Management Patents (Class 726/6)
  • Publication number: 20140282936
    Abstract: Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device to a network of the customer hosted by the computing resource provider. The computing resource provider reconfigures a set of computing resources so that the devices of the customer are able to communicate with the device as if the device was in the customer's own network.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventor: Amazon Technologies, Inc.
  • Publication number: 20140282937
    Abstract: A device newly introduced to a network is automatically credentialed to be able to communicate over a network before the device first communicates with the network. For example, at a point of purchase, a user can provide network identification information to a merchant computing device that effects transfer of that information to the new device such that the new device can communicate directly with the network without initial credentialing directly between the unique device and the local network. In another example, the merchant computing device communicates with the local network to register a newly purchased device with the local network before the newly purchased device is introduced to the network. Accordingly, the network is configured to begin communications with the unique device without initial credentialing directly between the unique device and the local network.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: THE CHAMBERLAIN GROUP, INC.
    Inventor: Jordan Ari Farber
  • Publication number: 20140282935
    Abstract: Various embodiments are generally directed to the provision and use of a secure enclave defined within a storage of a computing device by a processor element thereof to store executable instructions of an OTP component implementing logic to generate and use one-time passwords (OTPs) to enable access to services provided by another computing device. An apparatus includes a storage; a first processor element; and first logic to receive a one-time password (OTP) routine, store the OTP routine within a first secure enclave defined by the first processor element within the storage, obtain a measure of the contents of the first secure enclave with the OTP routine stored therein, transmit the first measure to a computing device, and receive an OTP seed. Other embodiments are described and claimed.
    Type: Application
    Filed: March 12, 2013
    Publication date: September 18, 2014
    Inventors: RESHMA LAL, MATTHEW E. HOEKSTRA
  • Publication number: 20140282951
    Abstract: Systems and methods for providing secured network access are provided. A user device located within range of a hotspot initiates a request sent via an open communication network associated with the hotspot. The request concerns secured network access at the hotspot by the user device. A unique pre-shared key is generated for the user device based on information in the received request and transmitted over the open communication network for display on a webpage accessible to the user device. The unique pre-shared key is stored in association with information regarding the user device. The user device may then use the unique pre-shared key in subsequent requests for secured network access.
    Type: Application
    Filed: June 2, 2014
    Publication date: September 18, 2014
    Applicant: Ruckus Wireless, Inc.
    Inventors: Prashant Ranade, Ming-Jye Sheu
  • Publication number: 20140282940
    Abstract: A method and apparatus for multi-domain authentication is described. In one example, credentials are received for a user accessing a first domain. User access to the first domain and a second domain is confirmed. A token is created for access to the second domain and the is provided with access to the second domain.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: salesforce.com,inc.
    Inventors: Christopher Williams, Atul Singh, Oleksandr Khimich, Fang Wong
  • Publication number: 20140282943
    Abstract: An authentication component to authenticate users can generate a unique identification for a user based on device characteristics, operating characteristics, and the like. The authentication component can provide authentication of a user to applications. Applications can provide a user with personalized content based on the authentication.
    Type: Application
    Filed: March 18, 2013
    Publication date: September 18, 2014
    Applicant: Rawllin International Inc.
    Inventor: Andrey N. Nikankin
  • Publication number: 20140282954
    Abstract: To provide an identification information managing system capable of preventing an identification code image indicating identification information on a user from being obtained and used by other people while preventing increase of frequency of update of the identification information. An identification information storage unit (60) stores identification information on a user. A display control unit (74) displays an identification code image indicating the identification information on a display unit of a user terminal (20). A detection unit (62) detects a predetermined event indicating that there is a possibility that the identification code image is obtained by other people while the identification code image is displayed on the display unit of the user terminal (20). An update unit (68) updates the identification information stored in the identification information storage unit (60), based on a result of detection by the detection unit (62).
    Type: Application
    Filed: March 21, 2013
    Publication date: September 18, 2014
    Applicant: RAKUTEN, INC.
    Inventor: Yasuharu Watanabe
  • Publication number: 20140282949
    Abstract: The longstanding problems of user password management and security, and user authentication are addressed. Disclosed is a system and method for providing a means for a user to identify themselves with configurable levels of authentication in order to receive limited access or services while protecting user privacy. As a user inputs information related to their identity into an interface, the system searches an indexed database which may include both registered users and/or unregistered customers indexed from disparate data sources. The system presents the user matching results from the search in an obscured form from which the user selects and authenticates his or her identity.
    Type: Application
    Filed: March 17, 2014
    Publication date: September 18, 2014
    Applicant: Kaarya LLC
    Inventors: Ujjual Nath, Gaurav Sharma, William Fletcher
  • Publication number: 20140282946
    Abstract: A method which controls modification of passwords. An end user designates, in advance, a universe of social media contacts such as friends on social media web sites such as Facebook and LinkedIn. Contacts so identified are used as a set of potential identity verifiers. In order to enable a reset or modification of an account password, a subset of the universe is required to assert that they have verified the identity of the user requesting to reset a password. Such verification can be accomplished by varying means by those to whom an inquiry has been directed.
    Type: Application
    Filed: October 23, 2013
    Publication date: September 18, 2014
    Applicant: International Business Machines Corporation
    Inventors: Nathan Fortenot, Jeffrey D. George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosker, George C. Wilson
  • Publication number: 20140282942
    Abstract: Example implementations described herein are directed to authentication based on the user's private factors, while not revealing at the server side information allowing the server (or anyone with the server's information) to deduce the private answers. In example implementations, the user answers a questionnaire with authentication factors, wherein the answers are transformed in a one-way fashion and the transformed answers are provided to the server side. Example implementations facilitate authentication based on polynomial interpolation or other methods to permit a user to authenticate, even if the user does not answer all of the questions correctly.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Omer BERKMAN, Marcel M.M. YUNG
  • Publication number: 20140282948
    Abstract: A method for automatically transforming elements of a user generated signal that defines a password, using software encoded on a computer readable medium, in such a way that a transformed signal is produced that is difficult to guess using trial and error methods.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 18, 2014
    Inventor: Mark Rodney Anson
  • Publication number: 20140282947
    Abstract: The systems, methods and apparatuses described herein provide a computing device configured for ensuring its proximity to a communication partner. In one aspect, the computing device may comprise a communication port and a processor. The processor may be configured to receive a request from the communication partner via the communication port, send a response to the request to the communication partner, generate a secondary value that includes a selected portion of the request and a selected portion of the response, generate authenticating data to authenticate the secondary value and send the generated secondary value and authenticating data to the communication partner via the communication port. In another aspect, the communication partner is configured to ensure proximity of the computing device.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 18, 2014
    Applicant: OLogN Technologies AG
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20140282944
    Abstract: Systems and methods to deploy a cloud platform are provided. In exemplary embodiments, virtual servers are set up in a physical server to form a resource pool that includes resources. User account information and an online request of a user are received from a remote computing device of the user via a network. Based on the user account information and the online request of the user, custom resources are selected from the resource pool, and allocated for the user. Cloud platform deployment related information includes custom resource information, cloud platform deployment environment information, and cloud platform deployment instructions for example. The cloud platform deployment related information is visually presented, using one or more processors, on a GUI of the computing device of the user to facilitate the user to remotely deploy the cloud platform via the network.
    Type: Application
    Filed: August 19, 2013
    Publication date: September 18, 2014
    Applicant: Stackinsider Technology LLC
    Inventor: Jinglei Li
  • Publication number: 20140282941
    Abstract: Methods, systems, and computer-readable media are provided. In some embodiments, a first computing system receives a credential from a browser on a second computing system, determines whether the credential is valid, generates a string of numeric characters, associates the string of numeric characters with the credential, and sends the string of numeric characters to the second computing system. Furthermore, in some embodiments, the first computing system receives an identifier that identifies a security token, determines whether the identifier matches an entry in a data store, prompts a user to input information via a user interface, receives a string of characters via the user interface, determines whether the string of characters received via the user interface matches the string of numeric characters, and performs a registration process such that the identifier is associated with a user account in the data store, the user account associated with the credential.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: CANON INFORMATION AND IMAGING SOLUTIONS, INC.
    Inventor: Hiroshi Yasuhara
  • Patent number: 8839384
    Abstract: Methods and systems for maintaining user privacy preferences based on one or more user identifications across a plurality of applications are provided. Two or more user identifications are received with associated user privacy preferences. The received user identification is compared against other user identifications to determine if the user identifications relate to the same user. It may be determined that two user identifications are related if they have at least one browser property in common. A consolidated data stream of the user privacy preferences for the related user identifications is created. The consolidated data stream is communicated to one or more applications and propagated to maintain the user privacy preferences across the applications relating to the user identification.
    Type: Grant
    Filed: September 1, 2010
    Date of Patent: September 16, 2014
    Assignee: Microsoft Corporation
    Inventors: Siddhartha Roy, Sijian Zhang, Michael Elizarov, Shaoyu Zhou, Fei Cao
  • Patent number: 8838959
    Abstract: A centralized password repository (CPR) provides network users with a password portal through which the user can manage password access to domains and applications on the network. A subset of the domains and applications on the network may be required, by design, to maintain a separate password infrastructure. For these systems, the CPR establishes a secure and authenticated communication channel and software on the system interfaces with the password infrastructure to synchronize the password in the system password infrastructure with the password in the CPR. For other systems not required to maintain a separate password infrastructure, the CPR performs password services by responding to requests from those systems seeking to validate user IDs and passwords. The CPR enables an administrator to modify network privileges and enables a user to alter passwords on the network through a single interface.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: September 16, 2014
    Assignee: Rockstar Consortium US LP
    Inventor: Christopher Raymond Lewis
  • Patent number: 8839398
    Abstract: A security token access device, a user device such as a computing device or communications device, and a method for managing multiple connections between multiple user devices and the access device. The access device maintains connection information, including security information, for each user device securely paired with the access device. Each time a new user device is paired with the access device, the access device transmits a notification to the user devices already paired to the user device. A user may provide instructions to the access device to terminate a pairing with one of the user devices by overwriting at least a portion of the connection information associated with the designated user device. A user device may further request a listing of all user devices currently paired with the access device.
    Type: Grant
    Filed: January 16, 2012
    Date of Patent: September 16, 2014
    Assignee: BlackBerry Limited
    Inventors: Neil Patrick Adams, Herbert Anthony Little
  • Patent number: 8839415
    Abstract: A smart card issuance system and method are disclosed. In a first aspect a method and system for issuing a smart card device (SC) is disclosed. The method and system comprise providing an initialization phase of the SC by a manufacturer and providing an authentication phase of the SC by the manufacturer. The method and system also include deploying the SC, providing a first time authentication phase for a specific customer by the issuer (IS) after the SC is deployed and starting a first phase of the registration process of the SC for the specific customer by the issuer. The method and system further include providing another authentication phase of the SC by IS after the first time authentication; and providing of an authentication of the IS by the SC. When both the SC and IS are mutually authenticated, the IS and the specific customer are allowed to complete the registration process. In a second aspect, a data transmission process and system for a smart card device (SC) of an issuer (IS) is disclosed.
    Type: Grant
    Filed: February 1, 2011
    Date of Patent: September 16, 2014
    Assignee: Kingston Technology Corporation
    Inventor: Ben Wei Chen
  • Patent number: 8838803
    Abstract: Systems and techniques for mediating user communications. A user persona manager maintains one or more user profiles and manages user interactions with other parties and with service providers based on user preferences associated with the user profile or profiles selected for a particular interaction. The persona manager receives a single set of user authentication information to establish the user identity, and provides previously stored information to other parties and service providers as appropriate, and otherwise conducts user interactions involving communications initiated by or on behalf of the user. The persona manager also examines interactions initiated by others, selects user profiles appropriate to the interactions, and routes and responds to the interactions based on information stored in the user profiles.
    Type: Grant
    Filed: December 20, 2007
    Date of Patent: September 16, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Richard Bennett
  • Patent number: 8839394
    Abstract: A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated.
    Type: Grant
    Filed: May 13, 2009
    Date of Patent: September 16, 2014
    Assignee: Finsphere Corporation
    Inventors: Charles L. Dennis, Randall A. Snyder, Patrick J. Boyle
  • Patent number: 8839385
    Abstract: Each of multiple computing devices of a user is registered by obtaining therefrom identifying indicia, obtaining from the user a device-specific password for the computing device, and storing the obtained identifying indicia and device-specific password for the computing device in an entry for the user in a credentials database. The user requests access to a restricted service by way of a particular one of the multiple computing devices with credentials including the device-specific password for the particular computing device, and identifying indicia are obtained therefrom. The obtained identifying indicia and the device-specific password of the particular computing device appear in the entry, and the user is thus granted access to the restricted service.
    Type: Grant
    Filed: September 25, 2012
    Date of Patent: September 16, 2014
    Assignee: United Services Automobile Association (USAA)
    Inventor: Brian F. Shipley
  • Patent number: 8839383
    Abstract: Identity-independent authentication tokens enable issuance of a single strong credential that can be mapped to an individual at each of multiple accounts within the online world. An issuer generates one or more authentication tokens for issuance to individuals or other entities. In some instances, each of these authentication tokens comprises a unique serial number. The individual or other entity may then request an authentication token from the issuer. The issuer may then issue the token to the individual without the need to ask or require the individual to identify his or herself. The individual may then map this issued authentication token to the individual's password at each of the individual's online accounts.
    Type: Grant
    Filed: August 20, 2007
    Date of Patent: September 16, 2014
    Assignee: Goldman, Sachs & Co.
    Inventor: Richard Van Horn
  • Patent number: 8838977
    Abstract: Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. The watermark extraction results can be stored in a secure location and accessed by other devices at different times. These operations can be conducted by one or more trusted devices that reside in a home network. The home network can also include a gateway device that can coordinate the operations of the various network devices and/or delegate the various watermark extraction and content screening operations.
    Type: Grant
    Filed: April 5, 2011
    Date of Patent: September 16, 2014
    Assignee: Verance Corporation
    Inventors: Joseph M. Winograd, Rade Petrovic, Jian Zhao
  • Publication number: 20140259131
    Abstract: A system and method for creating a security certificate is presented. A request for a security certificate is received from a requester. The request includes an identification of a web site or an entity associated with the web site. An applicant for the security certificate is identified using the request, and information about the applicant for the security certificate is retrieved. The information about the applicant includes a name of the applicant. The information about the applicant is analyzed to determine whether the information about the applicant includes personal information of an individual. When the information about the applicant includes personal information of an individual, the security certificate is generated, wherein the security certificate does not include the personal information of an individual.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: Go Daddy Operating Company, LLC
    Inventors: Leanne N. Gough, David Wootan, Wayne Thayer
  • Publication number: 20140259132
    Abstract: A system and method for creating a security certificate is presented. A request for a security certificate is received from a requester. The request includes an identification of a web site or an entity associated with the web site. An applicant for the security certificate is identified using the request, and information about the applicant for the security certificate is retrieved. The information about the applicant includes a name of the applicant. The information about the applicant is analyzed to determine whether the information about the applicant includes personal information of an individual. When the information about the applicant includes personal information of an individual, the security certificate is generated, wherein the security certificate does not include the personal information of an individual.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Applicant: Go Daddy Operating Company, LLC
    Inventors: Leanne N. Gough, David Wootan, Wayne Thayer
  • Publication number: 20140259133
    Abstract: Proposed invention refers to a method for anonymously associating health monitoring device measurements to a user ID. The invention comprises the steps of: registering in a server a user associated with an ID and a first set of metadata; registering a health monitoring device associated to a second ID and a second set of metadata; then, sending through a first communication channel the ID associated to the user and the first set of metadata to the server by a communication device; taking a measurement of the user by the health monitoring device and sending through a second communication channel said measurement associated to the second ID and the second set of metadata to the server; comparing the metadata stored in the server; and finally associating the first ID with the measurements taken by the health monitoring device corresponding to the second set of metadata, being based the association on the results of the previous comparison.
    Type: Application
    Filed: March 5, 2014
    Publication date: September 11, 2014
    Applicant: Vodafone IP Licensing Limited
    Inventors: Patricia ALONSO DIAZ, Daniel ALMODÓVAR HERRÁIZ, Guillermo ESTEVE ASENSIO
  • Publication number: 20140259130
    Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
    Type: Application
    Filed: March 5, 2013
    Publication date: September 11, 2014
    Inventors: Hong Li, Rita H. Wouhaybi, Tobias Kohlenberg
  • Patent number: 8832808
    Abstract: A new identification (ID) technology comprising unified and standardized object identification within Cyber Space is disclosed based upon intrinsic properties of the entity to be identified. This Cyber Gene ID (or Cyber ID) technology extracts intrinsic information from either the physical users or their cyberspace counterparts, and such information is categorized into client parameters, dynamic parameters, static parameters, cloud parameters, connection parameters and user parameters.
    Type: Grant
    Filed: August 11, 2011
    Date of Patent: September 9, 2014
    Inventors: Nanjie Liu, Jun Sun, Haitao Zhao, Chengjie Gu, Dapeng Li
  • Patent number: 8832453
    Abstract: Embodiments of the present invention provide for recycling a locked token in an enterprise. A secure connection can be established between a locked token and a server and a security process activated to determine an identity of an authorized user of the locked token. An unlock procedure can be activated to unlock the locked token upon receipt of an out-of-band parameter associated with a requester of the unlock procedure to produce an unlocked token. The out-of-band parameter can be provided by the requester of the unlock procedure in an independent communication to an enterprise agent associated with the security server so as to verify that the requester is the authorized user of the locked token. A password reset process associated with a new password for the unlocked token can be activated to provide an assigned password or a password entered by the requester.
    Type: Grant
    Filed: February 28, 2007
    Date of Patent: September 9, 2014
    Assignee: Red Hat, Inc.
    Inventor: Robert Lord
  • Patent number: 8832806
    Abstract: End users of a multi-factor authentication service can utilize an account management service, and third-party website can register to utilize the multi-factor authentication service. Registering a third-party website can comprise the multi-factor authentication service receiving a valid digital identity certificate for the third-party website, and receiving an agreement to terms of use of the multi-factor authentication service for the third-party website. Once received, the multi-factor authentication service can enable the third-party website to utilize the service (e.g., switch the service on, or send an authorization key to the third-party website). Further, registering a user to the multi-factor authentication service can comprise determining availability of service, and providing a location-specific access code. Additionally, registering the user can comprise registering the user's mobile device, for example, to provide multi-factor authentication.
    Type: Grant
    Filed: October 15, 2012
    Date of Patent: September 9, 2014
    Assignee: Microsoft Corporation
    Inventors: Raymond E. Ozzie, Jack E. Ozzie, Thomas A. Galvin, Eric M. Patey
  • Patent number: 8832814
    Abstract: System and method configured to provide an access management system configuration that provides the benefits of single sign-on while reducing internal hardware and administration maintenance costs. The system is reconfigured to provide an access control module that directs authentication network traffic such that access management agents are not required to be installed on the application server for each protected application. The system provides a redirection of a login request from the application server to an external security gateway that authenticates the user via policy and sends authenticated user credentials on a back channel to the access control module to obtain a session cookie which is redirected back to the user so the user can establish a session with the application. The solution reduces the plethora of agents to be maintained and upgraded in order to remain compatible with the evolving hosting software, reducing both hardware and administration maintenance costs.
    Type: Grant
    Filed: July 2, 2013
    Date of Patent: September 9, 2014
    Assignee: FMR LLC
    Inventors: Michael Timothy Coletta, Kevin W. Park, Jon Alexander Lenzer
  • Patent number: 8832809
    Abstract: Various embodiments provide systems for registering a user with one or more websites. Such systems comprise at least one processor configured to: receive an IP address for a computing device being used by the user; and after receiving the IP address: (1) obtain a location associated with the IP address; and (2) identify whether the user is in a jurisdiction that permits the user to register with a website. The systems may then receive one or more parameters obtained from the user, upon which the systems verify an age of the user; determine which of the one or more types of transaction activities the user is permitted to conduct; query one or more registration attempts over a predetermined previous time period to identify duplicate or similar parameters; and verify the user's identity based at least on one of the one or more parameters. Associated methods are also provided.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: September 9, 2014
    Assignee: UC Group Limited
    Inventors: Kobus Paulsen, Christopher D. Thom, Ian Hughes, Mark Holland
  • Patent number: 8831224
    Abstract: A method for establishing secure wireless communications between a mobile device and a vehicle, where a user is not required to enter a password, but instead the telematics system is used to bootstrap the trust between the mobile device and the vehicle. The user initiates the process by pressing a button on the mobile device to request pairing. The vehicle uses its secure OnStar cellular communication link to verify the mobile device with the OnStar server, which generates and sends a session key to the vehicle via the vehicle-OnStar cellular connection, and also sends the session key to the mobile device via the device's own cellular connection. The session key serves as a shared secret, such that the vehicle can issue a secrecy challenge to the mobile device. When the mobile device responds appropriately, a trusted wireless communications link can be established between the mobile device and the vehicle.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: September 9, 2014
    Assignee: GM Global Technology Operations LLC
    Inventors: Fan Bai, Nader M. Rabadi, David P. Pop, John J. Correia
  • Patent number: 8832807
    Abstract: Apparatus and method for computer-based or mobile-device-based electronic generation and verification of dynamic password, or one-time-password (OTP), that does not require initial synchronization, nor re-synchronization, between a client OTP generator and the corresponding OTP server, is provided. It employs the general OTP principles and methods to ensure the single-use of the password credential and the security strength of the OTP, and it utilizes instant dynamic parameter(s) communications for equivalent instant synchronization (EQ-sync). It can also be used to ensure integrity and authenticity of an online transaction request.
    Type: Grant
    Filed: August 2, 2011
    Date of Patent: September 9, 2014
    Inventors: Christine E. Kuo, David E. Kuo, Hui-Hsin Wu, James S. Kuo
  • Patent number: 8832431
    Abstract: A method of requesting and issuing a certificate from certification authority for use by an initiating correspondent with a registration authority is provided. The initiating correspondent makes a request for a certificate to the registration authority, and the registration authority sends the request to a certificate authority, which issues the certificate to the registration authority. The certificate is stored at a location in a directory and this location is associated with a pointer such as uniform resource locator (URL) that is derived from information contained in the certificate request. The initiating correspondent computes the location using the same information and forwards it to other corespondents. The other correspondents can then locate the certificate to authenticate the public key of the initiating correspondent.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: September 9, 2014
    Assignee: Certicom Corp.
    Inventors: Paul Neil Fahn, James Semple
  • Publication number: 20140250512
    Abstract: User Authentication A mobile user authentication application is operable to perform one or more of the following operations: •authenticate a user in a voice call to a telephony service, by passing an authentication code to the telephony service within the voice call [FIGS. 2, 2c]; •validate a user instruction during a secure messaging session [FIG. 3]; and •authenticate a user at a physical local service by obtaining a challenge code at that local service, validating the challenge code with a remote authentication service, obtain a confirmation code from the authentication service and presenting the confirmation code for validation at the local service [FIGS. 4, 4a and 4b].
    Type: Application
    Filed: September 25, 2012
    Publication date: September 4, 2014
    Inventors: Jeremy Goldstone, Dermot Dwyer
  • Publication number: 20140250511
    Abstract: A mobile device user is able to execute an app in a federation of wrapped apps without having to login to that app provided that the user has already logged into another app in that federation. The federation of apps on the device uses multi-app authentication to enable the user to start subsequent apps after explicitly entering login credentials for another app in that federation. This feature is loosely referred to as single sign-on for apps in the federation. The multi-app authentication is implemented by giving the second app a chance to prove two facts. One that it knows where in the operating system keychain a login ticket is stored and two, what the hash value of a random byte array is. By showing these facts, the logged-into app can safely provide login credentials to subsequent app without the user having to enter a login name or password.
    Type: Application
    Filed: May 16, 2014
    Publication date: September 4, 2014
    Inventor: H. Richard KENDALL
  • Publication number: 20140250510
    Abstract: A digital data sampler operating in a computer processor selects and stores digital data samples from a data stream used for generating audio-visual output during a session with a client operated by a user. The session generates the data stream independently of the data sampler. The data sampler may collect parameter data correlated to a probability will be remembered by the user at some future time, for each sample. The data sampler may store the data samples and parameter data as shared secret data for use in a future authentication session. During a future authentication session, an authentication device selects test data from the shared secret data to generate sensible output in an authentication process. The authentication process grants access to a controlled resource in response to user input indicating specific knowledge of the shared secret data selected from a presentation of similar sensible outputs.
    Type: Application
    Filed: May 12, 2014
    Publication date: September 4, 2014
    Inventor: Gary Stephen Shuster
  • Publication number: 20140250508
    Abstract: A method includes storing a credential object for a user to an encrypted silo on an information handling system. The credential object operates to authenticate the user to use an application. The method also includes copying the encrypted silo from the information handling system to a second information handling system, retrieving at the second information handling system the credential object from the copy of the encrypted silo, and authenticating the user to use the application on the second information handling system using the credential object.
    Type: Application
    Filed: March 4, 2013
    Publication date: September 4, 2014
    Applicant: DELL PRODUCTS, LP
    Inventors: Daniel L. Hamlin, Kenneth W. Stufflebeam, Amy C. Nelson
  • Publication number: 20140250509
    Abstract: Methods, systems, and computer readable media can be operable to pair a client device with a CPE device. The methods, systems and computer readable media described in this disclosure can enable the pairing of a client device with a CPE device upon a connection of the client device to a whole-network associated with the CPE device. Further, methods, systems and computer readable media can enable the secure pairing of a client device with a CPE device with little to no user-input.
    Type: Application
    Filed: March 4, 2014
    Publication date: September 4, 2014
    Applicant: ARRIS Group, Inc.
    Inventor: Carol J. Ansley
  • Publication number: 20140250490
    Abstract: Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTPP.
    Type: Application
    Filed: December 27, 2011
    Publication date: September 4, 2014
    Inventors: Jim S. Baca, Tobias M. Kohlenberg, Hong Li, David Stanasolovich, Mark H. Price, Steven J. Birkel, Kenneth W. Reese, Ronald Tafoya
  • Patent number: 8826416
    Abstract: A method for unlocking an electronic device, a first image in a first area and a second image in a second area selected on a touch panel of the electronic device are received. The method combines the first image and the second image to obtain a selected combination image, and unlocks the electronic device upon the condition that the selected combination image is stored in a storage unit of the electronic device.
    Type: Grant
    Filed: June 19, 2012
    Date of Patent: September 2, 2014
    Assignee: Hon Hai Precision Industry Co., Ltd.
    Inventors: Shu-Ping Chen, Hsiao-Ping Chiu
  • Patent number: 8826396
    Abstract: A customer initiated password reset system resets user passwords on a variety of network entities, such as internal systems, allowing simultaneous reset with a minimum number of user specified passwords that nonetheless satisfy the password specifications of these internal systems. Thereby, the user avoids the tedium of logging into each of these systems, changing their password, logging out, etc., for each system with the likelihood of creating unique passwords for each system that have to be remembered. By further incorporating a score metric based upon how many character sets are touched, a required degree of complexity can be measured and enforced against the password specifications. Advantageously, a table-based approach to enforcing password reset against the multiple password specifications facilitates making and fielding updates.
    Type: Grant
    Filed: December 28, 2007
    Date of Patent: September 2, 2014
    Assignee: Wells Fargo Bank, N.A.
    Inventors: Jeffrey John Jancula, Charles William Porter, Linda Lee Fix
  • Patent number: 8826388
    Abstract: A secure VPN connection is provided based on user identify and a hardware identifier. A client application may initiate the VPN connection. A client device user may provide identification information to the application, which then sends a VPN connection request to a remote VPN gateway. The VPN gateway may require an equipment identifier to establish the secure VPN gateway. If the hardware ID is registered, the secure VPN connection is established. If the hardware ID is not registered with the VPN gateway, the connection may be denied. In some instances, a connection may be established with an unregistered equipment ID based on settings at the VPN gateway.
    Type: Grant
    Filed: February 16, 2012
    Date of Patent: September 2, 2014
    Assignee: SonicWALL, Inc.
    Inventors: Christopher Dean Peterson, Venkatesh N. Gautam
  • Patent number: 8823497
    Abstract: Biometric authorization is provided for a passive secure data card. An additional layer of security may be provided in the form of a biometric password. Session timing may be enforced to limit opportunities of third parties to snoop transmitted information while providing ample time to complete the card transaction. Biometric retries may be enforced to limit opportunities of third parties to hack the biometric security.
    Type: Grant
    Filed: February 14, 2012
    Date of Patent: September 2, 2014
    Assignee: International Business Machines Corporation
    Inventors: Richard Hutzler, Steve Ngoc Nguyen, Nelson Jay Smith, IV, Thomas Guthrie Zimmerman
  • Patent number: 8826397
    Abstract: A method for securely authenticating a user of a consumer device at an access device comprising the following steps. First, a dynamic data element and a first set of transactional information is sent to the consumer device from the access device. Next, the consumer device creates an authentication code as a function of at least the dynamic data element, a subset of the first set of transactional information, and a password. The authentication code, along with other data, is then sent from the consumer device back to the access device. The access device then uses the authentication code to send an authentication request message to the service provider of the user. The service provider then attempts to authenticate the user by recreating the authentication code and comparing the recreated authentication code with the authentication code received from the access device.
    Type: Grant
    Filed: January 15, 2009
    Date of Patent: September 2, 2014
    Assignee: Visa International Service Association
    Inventors: John F. Sheets, Simon Hurry
  • Patent number: 8826033
    Abstract: A virtual machine on a physical host computer provides controlled access to protected data by creating and storing a “stored system fingerprint” from stable system values (SSVs) as existing when creating the stored system fingerprint. The SSVs include virtual-machine-specific values that change upon cloning the virtual machine (VM) but do not change upon migration of the VM. Upon a request for access to the protected data, a current system fingerprint is calculated from the SSVs as existing when processing the request, the current system fingerprint is compared to the stored system fingerprint to determine whether there is a predetermined degree of matching, and the requested access to the protected data is permitted only if there is the predetermined degree of matching.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: September 2, 2014
    Assignee: EMC Corporation
    Inventors: Ajay Venkateshan Krishnaprasad, Parasuraman Narasimhan, Robert Polansky, Magnus Nyström
  • Patent number: 8826398
    Abstract: In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: September 2, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Alan H Karp
  • Patent number: 8826407
    Abstract: A mechanism for the flow of access by derivation is provided. An access point may be any object, such as files or functions, to which the access recipient is granted access rights by the access provider. Access is typically represented by a relationship object referencing the access provider function, the access recipient function, and the access point object, and a set of access rights. This membership access relationship object is typically represented as a subtype of the access relationship. When a membership access relationship is created, typically a new associated persona function is generated, representing the new identity created for the access recipient function while serving as a member of the access point function. When a persona function is invited to be a member in another function, that in turn generates a membership and a second persona that is derived from the first persona, resulting in identity derivation.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: September 2, 2014
    Assignee: Skai, Inc.
    Inventor: Charles E. Henderson
  • Patent number: 8825548
    Abstract: Systems and methods are disclosed herein to allow a party to a multiple-party transaction to perform authentications using identification information received from another party while allowing the party generating the identification information to maintain confidentiality of information. A user may enter an access code to identify the user to a first party that will be generating identification information to a second party in the transaction. The access code may be entered without requiring the entry of an alphanumeric PIN (Personal Identification Number). The first party may convert the access code to a second code for transmission to the second party so that the access code is not revealed to the second party. The second party may use the second code to authenticate the user, to authenticate a payment transaction or other types of communications from the user or the first party. Thus, parties in a multiple-party transaction may perform authentications while maintaining the confidentiality of information.
    Type: Grant
    Filed: June 30, 2009
    Date of Patent: September 2, 2014
    Assignee: eBay Inc.
    Inventor: Khurram Khan