according to indication inputted by the management user.
    Type: Grant
    Filed: July 5, 2019
    Date of Patent: November 17, 2020
    Assignee: KYOCERA Document Solutions Inc.
    Inventors: Kazuki Nishikai, Takeshi Nakamura, Satoshi Goshima, Dukil Park, Yuichi Obayashi, Takumi Nakamura, Koki Nakajima, Yasuo Nakashima
  • Patent number: 10834097
    Abstract: A system, method, and computer-readable medium are disclosed for generating an adaptive trust profile via an adaptive trust profile operation. In various embodiments the adaptive trust profile operation includes: monitoring a plurality of electronically-observable actions of an entity, the plurality of electronically-observable actions of the entity corresponding to a plurality of respective events enacted by the entity; converting the plurality of electronically-observable actions of the entity to electronic information representing the plurality of actions of the entity; and generating the adaptive trust profile based upon the plurality of actions of the entity, the adaptive trust profile comprising a plurality of adaptive trust profile components.
    Type: Grant
    Filed: May 17, 2019
    Date of Patent: November 10, 2020
    Assignee: Forcepoint, LLC
    Inventor: Richard A. Ford
  • Patent number: 10826694
    Abstract: The present disclosure relates to a method for using a secret key for cryptographically processing a data item in an enclave enabled system. The method comprises: computing a first set of shares of the secret key and storing them in an encrypted format. Each encrypted share may be sent to respective component in a first set of components. In response to sending the encrypted shares, a modified encryption of the respective share may be received from each of the first set of components. Each of the received modified encryptions may be encrypted and the resulting modified share is sent to the respective first set of components. In response to sending the decrypted modified shares, a data item cryptographically processed using the respective share may be received from each of the first set of components. The received data items may be combined to obtain a cryptographically processed data item.
    Type: Grant
    Filed: April 23, 2018
    Date of Patent: November 3, 2020
    Assignee: International Business Machines Corporation
    Inventors: Jan L. Camenisch, Manu Drijvers, Anja Lehmann, Kai Wilhelm Samelin
  • Patent number: 10810369
    Abstract: A piece of text is saved for security verification on a computing device. One or more pieces of related text corresponding to the piece of saved text are generated, where each text element of the one or more pieces of related text is generated based on its proximity to the corresponding text element of the piece of saved text on one or more keyboards on the computing device. A piece of input text is received for information verification. A piece of input text is compared with the piece of saved text and the one or more pieces of related text. A determination is made that the piece of input text matches one of the one or more pieces of related text and input guidance for re-entering a piece of text for security authentication is provided.
    Type: Grant
    Filed: November 27, 2017
    Date of Patent: October 20, 2020
    Assignee: Alibaba Group Holding Limited
    Inventor: Yong He
  • Patent number: 10778691
    Abstract: Various embodiments provide for the consolidation of policies across multiple identities that are respectively associated with multiple active directory (AD) groups to which a user belongs. Present embodiments provide for dynamically generating a new identity in the resource provider environment that includes permissions to all of the resources that may otherwise be distributed across multiple identities. Specifically, in accordance with various embodiments, when a user login is detected, the active directory is queried to determine the AD groups to which the user belongs. As mentioned, the user's AD groups are mapped to respective identities in the resource provider environment, in which each identity includes policy defining access to one or more resources. The policies of all the respective identities are consolidated and assigned to a new identity. The user may assume the new identity and access all the resources in tandem.
    Type: Grant
    Filed: December 7, 2017
    Date of Patent: September 15, 2020
    Assignee: AMAZON TECHNOLOGIES, INC.
    Inventors: Robert W. Kissell, Eric Andrew Scholz
  • Patent number: 10771256
    Abstract: A method for generating an electronic signature of a user for an electronic document including establishing a secure Internet session between a telecommunication terminal of a user and a signature server computer system; receiving a code from the signature server computer system via a separate and/or separately secured side channel by the telecommunication terminal; transmitting a combination of code and authentication information of the user via the secure Internet session to the signature server computer system; checking the validity of the combination of code and authentication information by the signature server computer system; and generating the electronic signature of the user by a high-security module of the signature server computer system, wherein the private key of the user for generating the electronic signature is stored in the high-security module.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: September 8, 2020
    Assignee: BUNDESDRUCKEREI GMBH
    Inventor: Christian Seegebarth
  • Patent number: 10740358
    Abstract: Embodiments of the invention provide systems and methods for managing and processing large amounts of complex and high-velocity data by capturing and extracting high-value data from low value data using big data and related technologies. Illustrative database systems described herein may collect and process data while extracting or generating high-value data. The high-value data may be handled by databases providing functions such as multi-temporality, provenance, flashback, and registered queries. In some examples, computing models and system may be implemented to combine knowledge and process management aspects with the near real-time data processing frameworks in a data-driven situation aware computing system.
    Type: Grant
    Filed: March 23, 2015
    Date of Patent: August 11, 2020
    Assignee: Oracle International Corporation
    Inventors: Eric S. Chan, Dieter Gawlick, Adel Ghoneimy, Zhen Hua Liu
  • Patent number: 10726118
    Abstract: A secured computerized system comprising a computerized environment secured to prevent access thereto, other than by end-users who have passed a what-you-know authentication test: what-you-know testing functionality for administering a what-you-know user authentication test to end-user/s, including presenting image/s to end-user, and approving end-user to enter the computerized environment if end-user correctly selects predetermined location/s within the image; and a graphic what-you-know test-configuring functionality for displaying system-selected location/s within the image; providing a graphic interface operative for accepting, from, end-user/s, a user-selected modification of system-selected location/s; and storing, for each individual end-user, the user-selected modification as the individual end-user's predetermined location/s; or if no user-selected modification exists for an individual end-user, storing the system-selected location as the individual end-user's predetermined location.
    Type: Grant
    Filed: June 16, 2016
    Date of Patent: July 28, 2020
    Assignee: GOOGALE (2009) LTD.
    Inventors: Nir Michalowitz, Michal Peled Rosenvald
  • Patent number: 10686841
    Abstract: This disclosure provides an apparatus and method for dynamic customization of cyber-security risk item rules. A method includes interacting with a user, by a risk manager system, to define a plurality of rules for risk items to be monitored among a plurality of connected devices. The method also includes mapping each of the rules to a corresponding one or more of the connected devices by the risk manager system. The method further includes monitoring the connected devices according to the rules by the risk manager system. In addition, the method includes displaying an output based on the rules and a status of the connected devices by the risk manager system.
    Type: Grant
    Filed: May 24, 2018
    Date of Patent: June 16, 2020
    Assignee: Honeywell International Inc.
    Inventor: Seth G. Carpenter
  • Patent number: 10686966
    Abstract: Displaying an authentication interface on an operation panel associated with a printing device, the operation panel including a plurality of authentication areas. Receiving a user authentication request. Detecting a particular authentication pattern associated with the user authentication request. Retrieving a registered authentication pattern associated with the user. Comparing the particular authentication pattern with the registered authentication pattern. Determining, based on the comparing, whether the user authentication request is authorized. If the user authentication request is authorized, retrieving a first electronic document associated with the user, and printing the first electronic document.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: June 16, 2020
    Assignee: KYOCERA Document Solutions, Inc.
    Inventor: Arturo Becerra
  • Patent number: 10686767
    Abstract: Some embodiments provide convenient auto-authentication for user data on a primary device, while still providing a significant level of security, by taking advantage of existing security and cryptographic measures used to communicate with a secondary device. The primary device of some embodiments encrypts the user data on the primary device using a cryptographic key based on a set of keys received from the secondary device. In some embodiments, the primary device encrypts authentication data, or a local key generated from the authentication data, using a remote key received from the secondary device, and encrypts the user data with the local key. In some embodiments, the keys received from the secondary device are an existing set of keys for establishing an encrypted channel of communication for transmitting digital rights management (DRM) protected content according to a DRM protection scheme.
    Type: Grant
    Filed: September 23, 2016
    Date of Patent: June 16, 2020
    Assignee: Apple Inc.
    Inventors: Mitchell D. Adler, Andrew Roger Whalley
  • Patent number: 10638315
    Abstract: A method and an apparatus are provided for notifying a password in a mobile communication terminal. It is checked whether a password notification function is set. Input of a stored password is requested. An input password is received. It is checked whether the input password is identical to the stored password. Input of a stored secondary password is requested if the input password is not identical to the stored password. An input secondary password is received. It is checked whether the input secondary password is identical to the stored secondary password. A password is sent if the input secondary password is identical to the stored secondary password.
    Type: Grant
    Filed: March 6, 2015
    Date of Patent: April 28, 2020
    Assignee: Samsung Electronics Co., Ltd
    Inventor: Kyong-Su Kim
  • Patent number: 10635919
    Abstract: The purpose of the present invention is, when a portion of a subject to be detected is occluded, to simplify detecting that the occluded subject to be detected is the subject to be detected, regardless of the position which is occluded. Provided is an information processing device (110), comprising: a computation unit (111) which computes local scores for each of a plurality of positions which are contained in an image of a prescribed scope, said scores indicating the likelihood of an object to be detected being present; and a change unit (112) which changes the scores for the positions, among the plurality of positions, which are included in a prescribed region which is determined according to the plurality of scores which have been computed for said plurality of positions, such that the likelihood of the object to be detected being present increases.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: April 28, 2020
    Assignee: NEC CORPORATION
    Inventor: Kenta Araki
  • Patent number: 10621987
    Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: April 14, 2020
    Assignee: Google LLC
    Inventor: Matthew Sharifi
  • Patent number: 10581893
    Abstract: Techniques of preventing sabotage attacks in cyber-physical systems involve automatically identifying links between nodes of a graph representing cyber-physical systems as vulnerable to sabotage attacks according to a vulnerability metric for each link. The vulnerability metric used depends on the particular sabotage attack used to determine the vulnerable links. Once a computer configured to design cyber-physical systems based on vulnerability to sabotage attacks receives data representing the graph, the computer enumerates the possible links between nodes of the graph along which a sabotage attack may be performed. For each of those links, the computer computes the vulnerability metric. The computer then ranks the links according to respective values of the vulnerability metric. Based on the ranking, a designer may then perform a mitigation analysis that results in changes to the graph to reduce the vulnerability at each node accessible to a malicious actor.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: March 3, 2020
    Assignees: Brigham Young University (BYU), Washington State University
    Inventors: Sean Warnick, Sandip Roy
  • Patent number: 10581853
    Abstract: Systems, methods, and a security management apparatus, for password management including the determination of the identity of a service requesting a security token for access to the service. The security management apparatus generates personal identification data based on a personal identification input such as a touch selection or gesture, in order to access a service on a secured device. Responsive to the personal identification data satisfying an access criterion, a communication channel is established with the secured device. The identity of the service on the secured device is determined and a security token, such as a password, is sent to the secured device via the communication channel.
    Type: Grant
    Filed: August 3, 2016
    Date of Patent: March 3, 2020
    Assignee: Huami Inc.
    Inventors: Zhenye Zhu, Xiao-feng Li
  • Patent number: 10573171
    Abstract: A method includes determining a status of a first device, receiving a first user input, and associating the first user input with the first device, wherein the first user input and the status of the first device is used to associate the first user input with the first device.
    Type: Grant
    Filed: May 23, 2017
    Date of Patent: February 25, 2020
    Assignee: Lenovo (Singapore) Pte. Ltd.
    Inventors: Russell Speight VanBlon, Nathan J. Peterson, John Carl Mese, Arnold S. Weksler
  • Patent number: 10575171
    Abstract: A communication apparatus receives information encrypted based on encryption information obtained by capturing an image of code information about the communication information from a different communication apparatus operating as an access point to form a wireless network. The communication apparatus and the different communication apparatus perform encrypted communication based on the information.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: February 25, 2020
    Assignee: Canon Kabushiki Kaisha
    Inventor: Fumihide Goto
  • Patent number: 10530784
    Abstract: Provided is process including receiving a request to authenticate a user; sending instructions to present an authentication user interface including a geographic map; receiving geolocations on the geographic map selected by the user; comparing the geolocations to a sequence of geolocations in an authentication credential to determine whether to authenticate the user.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: January 7, 2020
    Assignee: CA, Inc.
    Inventors: Sreenivasulu Bandi, Gaurav Kumar, Mitta Sarath Kumar, Shaik Mokhinuddeen
  • Patent number: 10509574
    Abstract: Techniques for implementing container credentialing by a host are described herein. In one example, a system for providing credentials includes a memory device for storing instructions and a processing device for executing instructions. The system can also include a container to execute a runtime environment for an application through the memory device and processing device, the application to request access to a credential locked resource. The system can also include a host environment to share the memory and the processing device with the container. In an example, the host environment may detect a request for a credential for the credential locked resource from the container. In an example, the host environment may also provide a credential for a credential locked resource to the container if the container is approved to receive the credential based on a policy.
    Type: Grant
    Filed: May 24, 2016
    Date of Patent: December 17, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mark Novak, Benjamin Moore
  • Patent number: RE48707
    Abstract: A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic engine. The display element array includes one or more segments, and the driver outputs are configured to drive the one or more segments, respectively. The host controller is configured to send commands and data to the driver controller via the communication interface and the cryptographic engine is configured to encrypt communication data between the display element array and the host controller.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: August 24, 2021
    Assignee: BBPOS LIMITED
    Inventors: Chi Wah Lo, Hwai Sian Tsai