Credential Management Patents (Class 726/18)
-
Patent number: 11182784Abstract: Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.Type: GrantFiled: October 21, 2019Date of Patent: November 23, 2021Assignee: CAPITAL ONE SERVICES, LLCInventors: Kaitlin Newman, Kimberly Haynes, Charles Nathan Crank, Andrew Cogswell, Colin Hart, Jeffrey Rule, Lara Mossler, Latika Gulati, Abdelkader Benkreira, Sarah Jane Cunningham, Sophie Bermudez, Michael Mossoba, Wayne Lutz
-
Patent number: 11151245Abstract: Examples associated with user authentication are described. One example method includes authenticating a user of a device using a static authentication technique. A behavior profile associated with the user is loaded. The behavior profile describes a pattern of device usage behavior by the user in a three-dimensional space over a time slice. The behavior profile also identifies distinctive user habits. Usage of the device is monitored, and a behavior similarity index is periodically updated. The behavior similarity index describes a similarity between the usage of the device and the pattern of device usage behavior. The behavior similarity index is weighted based on the distinctive user habits. Access to the device is restricted when the behavior similarity index reaches a predefined threshold.Type: GrantFiled: September 9, 2016Date of Patent: October 19, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Lei Liu, Ning Ge, Steven J. Simske, Helen A. Holder
-
Patent number: 11144629Abstract: Systems and methods for multi-factor authentication using graphical passwords. An access request that includes an identifier and which identifies a protected resource is received from a client device. An interface is generated having a plurality of graphical objects for presentation at random locations on a display of the client device as defined by an object map. The plurality of graphical objects include a null object and a set of user-defined objects associated with the identifier that define a graphical password. Input data including an input event for each detected interaction with the interface is received. Each input event identifies a position on the display at which a corresponding interaction was detected. Using the object map, it is determined that the input data satisfies the graphical password. Access to the protected resource is granted in response to determining that the input data satisfies the graphical password.Type: GrantFiled: October 15, 2019Date of Patent: October 12, 2021Assignee: AMADEUS S.A.S.Inventors: Mohamed-Amine Maaroufi, Florent Maupay
-
Patent number: 11140169Abstract: A system includes an interface, a tenant authentication processor, and an application routing processor. The interface is configured to receive a first request for access. The tenant authentication processor is configured to provide a tenant token request to a tenant process associated with the first request; receive a tenant token from the tenant process; determine a signed tenant token based on the tenant token and a key; and provide the signed tenant token for access to an application routing platform. The application routing processor of the application routing platform is configured to receive an API call comprising the signed tenant token; determine that the signed tenant token is valid; determine an application platform token; determine routing information to an application platform based on the API call; and provide the application platform the API call and the application platform token using the routing information to gain access to the application platform.Type: GrantFiled: October 31, 2018Date of Patent: October 5, 2021Assignee: Workday, Inc.Inventors: Bjorn Hamel, Dylan Owen, Jonathan David Ruggiero
-
Patent number: 11134382Abstract: A method of authenticating a transponder in communication with a server. The method includes the steps of defining a word in the transponder with a previous state of a counter of the transponder, incremented by a random number generated in the transponder, calculating a one-time password in the transponder with the aid of an HOTP algorithm and of a secret key on the basis of the word, transmitting the word and the one-time password to the server, calculating another one-time password in the server with the word received from the transponder by the HOTP algorithm and with one and the same secret key, and checking whether the passwords are identical so as to authenticate the transponder and authorize access to a site determined by the server.Type: GrantFiled: February 5, 2019Date of Patent: September 28, 2021Assignee: EM Microelectronic-Marin SAInventors: Tomas Novak, Julian Guilloux, Stephanie Salgado
-
Patent number: 11119648Abstract: A computer-implemented a method for authenticating a user includes: displaying, by a computer device, a first user interface on a display; receiving, by the computer device, user input defining a first pattern; displaying, by the computer device, a second pattern on the display, wherein the second pattern is different than the first pattern; comparing, by the computer device, the first pattern to a predefined pattern; and based on the comparing, the computer device performing one of: re-displaying the first user interface when the first pattern does not match the predefined pattern; and displaying a second user interface when the first pattern does match the predefined pattern.Type: GrantFiled: November 7, 2019Date of Patent: September 14, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chris R. Bean, Stephen R. F. Head, Sophie D. Green, Madeleine R. Neil Smith
-
Patent number: 11120123Abstract: In accordance with some embodiments, a method is performed at an electronic device with a display device and one or more input devices. The method includes displaying, via the display device, a user interface that includes a new-password field. The method includes detecting, via the one or more input devices, a user input that corresponds to selection of the new-password field. In response to detecting the user input that corresponds to selection of the new-password field, the method includes displaying, on the display device, a representation of a new automatically-generated password in the new-password field and displaying, on the display device, an affordance to accept the new automatically-generated password and an affordance to decline to use the new automatically-generated password.Type: GrantFiled: May 30, 2019Date of Patent: September 14, 2021Assignee: Apple Inc.Inventors: Conrad A. Shultz, Richard J. Mondello, Reza Abbasian, Ivan Krstic, Darin Adler, Charilaos Papadopoulos, Maureen Grace Daum, Guillaume Borios, Patrick Robert Burns, Alexander David Sanciangco, Brent Michael Ledvina, Chelsea Elizabeth Pugh, Kyle Brogle, Marc J. Krochmal, Jacob Klapper, Paul Russell Knight, Connor David Graham, Shengkai Wu, I-Ting Liu, Steven Jon Falkenburg
-
Patent number: 11106352Abstract: While displaying the wake screen user interface, in response to detecting a first input that is directed to a portion of the wake screen user interface: if the first input includes first movement in a first direction, the computer system displays of a home screen user interface; and the first movement is in a second direction, the computer system displays a widget screen user interface that is different from the wake screen user interface and the home screen user interface, wherein the widget screen user interface includes a plurality of user interface objects corresponding to different applications, wherein a respective user interface object of the plurality of user interface objects contains application content from an application corresponding to the respective user interface object, and when selected, causes display of an application corresponding to the respective user interface object.Type: GrantFiled: June 29, 2020Date of Patent: August 31, 2021Assignee: APPLE INC.Inventor: William M. Tyler
-
Patent number: 11102200Abstract: In general, the techniques of this disclosure describe a computing device that is configured to verify an identity of a user based on authentication factors received from multiple authentication devices. The computing device, which may be configured to operate as a server device, may receive an authentication factor from at least three authentication devices in a group of three or more authentication devices via a guard device. The computing device may determine a probability that the respective user of each respective authentication device is a particular trusted user based on the received authentication factors. If the probability exceeds a threshold authentication probability, the computing device may send an authentication confirmation to a client device.Type: GrantFiled: January 12, 2018Date of Patent: August 24, 2021Assignee: ARCHITECTURE TECHNOLOGY CORPORATIONInventors: Benjamin L. Burnett, Ranga Ramanujan
-
Patent number: 11089012Abstract: A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device.Type: GrantFiled: September 18, 2017Date of Patent: August 10, 2021Assignee: ASSA ABLOY ABInventors: Masha Leah Davis, Mark Robinton, Peter F. Klammer
-
Patent number: 11082418Abstract: A system, method, apparatus, and computer program product for a privacy ensured brokered identity federation system. The privacy ensured brokered identity federation system connects a user in a brokered identity federation environment that blinds relying parties (RP) from credential service providers (CSP), blinds CSPs from RPs, and blinds a user's identity and data from the federation middleware hubs. The system utilizes ring signatures to attest to CSPs that a valid RP of the federation is making a request. The process utilizes CSP ring signatures to assure RPs that a valid CSP of the federation has provided a response. The process utilizes per transaction encryption keys created by the RP to ensure the federation has no access to data messages. It can further ensure that only the correct RP can decrypt a CSP response.Type: GrantFiled: February 13, 2018Date of Patent: August 3, 2021Assignee: Avalanche Cloud CorporationInventors: Mark A. Nelson, George S. Rathbun, Scott Kern
-
Patent number: 11062709Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.Type: GrantFiled: March 2, 2020Date of Patent: July 13, 2021Assignee: Google LLCInventor: Matthew Sharifi
-
Patent number: 11061999Abstract: Embodiments described include systems and methods for incorporating tags in content of network applications. An embedded browser, which is executable on one or more processors of a client device, may detect content from a network application accessed via the embedded browser. A DRM engine of the embedded browser identifies a DRM scheme for the network application from the plurality of DRM schemes and according to the network application. The DRM engine generates a DRM tag for the content according to the DRM scheme identified for the network application. The DRM tag includes a classification of the content. The DRM engine incorporates the DRM tag into the content for managing usage of the content according to the classification.Type: GrantFiled: November 6, 2018Date of Patent: July 13, 2021Assignee: Citrix Systems, Inc.Inventors: Vipin Borkar, Santosh Sampath, Deepak Sharma, Arvind SankaraSubramanian
-
Patent number: 11057435Abstract: A method is provided for identifying a strength of an input picture password formed by performing a sequence of gestures relative to a picture. The method includes storing, in a memory device, a crowdsource history of picture passwords each of which include a picture and a sequence of gestures on the picture. The method further includes generating, by a processor-based demography-based pattern usage assessment generator, a demography-based pattern usage assessment by analyzing the crowd source history. The method also includes providing, by a user-perceptible indication device, an indication of the strength of the input picture password in accordance with the demography-based pattern usage assessment.Type: GrantFiled: July 18, 2019Date of Patent: July 6, 2021Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Heidi Lagares-Greenblatt, Deepti Naphade
-
Patent number: 11025658Abstract: A method includes obtaining messages associated with assets in an enterprise system, splitting each of the messages into a set of tokens, determining a count of a number of occurrences of each of the tokens, and assigning weights to the tokens based at least in part on the counts of the number of occurrences of the tokens. The method also includes determining a score for each of the messages based at least in part on a combined sum of the weights for the set of tokens of that message, generating a summary of the messages by selecting a subset of the messages for based at least in part on the scores. The method further includes identifying remedial actions to be applied to assets in the enterprise system based at least in part on the summary of the messages, and implementing at least one of the identified remedial actions.Type: GrantFiled: May 3, 2019Date of Patent: June 1, 2021Assignee: EMC IP Holding Company LLCInventors: Sashka T. Davis, Kevin J. Arunski, Zulfikar A. Ramzan, Scott Moore, Abram Q. Thielke, Ed G. Quackenbush, Matthew D. Tharp
-
Patent number: 11025664Abstract: Systems, methods, and software described herein provide security actions based on the current state of a security threat. In one example, a method of operating an advisement system in a computing environment with a plurality of computing assets includes identifying a security threat within the computing environment. The method further includes, in response to identifying the security threat, obtaining state information for the security threat within the computing environment, and determining a current state for the security threat within the computing environment. The method also provides obtaining enrichment information for the security threat and determining one or more security actions for the security threat based on the enrichment information and the current state for the security threat.Type: GrantFiled: January 7, 2020Date of Patent: June 1, 2021Assignee: SPLUNK INC.Inventors: Sourabh Satish, Oliver Friedrichs, Atif Mahadik, Govind Salinas
-
Patent number: 11010044Abstract: Methods, systems and devices are provided for input of a sequence of digits such as a PIN code or password. A user can use swipe motions to choose the value of a digit and double tap to accept a digit, and swipe up to confirm that input of the sequence of digits is complete. Embodiments can be implemented on point of sale devices, merchant devices and customer devices including mobile devices.Type: GrantFiled: May 28, 2019Date of Patent: May 18, 2021Assignee: Shopify Inc.Inventors: Luke James Sartori, Mir Mustafa Ali, Theresa Jia Ying Zeng, David Grant Seal
-
Patent number: 11010762Abstract: Systems and methods for authentication code entry in touch-sensitive screen enabled devices are disclosed. In one embodiment, a method for entering data to a data entry device comprising at least one computer processor and a touch-sensitive screen may include (1) the touch-sensitive screen sensing a first input comprising at least one finger touch; (2) the touch-sensitive screen sensing a release of the first input; (3) the at least one computer processor determining a first number of finger touches in the first input; and (4) the at least one computer processor using the first number of finger touches to identify a first portion of an authentication code.Type: GrantFiled: October 8, 2018Date of Patent: May 18, 2021Assignee: VeriFone, Inc.Inventors: Imran A. Hajimusa, Glen Robson, Davey Faoro
-
Patent number: 11003723Abstract: System and method to acquire data from a deep web are provided. The system includes a processing subsystem. The processing subsystem includes a local virtual private network module configured to create at least one first virtual private network within a router. The system also includes a cloud virtual private network (VPN) module configured to create a plurality of second virtual private networks based on the at least one first virtual private network. The plurality of second virtual private networks is configured to enable an access to the deep web. The system also includes a plurality of virtual computing devices configured to access the deep web by one or more crawlers based on one or more parameters and to acquire the data from the deep web based on the one or more parameters. The system also includes a storage device configured to store the data acquired from the deep web.Type: GrantFiled: August 22, 2018Date of Patent: May 11, 2021Assignee: Marlabs Innovations Private LimitedInventor: Bimodh Jo Mathew
-
Patent number: 10986086Abstract: Techniques for protecting passwords and/or password entry by a user are provided. User identification data for a user can be received from a remote computing device. An identity of the user can be determined based on the user identification data. A password for the user can be determined. A modified keyboard configuration associated with the user can be determined. A request can be transmitted to the remote computing device for the password for the user based on the modified keyboard configuration. A modified password from the remote computing device can be received. A converted password based on the modified password and the modified keyboard configuration can be determined. The converted password can be compared to the password for the user. The user can be authorized when the converted password matches the password for the user.Type: GrantFiled: August 29, 2019Date of Patent: April 20, 2021Assignee: Capital One Services, LLCInventors: Fardin Abdi Taghi Abad, Reza Farivar, Jeremy Edward Goodsitt, Anh Truong, Kenneth Taylor, Mark Louis Watson, Kate Key, Vincent Pham, Austin Grant Walters
-
Patent number: 10977343Abstract: A display input device includes a reception processing portion, a change processing portion, and a display processing portion. The reception processing portion, based on correspondence information indicating a correspondence between a plurality of characters and a plurality of operation keys used for inputting a password of a preset number of characters, receives an operation of any one of the operation keys as an input operation of a character corresponding to the operation key. The change processing portion changes the correspondence relationship when the operation of the operation key is performed a preset specific number of times that is less than the number of characters of the password, or at a preset specific interval. The display processing portion displays the correspondence information at a predetermined position, different from a position of the operation keys, on an input screen used for inputting the password.Type: GrantFiled: September 14, 2018Date of Patent: April 13, 2021Assignee: KYOCERA Document Solutions Inc.Inventor: Hiromi Sakata
-
Patent number: 10970482Abstract: A piece of text is saved for security verification on a computing device. One or more pieces of related text corresponding to the piece of saved text are generated, where each text element of the one or more pieces of related text is generated based on its proximity to the corresponding text element of the piece of saved text on one or more keyboards on the computing device. A piece of input text is received for information verification. A piece of input text is compared with the piece of saved text and the one or more pieces of related text. A determination is made that the piece of input text matches one of the one or more pieces of related text and input guidance for re-entering a piece of text for security authentication is provided.Type: GrantFiled: November 27, 2017Date of Patent: April 6, 2021Assignee: Advanced New Technologies Co., Ltd.Inventor: Yong He
-
Patent number: 10949524Abstract: User authentication techniques are provided using a scene composed of selected objects. An exemplary method comprises obtaining enrollment information from a user, wherein the enrollment information comprises a first scene comprised of a first selection of objects; initiating a challenge to the user in connection with an authentication request by the user to access a protected resource; processing a second scene comprised of a second selection of objects submitted by the user in response to the challenge, and wherein the processing comprises determining a likelihood that the submitted second scene comprised of the second selection of objects matches the first scene comprised of the first selection of objects submitted by the user with the enrollment information; and resolving the authentication request based on the likelihood. Objects in the first selection of objects are optionally selected from a catalog and arranged into the first scene.Type: GrantFiled: October 31, 2018Date of Patent: March 16, 2021Assignee: RSA Security LLCInventors: Brian Mullins, Salah Machani, Millie Ng
-
Patent number: 10891374Abstract: The disclosed computer-implemented method for improving performance of cascade classifiers for protecting against computer malware may include receiving a training dataset usable to train a cascade classifier of a machine-learning classification system. A sample to add to the training dataset may be received. A weight for the sample may be calculated. The training dataset may be modified using the sample and the weight. A weighted training for the cascade classifier of the machine-learning classification system may be performed using the modified training dataset. Computer malware may be identified using the cascade classifier. In response to identifying the computer malware, a security action may be performed to protect the one or more computing devices from the computer malware. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 28, 2018Date of Patent: January 12, 2021Assignee: CA, INC.Inventors: Ryan Curtin, Keith Kenemer
-
Patent number: 10868807Abstract: Systems and methods for determining a pictograph password sequence and association phrase are provided. In some example embodiments, an assigned pictograph sequence request is received from a client device, with the request causing the system to generate a template pictograph sequence, generate an association phrase based on the template pictograph sequence, store the template pictograph sequence and associated phrase on a memory, and transmit instructions to cause a display of the template pictograph sequence and the association phrase. In some example embodiments, the system requires an input of a pictograph sequence that matches the template pictograph sequence in order for a user to view content. In some example embodiments, the template pictograph sequence may be replaced by a user pictograph sequence.Type: GrantFiled: December 6, 2018Date of Patent: December 15, 2020Assignee: Snap Inc.Inventors: Eric Buehl, Michael Cieslak
-
Patent number: 10867026Abstract: Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided through an input unit of a personal mobile device of the authorized user of the security system, are accessed. One or more signatures of the authorized user are defined and stored in a signature map. Subsequently, user identification input is received from an unauthenticated user using the personal mobile device. The user identification input received from the unauthenticated user is compared to one or more defined signatures in the signature map. The unauthenticated user is determined to be the authorized user if the received user identification input matches one of the defined signatures. The unauthenticated user is allowed to control the security system based on the determination that the unauthenticated user is the authorized user.Type: GrantFiled: June 13, 2019Date of Patent: December 15, 2020Assignee: Alarm.com IncorporatedInventors: Stephen Scott Trundle, Alison Jane Slavin
-
Patent number: 10862682Abstract: The present disclosure describes methods of encrypting and decrypting blocks of data stored in computer readable memory for a device using a block cipher with a nonce. In particular, methods of encrypting and decrypting blocks of data where the value of the nonce is based on previous execution instructions of a program executed by the device for a previously executed block are described. Embodiments disclosed include a method of encrypting blocks of data bits stored in computer readable memory for a device using a block cipher with a nonce and a key, the method comprising for each block of data: generating a value of the nonce based on previous execution instructions of a program executed by the device for a previously executed block of data; and encrypting the block of data with the nonce and key using the block cipher.Type: GrantFiled: July 20, 2015Date of Patent: December 8, 2020Assignee: NXP B.V.Inventor: Hugues de Perthuis
-
Patent number: 10855692Abstract: A system, method, and computer-readable medium are disclosed for generating an adaptive trust profile via an adaptive trust profile operation. In various embodiments the adaptive trust profile operation includes: monitoring a plurality of electronically-observable actions of an entity, the plurality of electronically-observable actions of the entity corresponding to a respective plurality of events enacted by the entity, the monitoring comprising monitoring at least one of the plurality of electronically-observable actions via a protected endpoint; converting the plurality of electronically-observable actions of the entity to electronic information representing the plurality of actions of the entity; and generating an adaptive trust profile based upon the action of the entity.Type: GrantFiled: May 17, 2019Date of Patent: December 1, 2020Assignee: Forcepoint, LLCInventor: Richard A. Ford
-
Patent number: 10853472Abstract: In one embodiment, an apparatus includes a non-volatile storage to store a seed value and a signature that is based on an iterative execution of a function for a predetermined number of intervals. The apparatus may further include the security processor coupled to the non-volatile storage, where the security processor is to independently recover a credential for an updated version of the firmware based at least in part on the seed value and a security version number for the updated version of the firmware. Other embodiments are described and claimed.Type: GrantFiled: June 28, 2018Date of Patent: December 1, 2020Assignee: Intel CorporationInventors: Xiaoyu Ruan, William A. Stevens, Jr.
-
Patent number: 10838668Abstract: A managing device used in an apparatus managing system including a print relational apparatus, terminals of users and a storing device manages the print relational apparatus and the users. The storing device stores user information of each user. The managing device includes a user authorizing part, a notification transmitting part and an information changing part. The user authorizing part authorizes, based on use history of the apparatus of each user, the user whose a nonuse period of the apparatus exceeds a predetermined period, as a registration erasure candidate user. The notification transmitting part transmits a registration erasure proposal notification having a proposal to erase registration of the candidate user to the terminal of a management user. The information changing part erases registration of the candidate user by erasing or changing the user information of the candidate user, according to indication inputted by the management user.Type: GrantFiled: July 5, 2019Date of Patent: November 17, 2020Assignee: KYOCERA Document Solutions Inc.Inventors: Kazuki Nishikai, Takeshi Nakamura, Satoshi Goshima, Dukil Park, Yuichi Obayashi, Takumi Nakamura, Koki Nakajima, Yasuo Nakashima
-
Patent number: 10834097Abstract: A system, method, and computer-readable medium are disclosed for generating an adaptive trust profile via an adaptive trust profile operation. In various embodiments the adaptive trust profile operation includes: monitoring a plurality of electronically-observable actions of an entity, the plurality of electronically-observable actions of the entity corresponding to a plurality of respective events enacted by the entity; converting the plurality of electronically-observable actions of the entity to electronic information representing the plurality of actions of the entity; and generating the adaptive trust profile based upon the plurality of actions of the entity, the adaptive trust profile comprising a plurality of adaptive trust profile components.Type: GrantFiled: May 17, 2019Date of Patent: November 10, 2020Assignee: Forcepoint, LLCInventor: Richard A. Ford
-
Patent number: 10826694Abstract: The present disclosure relates to a method for using a secret key for cryptographically processing a data item in an enclave enabled system. The method comprises: computing a first set of shares of the secret key and storing them in an encrypted format. Each encrypted share may be sent to respective component in a first set of components. In response to sending the encrypted shares, a modified encryption of the respective share may be received from each of the first set of components. Each of the received modified encryptions may be encrypted and the resulting modified share is sent to the respective first set of components. In response to sending the decrypted modified shares, a data item cryptographically processed using the respective share may be received from each of the first set of components. The received data items may be combined to obtain a cryptographically processed data item.Type: GrantFiled: April 23, 2018Date of Patent: November 3, 2020Assignee: International Business Machines CorporationInventors: Jan L. Camenisch, Manu Drijvers, Anja Lehmann, Kai Wilhelm Samelin
-
Patent number: 10810369Abstract: A piece of text is saved for security verification on a computing device. One or more pieces of related text corresponding to the piece of saved text are generated, where each text element of the one or more pieces of related text is generated based on its proximity to the corresponding text element of the piece of saved text on one or more keyboards on the computing device. A piece of input text is received for information verification. A piece of input text is compared with the piece of saved text and the one or more pieces of related text. A determination is made that the piece of input text matches one of the one or more pieces of related text and input guidance for re-entering a piece of text for security authentication is provided.Type: GrantFiled: November 27, 2017Date of Patent: October 20, 2020Assignee: Alibaba Group Holding LimitedInventor: Yong He
-
Patent number: 10778691Abstract: Various embodiments provide for the consolidation of policies across multiple identities that are respectively associated with multiple active directory (AD) groups to which a user belongs. Present embodiments provide for dynamically generating a new identity in the resource provider environment that includes permissions to all of the resources that may otherwise be distributed across multiple identities. Specifically, in accordance with various embodiments, when a user login is detected, the active directory is queried to determine the AD groups to which the user belongs. As mentioned, the user's AD groups are mapped to respective identities in the resource provider environment, in which each identity includes policy defining access to one or more resources. The policies of all the respective identities are consolidated and assigned to a new identity. The user may assume the new identity and access all the resources in tandem.Type: GrantFiled: December 7, 2017Date of Patent: September 15, 2020Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Robert W. Kissell, Eric Andrew Scholz
-
Patent number: 10771256Abstract: A method for generating an electronic signature of a user for an electronic document including establishing a secure Internet session between a telecommunication terminal of a user and a signature server computer system; receiving a code from the signature server computer system via a separate and/or separately secured side channel by the telecommunication terminal; transmitting a combination of code and authentication information of the user via the secure Internet session to the signature server computer system; checking the validity of the combination of code and authentication information by the signature server computer system; and generating the electronic signature of the user by a high-security module of the signature server computer system, wherein the private key of the user for generating the electronic signature is stored in the high-security module.Type: GrantFiled: April 25, 2016Date of Patent: September 8, 2020Assignee: BUNDESDRUCKEREI GMBHInventor: Christian Seegebarth
-
Patent number: 10740358Abstract: Embodiments of the invention provide systems and methods for managing and processing large amounts of complex and high-velocity data by capturing and extracting high-value data from low value data using big data and related technologies. Illustrative database systems described herein may collect and process data while extracting or generating high-value data. The high-value data may be handled by databases providing functions such as multi-temporality, provenance, flashback, and registered queries. In some examples, computing models and system may be implemented to combine knowledge and process management aspects with the near real-time data processing frameworks in a data-driven situation aware computing system.Type: GrantFiled: March 23, 2015Date of Patent: August 11, 2020Assignee: Oracle International CorporationInventors: Eric S. Chan, Dieter Gawlick, Adel Ghoneimy, Zhen Hua Liu
-
Patent number: 10726118Abstract: A secured computerized system comprising a computerized environment secured to prevent access thereto, other than by end-users who have passed a what-you-know authentication test: what-you-know testing functionality for administering a what-you-know user authentication test to end-user/s, including presenting image/s to end-user, and approving end-user to enter the computerized environment if end-user correctly selects predetermined location/s within the image; and a graphic what-you-know test-configuring functionality for displaying system-selected location/s within the image; providing a graphic interface operative for accepting, from, end-user/s, a user-selected modification of system-selected location/s; and storing, for each individual end-user, the user-selected modification as the individual end-user's predetermined location/s; or if no user-selected modification exists for an individual end-user, storing the system-selected location as the individual end-user's predetermined location.Type: GrantFiled: June 16, 2016Date of Patent: July 28, 2020Assignee: GOOGALE (2009) LTD.Inventors: Nir Michalowitz, Michal Peled Rosenvald
-
Patent number: 10686841Abstract: This disclosure provides an apparatus and method for dynamic customization of cyber-security risk item rules. A method includes interacting with a user, by a risk manager system, to define a plurality of rules for risk items to be monitored among a plurality of connected devices. The method also includes mapping each of the rules to a corresponding one or more of the connected devices by the risk manager system. The method further includes monitoring the connected devices according to the rules by the risk manager system. In addition, the method includes displaying an output based on the rules and a status of the connected devices by the risk manager system.Type: GrantFiled: May 24, 2018Date of Patent: June 16, 2020Assignee: Honeywell International Inc.Inventor: Seth G. Carpenter
-
Patent number: 10686966Abstract: Displaying an authentication interface on an operation panel associated with a printing device, the operation panel including a plurality of authentication areas. Receiving a user authentication request. Detecting a particular authentication pattern associated with the user authentication request. Retrieving a registered authentication pattern associated with the user. Comparing the particular authentication pattern with the registered authentication pattern. Determining, based on the comparing, whether the user authentication request is authorized. If the user authentication request is authorized, retrieving a first electronic document associated with the user, and printing the first electronic document.Type: GrantFiled: June 13, 2019Date of Patent: June 16, 2020Assignee: KYOCERA Document Solutions, Inc.Inventor: Arturo Becerra
-
Patent number: 10686767Abstract: Some embodiments provide convenient auto-authentication for user data on a primary device, while still providing a significant level of security, by taking advantage of existing security and cryptographic measures used to communicate with a secondary device. The primary device of some embodiments encrypts the user data on the primary device using a cryptographic key based on a set of keys received from the secondary device. In some embodiments, the primary device encrypts authentication data, or a local key generated from the authentication data, using a remote key received from the secondary device, and encrypts the user data with the local key. In some embodiments, the keys received from the secondary device are an existing set of keys for establishing an encrypted channel of communication for transmitting digital rights management (DRM) protected content according to a DRM protection scheme.Type: GrantFiled: September 23, 2016Date of Patent: June 16, 2020Assignee: Apple Inc.Inventors: Mitchell D. Adler, Andrew Roger Whalley
-
Patent number: 10638315Abstract: A method and an apparatus are provided for notifying a password in a mobile communication terminal. It is checked whether a password notification function is set. Input of a stored password is requested. An input password is received. It is checked whether the input password is identical to the stored password. Input of a stored secondary password is requested if the input password is not identical to the stored password. An input secondary password is received. It is checked whether the input secondary password is identical to the stored secondary password. A password is sent if the input secondary password is identical to the stored secondary password.Type: GrantFiled: March 6, 2015Date of Patent: April 28, 2020Assignee: Samsung Electronics Co., LtdInventor: Kyong-Su Kim
-
Patent number: 10635919Abstract: The purpose of the present invention is, when a portion of a subject to be detected is occluded, to simplify detecting that the occluded subject to be detected is the subject to be detected, regardless of the position which is occluded. Provided is an information processing device (110), comprising: a computation unit (111) which computes local scores for each of a plurality of positions which are contained in an image of a prescribed scope, said scores indicating the likelihood of an object to be detected being present; and a change unit (112) which changes the scores for the positions, among the plurality of positions, which are included in a prescribed region which is determined according to the plurality of scores which have been computed for said plurality of positions, such that the likelihood of the object to be detected being present increases.Type: GrantFiled: April 2, 2019Date of Patent: April 28, 2020Assignee: NEC CORPORATIONInventor: Kenta Araki
-
Patent number: 10621987Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining, for each of multiple words or sub-words, audio data corresponding to multiple users speaking the word or sub-word; training, for each of the multiple words or sub-words, a pre-computed hotword model for the word or sub-word based on the audio data for the word or sub-word; receiving a candidate hotword from a computing device; identifying one or more pre-computed hotword models that correspond to the candidate hotword; and providing the identified, pre-computed hotword models to the computing device.Type: GrantFiled: October 30, 2019Date of Patent: April 14, 2020Assignee: Google LLCInventor: Matthew Sharifi
-
Patent number: 10581893Abstract: Techniques of preventing sabotage attacks in cyber-physical systems involve automatically identifying links between nodes of a graph representing cyber-physical systems as vulnerable to sabotage attacks according to a vulnerability metric for each link. The vulnerability metric used depends on the particular sabotage attack used to determine the vulnerable links. Once a computer configured to design cyber-physical systems based on vulnerability to sabotage attacks receives data representing the graph, the computer enumerates the possible links between nodes of the graph along which a sabotage attack may be performed. For each of those links, the computer computes the vulnerability metric. The computer then ranks the links according to respective values of the vulnerability metric. Based on the ranking, a designer may then perform a mitigation analysis that results in changes to the graph to reduce the vulnerability at each node accessible to a malicious actor.Type: GrantFiled: December 6, 2017Date of Patent: March 3, 2020Assignees: Brigham Young University (BYU), Washington State UniversityInventors: Sean Warnick, Sandip Roy
-
Patent number: 10581853Abstract: Systems, methods, and a security management apparatus, for password management including the determination of the identity of a service requesting a security token for access to the service. The security management apparatus generates personal identification data based on a personal identification input such as a touch selection or gesture, in order to access a service on a secured device. Responsive to the personal identification data satisfying an access criterion, a communication channel is established with the secured device. The identity of the service on the secured device is determined and a security token, such as a password, is sent to the secured device via the communication channel.Type: GrantFiled: August 3, 2016Date of Patent: March 3, 2020Assignee: Huami Inc.Inventors: Zhenye Zhu, Xiao-feng Li
-
Patent number: 10573171Abstract: A method includes determining a status of a first device, receiving a first user input, and associating the first user input with the first device, wherein the first user input and the status of the first device is used to associate the first user input with the first device.Type: GrantFiled: May 23, 2017Date of Patent: February 25, 2020Assignee: Lenovo (Singapore) Pte. Ltd.Inventors: Russell Speight VanBlon, Nathan J. Peterson, John Carl Mese, Arnold S. Weksler
-
Patent number: 10575171Abstract: A communication apparatus receives information encrypted based on encryption information obtained by capturing an image of code information about the communication information from a different communication apparatus operating as an access point to form a wireless network. The communication apparatus and the different communication apparatus perform encrypted communication based on the information.Type: GrantFiled: January 23, 2017Date of Patent: February 25, 2020Assignee: Canon Kabushiki KaishaInventor: Fumihide Goto
-
Patent number: 10530784Abstract: Provided is process including receiving a request to authenticate a user; sending instructions to present an authentication user interface including a geographic map; receiving geolocations on the geographic map selected by the user; comparing the geolocations to a sequence of geolocations in an authentication credential to determine whether to authenticate the user.Type: GrantFiled: October 29, 2018Date of Patent: January 7, 2020Assignee: CA, Inc.Inventors: Sreenivasulu Bandi, Gaurav Kumar, Mitta Sarath Kumar, Shaik Mokhinuddeen
-
Patent number: 10509574Abstract: Techniques for implementing container credentialing by a host are described herein. In one example, a system for providing credentials includes a memory device for storing instructions and a processing device for executing instructions. The system can also include a container to execute a runtime environment for an application through the memory device and processing device, the application to request access to a credential locked resource. The system can also include a host environment to share the memory and the processing device with the container. In an example, the host environment may detect a request for a credential for the credential locked resource from the container. In an example, the host environment may also provide a credential for a credential locked resource to the container if the container is approved to receive the credential based on a policy.Type: GrantFiled: May 24, 2016Date of Patent: December 17, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Mark Novak, Benjamin Moore
-
Patent number: RE48707Abstract: A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic engine. The display element array includes one or more segments, and the driver outputs are configured to drive the one or more segments, respectively. The host controller is configured to send commands and data to the driver controller via the communication interface and the cryptographic engine is configured to encrypt communication data between the display element array and the host controller.Type: GrantFiled: April 24, 2019Date of Patent: August 24, 2021Assignee: BBPOS LIMITEDInventors: Chi Wah Lo, Hwai Sian Tsai