Credential Management Patents (Class 726/18)
-
Patent number: 9032216Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.Type: GrantFiled: September 14, 2012Date of Patent: May 12, 2015Assignee: Apple Inc.Inventors: Srinivas Vedula, Cameron Craig Morris
-
Patent number: 9032508Abstract: A pattern password trajectory configuration system used in an electronic device with a graphics input interface and a method using the same are provided. The disclosed pattern password trajectory configuration system includes a central processing module, a pattern defining module electronically connected the central processing module for defining the graphics input interface into a central block and multiple blocks neighboring the central block and assigning different data codes to the different blocks neighboring the central block, a sliding direction defining module electronically connected to the central processing module for assigning different prime numbers to define different sliding directions moving along the blocks neighboring the central block, and a touch sequence defining module electronically connected to the central processing module for counting and recording touch sequences of sliding among the blocks neighboring the central block.Type: GrantFiled: June 12, 2013Date of Patent: May 12, 2015Assignee: Yankey Information Co., Ltd.Inventor: Chun-Yu Chu
-
Patent number: 9032507Abstract: An access request authentication method, an authorization information generation method, an access request authentication system, and a hardware device. The access request authentication method includes: obtaining the current clock information; receiving a first access request, where the first access request includes a first input code; and determining whether to authorize the first access request based on the current clock information and the first input code.Type: GrantFiled: February 27, 2013Date of Patent: May 12, 2015Assignee: International Business Machines CorporationInventors: Chang Jie Guo, Hongbin Lin, Peng Ji, Feng Li, Qian Ma, Lin Yang, Yu Zhang
-
Publication number: 20150128254Abstract: There is provided a method that includes (a) including in a dataset, data indicative of a time, (b) executing a hash function on the dataset to yield a hash value, and (c) employing the hash value as a password for a user to access a device. There is also provided a method that includes (a) including in a dataset, data indicative of a time, (b) executing a hash function on the dataset to yield a hash value, (c) determining that the hash value matches a password from a user, and (d) granting to the user, access to a device. There are also provided systems that perform the methods and storage devices that contain instructions for causing processors to perform the methods.Type: ApplicationFiled: March 22, 2013Publication date: May 7, 2015Applicant: Ambient CorporationInventors: Ramdas Sitaram Rao, David James Mitton
-
Patent number: 9027119Abstract: An apparatus and method are disclosed for determining authentication frequency (i.e., the length of time between authenticating and re-authenticating a user) and challenge type (e.g., username/password, fingerprint recognition, voice recognition, etc.) based on what software applications a user is running on a data-processing system, and how those applications are being used (e.g., what functions are used, what data is input to or output by the application, how often and for how long applications are used, what input devices and output devices are used, etc.) Advantageously, the illustrative embodiment enables authentication frequency and challenge type to be adjusted based on the likelihood of malicious activity and/or the potential cost of malicious activity, as inferred from current and past application usage. In addition, the illustrative embodiment enables selection of an authentication challenge type that is less intrusive to a user based on current application usage.Type: GrantFiled: September 29, 2008Date of Patent: May 5, 2015Assignee: Avaya Inc.Inventors: Jon Louis Bentley, George William Erhart, Lawrence O'Gorman, Michael J. Sammon, David Joseph Skiba
-
Patent number: 9025765Abstract: A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content data in dependence on respective keys. A key provider 106 determines the respective key used for the processing of a respective block of the content data in dependence on a respective portion 112 of the predetermined system data 104, the portion not including all the predetermined system data, wherein different respective portions of the predetermined system data are selected for the respective blocks of content data. A server system 200 for increasing data security comprises an output 202 for providing processed content data 110 to a client system 100, the client system comprising predetermined system data 104 to be protected. The server system 200 also comprises a cryptographic unit 208 and a key provider 206.Type: GrantFiled: May 19, 2008Date of Patent: May 5, 2015Assignee: Irdeto B.V.Inventors: Wilhelmus Petrus Adrianus Johannus Michiels, Paulus Mathias Hubertus Mechtildis Antonius Gorissen, Boris Skoric
-
Publication number: 20150121509Abstract: A display apparatus includes a display panel, a display condition setting unit that defines a specified display point in a specific screen as a display point of a one-time password for a specified user and sets a display condition for the one-time password, and a password display unit that displays, to the specified user, the one-time password at a display point included in the display condition based on the display condition set by the display condition setting unit when the specific screen is displayed in the display panel.Type: ApplicationFiled: October 31, 2014Publication date: April 30, 2015Inventors: Yosuke Nakazato, Yoshitaka Matsuki, Makoto Kowaka
-
Publication number: 20150113633Abstract: An authentication method using a password of an electronic device is provided. The method includes receiving a password. The method also includes determining whether the received password coincides with a password stored in advance. The method further includes determining whether an input condition at the time of password input coincides with a password input condition stored in advance when the received password coincides with the password stored in advance. The method includes executing a function when the input condition at the time of password input coincides with the password input condition stored in advance.Type: ApplicationFiled: October 23, 2014Publication date: April 23, 2015Inventor: Donghyun Yeom
-
Patent number: 9015802Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for privacy protection. In one aspect, a method includes accessing personally identifiable information (PII) type definitions that characterize PII types; identifying PII type information included in content of a web page, the PII type information being information matching at least one PII type definition; identifying secondary information included in the content of the web page, the secondary information being information that is predefined as being associated with PII type information; determining a risk score from the PII type information and the secondary information; and classifying the web page as a personal information exposure risk if the risk score meets a confidentiality threshold, wherein the personal information exposure risk is indicative of the web page including personally identifiable information.Type: GrantFiled: September 12, 2013Date of Patent: April 21, 2015Assignee: Google Inc.Inventors: Muthuprasanna Muthusrinivasan, Paul Haahr, Matthew D. Cutts
-
Patent number: 9015826Abstract: A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third authentication key for each function called by an application program. The apparatus may store the first authentication key and an identifier for identifying the application program in a first storage unit, the second authentication key and the identifier in a secret domain of a second storage unit, and register the third authentication key and the identifier as a function parameter in the application program. Subsequently, if the function is called by the application program, the apparatus may determine values for the first authentication key, the second authentication key, and the third authentication key corresponding to the called function, and may perform authentication processing using the three authentication key values.Type: GrantFiled: September 16, 2011Date of Patent: April 21, 2015Assignee: Pantech Co., Ltd.Inventor: Jae Choon Park
-
Patent number: 9015809Abstract: A first device establishes a connection with a second device and attempts access, via the connection to an enterprise server of an enterprise. The first device may have a number of security perimeters, ones of which are allowed to use various communications proxies provided by the second device. If the first device and the second device are associated with a same common enterprise, an enterprise perimeter of the first device may be enabled to access the enterprise using an enterprise proxy of the second device.Type: GrantFiled: July 31, 2012Date of Patent: April 21, 2015Assignee: BlackBerry LimitedInventors: Michael Stephen Brown, Herbert Anthony Little, Graham Russell, David Francis Tapuska
-
Publication number: 20150106918Abstract: When user information to be registered for SNMP authentication is input, an information processing apparatus confirms whether or not user information for MFP authentication is already managed for a user to be registered who is indicated by the input user information. In the case where the user information for MFP authentication is not managed for the user to be registered, the information processing apparatus registers the input user information as user information for SNMP authentication. In the case where the user information for MFP authentication is managed for the user, the information processing apparatus registers information specific to SNMP authentication, i.e. information other than an authentication password, out of the input user information.Type: ApplicationFiled: September 24, 2014Publication date: April 16, 2015Inventor: Tetsuya Yamada
-
Patent number: 9009815Abstract: An approach is provided to increase password strength in a group of users. The approach detects a password event corresponding to one of the users. In response to the detected password event, the approach identifies a strength of the user's password and compares it to one or more password strength metrics that correspond to the group of users. The password strength comparison data is then transmitted as feedback back to the user.Type: GrantFiled: March 15, 2013Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Olgierd Stanislaw Pieczul, Mary Ellen Zurko
-
Patent number: 9009777Abstract: A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set of roles assigned to the user is also identified. From the two sets of roles, all roles that are common to both sets are identified in a subset of roles. Roles in this subset are assigned to the user and are sufficient for the action. One or more roles from this subset of roles is selected for activation depending on system policies in effect. Selected roles are automatically activated without requiring any intervention from the user. Once the selected roles are activated, they can become inactive upon completion of the current action, or remain active for subsequent actions by the user during all or part of a user session. System policies can decide how the roles are selected for activation, and the duration of which the roles remain active once activated.Type: GrantFiled: November 30, 2006Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Saurabh Desai, Niteesh Kumar Dubey, Yantian Tom Lu, Ravi A. Shankar, Murali Vaddagiri, Drew Thomas Walters, Xinya Wang
-
Patent number: 9009814Abstract: A computer-implemented method for generating secure passwords may include 1) displaying a user interface for entering a textual password, 2) receiving user input via the user interface to select a color for at least one character of the textual password, 3) displaying the entered textual password via the user interface by displaying the character in the selected color and by displaying at least one additional character in at least one additional color, and 4) generating a modified textual password by encoding the textual password with information relating the selected color to the character. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 20, 2012Date of Patent: April 14, 2015Assignee: Symantec CorporationInventors: Henry Wertz, Charles Andrew Payne, Eric Wagner
-
Patent number: 9009486Abstract: An authentication processing device receives biometric data to be checked from a biometric measuring device; transforms the biometric data that is input from the biometric measuring device by using a checking transformation parameter that is different from a registration transformation parameter; and creates checking biometric data. Then, the authentication processing device performs a differential transformation process on the created checking biometric data by using a differential parameter by which a transformation state transformed by the checking transformation parameter and a transformation state transformed by the registration transformation parameter have the same state. Thereafter, the authentication processing device checks the transformed checking biometric data against the registration biometric data stored in a transformation registration data DB and performs authentication.Type: GrantFiled: September 23, 2011Date of Patent: April 14, 2015Assignee: Fujitsu LimitedInventors: Hironori Yokoi, Toshio Endoh
-
Patent number: 9009817Abstract: A portable data or information carrier in the form of a smart card with partially or fully virtualized components. To maximize the confidentiality of information stored in the carrier, and more specifically to limit the amount of information available to a potential defrauder, electronic components such as circuits, I/O, cryptographic, memory and dummy objects are built, modified or influenced on demand from physical characteristics of an eligible person or device. Digitized unique biometric or hardware identifiers are read upon start-up and runtime of the device and, in case of an eligible person or device, subsequently supply all values necessary for determination of the characteristics of the user specific virtual smart cards objects, their placement and connections. By multi-factor authentication, the end-user or device will retain sole control of its keys and use them for authentication, signature or encryption purposes as if he had a physical smart card in his hand.Type: GrantFiled: March 12, 2013Date of Patent: April 14, 2015Assignee: Open Invention Network, LLCInventor: Martin Wieland
-
Patent number: 9007929Abstract: A system for correlating communication packets across different communication networks includes a first monitoring agent in a first network for collecting local identifying information of a communication packet at a communication node. The first monitoring agent pairs the local identifying information with a public identifying information of the packet for a second network. The first monitoring agent further adds a timestamp to the collected information. A second monitoring agent in the second network receives a communication packet from the communication node and collects public identifying information of the packet. The second monitoring agent adds a time-stamp to the collected information. A third monitoring agent in the second network receives the information collected by the first and the second monitoring agents and correlates packets based on the received information.Type: GrantFiled: December 30, 2010Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: William Duchenay, Yohann A. Duchenay, Paul B. French, Paul F. Klein, Cathal O'Donovan
-
Patent number: 9003540Abstract: Cross Site Request Forgery (CSRF) and other types of fraudulent submission can be mitigated using state information that typically is already maintained for various users. Each submission requiring authentication can include a state identifier (ID). The state ID can be compared to a corresponding secure state ID stored in a secure location, such as in a secure token or cookie or in a variable on a page that can only be accessed by code executing in the same security context as the site to which the request is made. If the received state ID is valid and matches the secure state ID, the submission is processed. Otherwise, an interstitial element is generated to prompt the user to confirm the prior submission. A subsequent confirmation submission confirming the prior submission and containing the proper state ID can be processed. If no such confirmation is received, the submission is not processed.Type: GrantFiled: October 7, 2009Date of Patent: April 7, 2015Assignee: Amazon Technologies, Inc.Inventors: Jesper M. Johansson, Eric J. Martin, Brandon M. Knight
-
Patent number: 9003493Abstract: Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool.Type: GrantFiled: June 26, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Matthew G. Marum, Samuel G. Padgett, Steven K. Speicher, Michael J. Tabb
-
Patent number: 9003494Abstract: Automatic authorization of users and configuration of a software development environment can include selecting a task defined within a project plan of a software system under development, wherein the task specifies a development tool and a user, and automatically authorizing, using a centralized data processing system, the user to access the development tool.Type: GrantFiled: June 27, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Matthew G. Marum, Samuel G. Padgett, Steven K. Speicher, Michael J. Tabb
-
Patent number: 8997192Abstract: A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and performs the one-time-password algorithm within a secure boundary associated with the TPM. In some embodiments the TPM generates one-time-password data structures and associated parent keys and manages the parent keys in the same manner it manages standard TPM keys.Type: GrantFiled: May 17, 2013Date of Patent: March 31, 2015Assignee: Broadcom CorporationInventors: Mark Buer, Douglas Allen
-
Patent number: 8997209Abstract: A memory device includes a plurality of memory chips, including one or more memory chips that store authentication information, and a controller including a first register that stores information indicating a representative memory chip, from among the one or more memory chips that store the authentication information, that stores valid authentication information.Type: GrantFiled: March 14, 2013Date of Patent: March 31, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Won-Seok Lee, Young-Kug Moon
-
Patent number: 8996605Abstract: In a service providing system, a client includes a transmitting unit configured to transmit specification information associated with specifications of the client to the management server, a receiving unit configured to receive registration completion information from a management server, a transmitting unit configured to transmit a request for service information to a service providing server, and a service prohibition unit configured to prevent receipt of the service information from the service providing server until the registration completion information is received after transmission of the specification information.Type: GrantFiled: June 23, 2006Date of Patent: March 31, 2015Assignee: Brother Kogyo Kabushiki KaishaInventors: Makoto Matsuda, Kiyotaka Ohara, Kazuma Aoki
-
Patent number: 8997191Abstract: Embodiments of the invention relate to collecting keystroke timing data of samples of a phrase input by a user on an input device during different user sessions, and creating a biometric user template based on the timing data collected during the different sessions. Once a sufficient number of samples are collected, the template may be used to authenticate the user.Type: GrantFiled: February 3, 2009Date of Patent: March 31, 2015Assignee: Servicesource International, Inc.Inventors: Yvonne J. Stark, Mechthild Reginu Kellas-Dicks
-
Patent number: 8996880Abstract: An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a second electrocardiogram measurement in response to a specific combination of keys of a keyboard being pressed for a specific period of time, wherein each key in the specific key combination includes an electrocardiogram sensor on a top surface of the key, to authorize a user and log the user onto the information handling system when the second electrocardiogram measurement matches the first electrocardiogram measurement, and otherwise: to deny access to the information handling system; to increase a counter; to determine whether the counter has exceeded a threshold; and to request that an input window is displayed when the counter has exceeded the threshold.Type: GrantFiled: May 16, 2013Date of Patent: March 31, 2015Assignee: Dell Products, LPInventors: David Konetski, Frank H. Molsberry
-
Patent number: 8996859Abstract: An authentication apparatus includes an accepting unit and an instructing unit. The accepting unit accepts a request, which requests to issue an authentication medium for a second user, from a first user who is authenticated. The instructing unit instructs to issue the authentication medium for the second user.Type: GrantFiled: February 2, 2010Date of Patent: March 31, 2015Assignee: Fuji Xerox Co., Ltd.Inventor: Sunao Hashimoto
-
Patent number: 8990899Abstract: Provided are a method, system, and computer program product for a local authorization extension to provide access authorization for a module to access a computing system. A memory stores information on a first validity range comprising position coordinates for a module seeking to access the computing system and a second validity range comprising position coordinates for a location authorization extension for a computing system. A determination is made of a first position signal from a first receiver of the module and of a second position signal from a second receiver of the location authorization module. Determinations are made as to whether the first position signal is within the first validity range and whether the second position signal is within the second validity range. The module is granted access to the computing system in response to determining that the first position signal is within the first validity range and the second position signal is within the second validity range.Type: GrantFiled: November 27, 2012Date of Patent: March 24, 2015Assignee: International Business Machines CorporationInventors: Jens-Peter Akelbein, Wolfgang Mueller-Friedt
-
Patent number: 8990907Abstract: Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service instance credentials. In one scenario, a computer system establishes a shared credential for a shared service that includes multiple shared service instances, where the shared credential uniquely identifies the shared service. The computer system establishes a service instance credential for each shared service instance that uniquely identifies each shared service instance and maintains a relationship between the service instance and the shared service. The relationship provides service instance access to the shared credentials as the shared credentials are updated over time. Then, upon determining that the shared credentials have been updated and are no longer valid, the shared service instance accesses the updated shared credentials using the established relationship.Type: GrantFiled: November 9, 2012Date of Patent: March 24, 2015Assignee: Microsoft CorporationInventors: David A. Matson, Kahren Tevosyan, Mark Russinovich
-
Patent number: 8990926Abstract: A method for protecting a password of a computer having a non-volatile memory is disclosed. A password is stored in a non-volatile memory of a computer. The computer is then transitioned to a power saving state. In response to a detection of an unauthorized access to the non-volatile memory during the power saving state transition, a password input is requested from a user. The computer returns to a power-on state from the power saving state when there is a success in authentication of the input password.Type: GrantFiled: December 10, 2012Date of Patent: March 24, 2015Assignee: Lenovo (Singapore) Pte LtdInventors: Mikio Hagiwara, Eitaroh Kasamatsu, Yasumichi Tsukamoto, Naoyuki Araki
-
Patent number: 8984602Abstract: A processing device comprises a processor coupled to a memory and is configured to receive authentication information from a user, to generate a message authentication code based at least in part on the received authentication information, to generate a credential for a particular access control interval based at least in part on the message authentication code and an intermediate value of a hash chain, and to provide the credential to a user in order to allow the user to access a protected resource in the particular access control interval. The message authentication code may be generated over a message payload that includes a password provided by the user. The credential may comprise a combination of the message authentication code and the intermediate value of the hash chain.Type: GrantFiled: June 28, 2013Date of Patent: March 17, 2015Assignee: EMC CorporationInventors: Daniel V. Bailey, William M. Duane, Aaron Katz
-
Patent number: 8984583Abstract: A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.Type: GrantFiled: March 13, 2013Date of Patent: March 17, 2015Assignee: Accenture Global Services LimitedInventors: Rafae Bhatti, Paul D. Martin
-
Publication number: 20150074795Abstract: One-time password (OTP) generation apparatus and method using virtual input means are provided. Reference information generated by a reference information generation unit is compared with identification information. When the reference information is identical to the identification information, a value corresponding to indication information is generated as an OTP.Type: ApplicationFiled: October 24, 2013Publication date: March 12, 2015Inventors: Young Man HWANG, Sung-Min JOO
-
Publication number: 20150074418Abstract: A method and an apparatus are provided for operating an electronic device. The electronic device recognizes biometric data of a user that is input to the electronic device. Information related to an input error of the biometric data based on the recognition of the biometric data is presented to the user.Type: ApplicationFiled: September 10, 2014Publication date: March 12, 2015Applicant: Samsung Electronics Co., Ltd.Inventors: Yohan LEE, Mooyoung KIM, Gajin SONG, Jinho HYEON
-
Patent number: 8977844Abstract: An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes formatting the token at the client in response to the status of the token being unformatted.Type: GrantFiled: August 31, 2006Date of Patent: March 10, 2015Assignee: Red Hat, Inc.Inventors: Steven William Parkinson, Robert B. Lord
-
Patent number: 8972741Abstract: A biometrics authentication device utilizes biometrics information and performs individual authentication enables secure modification of authorization details for an authorized agent other than the principal. A verification device verifies biometrics information registered on an IC card against biometrics information detected by a detection unit. When results in satisfactory biometrics authentication, modification of authorization details of an authorized agent, registered on the IC card, is permitted. Authorization details for an authorized agent can be securely modified on a card on which biometrics information for the principal and the authorized agent is registered.Type: GrantFiled: January 24, 2006Date of Patent: March 3, 2015Assignees: Fujitsu Limited, Fujitsu Frontech LimitedInventors: Kiyotaka Awatsu, Takahiro Kudoh, Masashi Sano, Masanori Ohkoshi
-
Patent number: 8959634Abstract: Methods and systems reduce exposure to a dictionary attack while verifying whether data transmitted over a computer network is a password. In one aspect, a method includes performing a search of network traffic based, at least in part, on a weak validation using a Bloom filter based on an organizational password file, determining the existence of a password in the network traffic based only on the weak validation, and determining whether to block, alert, or quarantine the network traffic based at least in part on the existence of the password in the network traffic.Type: GrantFiled: March 22, 2013Date of Patent: February 17, 2015Assignee: Websense, Inc.Inventor: Lidror Troyansky
-
Patent number: 8959618Abstract: A method and apparatus for managing the expiration of a password. In one embodiment, the method comprises determining whether a behavior anomaly associated with an account has occurred. In response to a determination that the behavior anomaly has occurred, the method expires a password associated with the account and forces the password be changed the next time the password is presented for accessing the account.Type: GrantFiled: February 5, 2008Date of Patent: February 17, 2015Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8959644Abstract: A popularity determination module (PDM) is described which reduces the effectiveness of statistical guessing attacks. The PDM operates by receiving a password (or other secret information item) from a user. The PDM uses a model to determine whether the password is popular among a group of users. If so, the PDM may ask the user to select another password. In one implementation, the model corresponds to a probabilistic model, such a count-min sketch model. The probabilistic model provides an upper-bound assessment of a number of times that a password has been encountered. Further, the probabilistic model provides false positives (in which passwords are falsely assessed as popular) at a rate that exceeds a prescribed minimum rate. The false positives are leveraged to reduce the effectiveness of statistical guessing attacks by malicious entities.Type: GrantFiled: October 27, 2010Date of Patent: February 17, 2015Assignee: Microsoft CorporationInventors: Stuart E. Schechter, Cormac E. Herley, Michael D. Mitzenmacher
-
Patent number: 8959619Abstract: A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images, having different background colors, the correct image and background color which correspond to the user's computer account. In one advantageous form, in addition to selecting the correct image, the user must first enter a username and password. In an alternative form, if a user is seeking access to a computer network by using a preapproved access point or computer having an approved IP address, a user is allowed to gain access to the computer network without being prompted to select a correct image.Type: GrantFiled: December 21, 2011Date of Patent: February 17, 2015Assignee: Fleet One, LLC.Inventors: Ted Sanft, John Overland, Andy Roberts
-
Patent number: 8959360Abstract: Methods, systems, and apparatus for voice authentication and command. In an aspect, a method comprises: receiving, by a data processing apparatus that is operating in a locked mode, audio data that encodes an utterance of a user, wherein the locked mode prevents the data processing apparatus from performing at least one action; providing, while the data processing apparatus is operating in the locked mode, the audio data to a voice biometric engine and a voice action engine; receiving, while the data processing apparatus is operating in the locked mode, an indication from the voice biometric engine that the user has been biometrically authenticated; and in response to receiving the indication, triggering the voice action engine to process a voice action that is associated with the utterance.Type: GrantFiled: August 15, 2013Date of Patent: February 17, 2015Assignee: Google Inc.Inventor: Hugo B. Barra
-
Patent number: 8959603Abstract: An authentication system by which character strings in squares are selected by a rule determined by a user out of a table in which character strings are assigned to obtain a one-time password. The user memorizes a rule of successively selecting three out of the positions of the squares in a table having five rows and five columns, for example. To each square (402) in the table (401) to be presented to the user, a randomly generated two-digit number is assigned. The table (401) is presented to the user, who arranges the numbers in the squares (402) on the basis of the user's own rule to generate a six-digit number used as a one-time password for authenticating the user. Therefore, the rule for obtaining a one-time password is easy for the user to memorize and a long one-time password can be obtained.Type: GrantFiled: January 9, 2009Date of Patent: February 17, 2015Inventor: Hideharu Ogawa
-
Patent number: 8959653Abstract: A method, server and system for obtaining a licensed application is provided. In one example embodiment, the method comprises: receiving an application download request from a user of the electronic device by way of an input mechanism associated with the electronic; transmitting a download request from the electronic device to an application delivery server; receiving an application from the application delivery server at the electronic device; receiving a license key from the application delivery server; and automatically injecting the license key into the application.Type: GrantFiled: February 19, 2010Date of Patent: February 17, 2015Assignee: BlackBerry LimitedInventor: Paul Mark Joseph Dumais
-
Patent number: 8959620Abstract: A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit. In the method, the display is configured to display a start point, and a plurality of displayed paths. The receiving unit is configured to detect a set of user-input movements of a contact point at the display. The processing unit is configured to determine whether the user-input movements conform with a predefined valid user-input gesture, store a plurality of codes corresponding to the valid user-input gestures, and to compose the authentication password according to valid ones of the series of the user-input movements.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: Mitac International Corp.Inventors: Ching-Teng Hsueh, Hui-Chun Yang
-
Publication number: 20150047016Abstract: A technique for user identification based on a user input. As to one aspect of the technique, a device (100) comprises a pattern generator (102), a user interface (104), and a transmitter (106). The pattern generator (102) is adapted to generate a pattern (Y0, Y1, . . . , Yn). The user interface (104) is adapted to correlate the pattern and the user input. The transmitter (106) is adapted to transmit a signal (X0, X1, . . . , Xm) indicative of a result of the correlation to a receiver (108).Type: ApplicationFiled: June 6, 2012Publication date: February 12, 2015Applicant: ZF FRIEDRICHSHAFEN AGInventor: Siegfried E. WILHELM
-
Patent number: 8955070Abstract: Apparatus which control modification of passwords by implementing a procedure by which end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and Linkedln. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed. Te apparatus may be in the form of a computer system or a computer readable storage medium.Type: GrantFiled: March 12, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Nathan Fontenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson
-
Patent number: 8955101Abstract: The present disclosure discloses an upper-order computer, a lower-order computer, a monitoring system and a monitoring method, so as to eliminate the disadvantages of low standardization level and small scale in manually setting and adjusting performance parameters. The upper-order computer includes a central control module and an information interacting module, the information interacting module including a human-computer interacting unit, and the central control module including a processing unit, a display control unit and a parameter configuring unit, wherein the processing unit is adapted for controlling a lower-order computer by sending control commands; the display control unit is adapted for processing effective operating data acquired from the lower-order computer, and is adapted for instructing the human-computer interacting unit to perform presenting; and the parameter configuring unit is adapted for configuring parameters of the lower-order computer by sending parameter configuring commands.Type: GrantFiled: July 15, 2011Date of Patent: February 10, 2015Inventors: Yulin Su, Ben Cai, Rijun Huang
-
Patent number: 8955071Abstract: A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed.Type: GrantFiled: October 23, 2013Date of Patent: February 10, 2015Assignee: International Business Machines CorporationInventors: Nathan Fortenot, Jeffrey D George, Ryan P Grimm, Joel H Schopp, Michael T Strosker, George C Wilson
-
Patent number: 8949617Abstract: Methods and systems for disrupting password attacks using compression are described. A user password may be stored on a mobile computing device. The password may be compressed, for example, using a Huffman compression algorithm, and may be subsequently encrypted using a short secret as a key. The user password may be stored as the compressed and encrypted key. The compressed and encrypted password may be stored such that a brute force password attack, for example, using every possible short secret, would reveal too may possible matches to allow an attacker to select the real password.Type: GrantFiled: May 3, 2013Date of Patent: February 3, 2015Assignee: Citrix Systems, Inc.Inventor: Richard Hayton
-
Patent number: 8949972Abstract: An information recording system includes a recording medium capable of limiting a function by password and an information recording device for controlling the recording medium. The recording medium stores an input password, counts updating event(s) of a password, stores the update count of the password, outputs information stored in the password related information storage according to a READ request issued from the information recording device, compares a input password with a password stored in the password register, limits a predetermined function of the recording medium according to the comparison result from the password comparator. The information recording device stores a password and a password identification ID which is associated with the update count of the password, selects a password with reference to the update count of the password and the password identification ID and outputs the selected password into the recording medium to compare the passwords.Type: GrantFiled: March 1, 2013Date of Patent: February 3, 2015Assignee: Panasonic Intellectual Property Management Co., Ltd.Inventors: Takeshi Otsuka, Haruo Ohta