Management Patents (Class 726/6)
-
Patent number: 8213608Abstract: Techniques for generating a portion of a split private key are provided. A first symmetric key and a second symmetric key different than the first symmetric key are generated at a first location. The generated second symmetric key and a first one of multiple factors for generating the private key portion encrypted with the generated first symmetric key are transmitted. Then, at a second network location, the symmetric keys are again generated. The encrypted first factor is received at the second network location subsequent to a user authentication based upon the second symmetric key generated at the second network location. The received encrypted first factor is then decrypted with the first symmetric key generated at the second network location, the decrypted first factor usable to generate the portion of the split private key of the asymmetric key pair.Type: GrantFiled: September 8, 2008Date of Patent: July 3, 2012Assignee: VMware, Inc.Inventors: Ravinderpal Singh Sandhu, Brett Jason Schoppert, Ravi Ganesan, Mihir Bellare, Colin Joseph deSa
-
Patent number: 8214877Abstract: Embodiments of the present invention provide systems and methods for developing policies which govern entities and applying the developed policies against representations of entities, where the representations are contained in a repository. One embodiment of a method of the present invention includes obtaining a policy comprising a rule, wherein the rule comprises a condition associated with compliance to the rule, generating one or more filters according to the condition, applying the one or more filters to a plurality of representations in a repository, wherein each representation represents an entity and determining a set of entities compliant with the rule based on the application of the one or more filters to the plurality of representations.Type: GrantFiled: May 22, 2007Date of Patent: July 3, 2012Assignee: Troux TechnologiesInventors: Mikal Grimes, William Corbett, Alex Devine
-
Publication number: 20120167186Abstract: The invention relates to a method for reading the at least one attribute stored in an ID token (106, 106?), wherein the ID token is assigned to a user (102), having the following steps: Authentication of the user with respect to the ID token, Authentication of a first computer system (136) with respect to the ID token, after successful authentication of the user and the first computer system with respect to the ID token, read access of the first computer system to the at least one attribute stored in the ID token, generation of a first soft token through providing a signature to the at least one attribute read from the ID token via the first computer system, sending the first soft token to a device.Type: ApplicationFiled: July 5, 2010Publication date: June 28, 2012Applicant: BUNDESDRUCKEREI GMBHInventor: Frank Dietrich
-
Patent number: 8209746Abstract: It is intended to achieve a user authentication system capable of forcibly presenting a content to a user. Provided is a content presentation-type authentication system designed to allow a client to perform a content presentation-type user authentication in which user authentication is performed in such a manner that a plurality of pattern elements arranged in a given pattern are presented as a presentation pattern to a user who intends to be authenticated, and a one-time password derivation rule is used as a password of the user and applied to certain ones of the pattern elements located at specific positions in the presentation pattern to create a one-time password, and a content is forcibly presented to the user in connection with the user authentication.Type: GrantFiled: December 30, 2010Date of Patent: June 26, 2012Assignee: Computer Systems Engineering Co., Ltd.Inventors: Shigetomo Tamai, Toru Takano, Shigeo Akutsu
-
Patent number: 8209749Abstract: Techniques for uninterrupted virtual private network (VPN) connection service with dynamic policy enforcement are provided. An existing VPN session between a VPN client and a VPN server detects a change in a VPN network being used for the existing VPN session. New credentials and new policies are received by the VPN client. The new credentials are automatically used to re-authenticate the VPN client to the change during the existing VPN session, and the new policies are dynamically used to enforce the new policies during the existing VPN session on the VPN client.Type: GrantFiled: September 17, 2008Date of Patent: June 26, 2012Assignee: Apple Inc.Inventors: Allu Babula, Vishnu Govind Attur, Gautham Chambrakana Ananda
-
Patent number: 8209541Abstract: A system and method links first and second computers of a network to implement a single sign on feature. The first computer generates a link request having a plaintext component and a hashed component. The plaintext component includes an identifier associated with the first network computer and information for locating a resource of the second network computer. The hashed component includes a first hash result formed by applying a hashing function to the plaintext component and a secret known to the first network computer and the second network computer. The second computer authenticates the link request without using a two-way encryption process by generating a second hash result by applying the hashing function to the plaintext component of the link request and the secret and comparing the first hash result with the second hash result.Type: GrantFiled: August 10, 2010Date of Patent: June 26, 2012Assignee: RPX CorporationInventors: Frank Deutschmann, Benjamin J. Tilly
-
Patent number: 8209745Abstract: System(s) and method(s) provide access management to femto cell service through access control list(s) (e.g., white list(s)). White list(s) includes a set of subscriber station(s) identifier numbers, codes, or tokens, and also can include additional fields for femto cell access management based on desired complexity. White list(s) can have associated white list profile(s) therewith to establish logic of femto coverage access based on the white list(s). Various example aspects such as white list(s) management, maintenance and dissemination; automatic population or pre-configuration; and inclusion of wireless device(s) or subscriber(s) are also provided. A component can implement automatic population of white list fields based at least in part on a set of received identifiers. In addition, autonomously determined identifiers can be employed to populate a white list.Type: GrantFiled: November 21, 2008Date of Patent: June 26, 2012Assignee: AT&T Mobility II LLCInventors: Kurt Donald Huber, Judson John Flynn, William Gordon Mansfield
-
Publication number: 20120159577Abstract: Techniques to allow a security policy language to accommodate anonymous credentials are described. A policy statement in a security policy language can reference an anonymous credential. When the policy statement is evaluated to decide whether to grant access to a resource mediated by the policy statement, the anonymous credential is used. The policy language can be implemented to allow one anonymous credential to delegate access-granting rights to another anonymous credential. Furthermore, an anonymous credential can be re-randomized to avoid linkage between uses of the anonymous credential, which can compromise anonymity.Type: ApplicationFiled: December 16, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Mira Belinkiy, Tolga Acar, Thomas Roeder, Jason Mackay, Brian LaMacchia
-
Publication number: 20120159589Abstract: Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sign-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret, keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs.Type: ApplicationFiled: February 29, 2012Publication date: June 21, 2012Applicant: Microsoft CorporationInventors: Bin Benjamin Zhu, Min Feng
-
Publication number: 20120159588Abstract: Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sign-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret, keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs.Type: ApplicationFiled: February 29, 2012Publication date: June 21, 2012Applicant: Microsoft CorporationInventors: Bin Benjamin Zhu, Min Feng
-
Publication number: 20120159587Abstract: A method and system for pre-shared-key-based network access control are disclosed. The method includes the following steps: 1) security policy negotiation is implemented between a REQuester(REQ) and Authentication Access Controller(AAC); 2) identity authentication and uni-cast key negotiation are implemented between REQ and AAC; 3) a group-cast key is notified between REQ and AAC. Applying the method and system, rapid bidirectional authentication can be implemented between a user and network.Type: ApplicationFiled: December 24, 2009Publication date: June 21, 2012Inventors: Li Ge, Jun Cao, Manxia Tie, Qin Li, Zhenhai Huang
-
Publication number: 20120159586Abstract: A method for providing security measures on a network device, such as a router, is disclosed. In one embodiment, a method includes receiving a request for a network resource. The method further includes determining a classification of the request, and generating, based on the determined classification of the request, a security measure corresponding to the determined classification of the request for authentication of the request. The method also includes permitting access to the network resource when a correct response is received to the security measure corresponding to the determined classification of the request.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: Verizon Patent and Licensing Inc.Inventors: Mark D. Carney, Theresa A. Menzel, Jeffrey A. Jackson
-
Patent number: 8205240Abstract: A method of putting a first gateway device into service, the first gateway device having an application service module and a network module enabling communications between the first gateway device and the activation manager, the application service module residing on a user premises side of a network service provider demarcation. The method comprises identifying, at the first gateway device disposed at a user premises, an activation manager in communication with the first gateway device, transmitting, from the first gateway device, an activation certificate to the activation manager for verification and authentication, generating a service authentication key associated with the first gateway device, storing the service authentication key and an indication that the associated gateway device status is activated in a database, determining the services available to the first gateway device, and transmitting the service authentication key and an identification of the available services to the first gateway device.Type: GrantFiled: December 28, 2007Date of Patent: June 19, 2012Assignee: Prodea Systems, IncInventors: Amir Ansari, George A. Cowgill, Ramprakash Masina, Jude P. Ramayya, Alvin R. McQuarters, Atousa Raissyan, Leon E. Nicholls, Wesley R. Erhart, Michael P. Cooper
-
Publication number: 20120151563Abstract: One disclosed aspect of the present invention includes authentication and user account automation within a compute cluster for each cluster node that requires password or other credential administration. For example, a storage appliance computing system may rely on a plurality of subsystems (such as databases, storage management software, and application servers) that each have internal user accounts with associated passwords and credential keys that need to be changed at frequent intervals. Rather than requiring an administrator to manually manage all of these accounts, the presently described invention includes techniques and an authentication manager component to automatically manage, update, and refresh authentication information as required. Further, the authentication manager component may be used to perform and propagate automatic credential changes such as new sets of SSH keys or updated passwords as required within a computing system, and respond to new nodes or out-of-sync credentialing scenarios.Type: ApplicationFiled: December 9, 2010Publication date: June 14, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Christian Bolik, Neeta Garimella, Zhiguo Huang, Erick C. Kissel, Jayashree Ramanathan
-
Patent number: 8201219Abstract: Systems and methods for dynamically load-balancing clients across available servers without the need for a load balancer in front of a network are provided. Exemplary methods assign servers to clients in wireless and wireline networks based on server load. Methods and systems for using the authentication, authorization, and accounting (AAA) protocols to load-balance network servers are provided. The load-balancing systems and methods further include using the Diameter AAA protocol routing attribute value pairs (AVPs) to implement bootstrap functionality and load balancing. Methods and systems using the Diameter protocol to manage client assignments are disclosed. Methods and systems for dynamically load-balancing clients across available servers using an AAA protocol are further described. Methods and systems to redirect clients to available servers with the least load are disclosed.Type: GrantFiled: September 24, 2007Date of Patent: June 12, 2012Assignee: Bridgewater Systems Corp.Inventor: D. Mark Jones
-
Patent number: 8200974Abstract: A system and method for securely exchanging plurality of information items used to generate a plurality of encryption keys used in a public key-and-private key system. In accordance with the principles of the invention, elements of exchanged information items, such as public key and synchronizing indictors are encrypted before the exchange. The information item element is encrypted using an encryption key determined from information items that were previously exchanged. The encryption of information items used to determine subsequent encryption keys provides additional security to the encryption key used in the transmission of informational data as the encrypted elements of the information item must be decrypted before the data message encryption key can be decrypted. The process of exchanging encrypted information items can be repeated until an agreed upon number of encrypting keys is determined.Type: GrantFiled: July 22, 2010Date of Patent: June 12, 2012Assignee: Copytele, Inc.Inventors: Frank J. DiSanto, Denis A. Krusos
-
Patent number: 8201264Abstract: Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a network, a content server connected to the network and to a trusted system, a first device including a non-volatile memory that is connected to the network and a second device including a non-volatile memory that is connected to the network. In addition, the registration server is configured to provide the first device with a first set of activation information in a first format, the first device is configured to store the first set of activation information in non-volatile memory, the registration server is configured to provide the second device with a second set of activation information in a second format, and the second device is configured to store the second set of activation information in non-volatile memory.Type: GrantFiled: March 25, 2009Date of Patent: June 12, 2012Assignee: DIVX, LLCInventors: Eric W. Grab, Chris Russell, Francis Chan, Mike Kiefer
-
Patent number: 8201225Abstract: Provided are an apparatus, system composed of apparatuses in a chassis, and a method for managing access among a plurality of devices accommodated in a chassis. Setting information by the user on access between a first management unit including at least one device of said plurality of devices and a second management unit including at least one device of said plurality of devices is accepted. The first attribute information is acquired designating at least any one of an instruction issuing function and an instruction receiving function among the functions of said first management unit and the second attribute information designating at least any one of the instruction issuing function and the instruction receiving function among the functions of said second management unit. A determination is made as to whether or not said setting information is consistent with a combination of said first attribute information and said second attribute information.Type: GrantFiled: July 13, 2009Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: Yoshitaka Matsumoto, Yoshihiko Terashita, Hiroyuki Tanaka
-
Patent number: 8200760Abstract: The various aspects of the present invention are based on four main principles: the provision, protection and validation of audit trails relating to data generated by and communicated between nodes of a network; authentication of communicating parties; enforcement of proof of receipt of data communications; and the detection of compromised user identifiers. The object of these principles being that, should a dispute arise over the substance of an authenticated e-mail or other data item, it would be possible to prove, with mathematical precision, the following features of the communication: the content of the message sent; the e-mail location to which the message was addressed; the fact that the message was despatched; the time and date of despatch; the fact that the message was received; the time and date it was received; and the fact that the content of the message had not been changed since it was sent.Type: GrantFiled: June 19, 2003Date of Patent: June 12, 2012Assignee: The Ascent Group LimitedInventor: Michael Jacobs
-
Patent number: 8200957Abstract: A method, apparatus, and system are directed toward managing a Transmission Control Protocol/Internet Protocol (TCP/IP) handshake. A SYN-ACK cookie is determined based on a cryptographic operation using a secret key and at least one network characteristic. The SYN-ACK cookie is provided in a SYN message's field. The SYN message is sent from a client to a server. Another sequence number based on the received SYN-ACK cookie is included in a SYN-ACK message. The SYN-ACK message is sent to and received by the client. The other sequence number is validated based on the secret key to generate at least another network characteristic. A TCP/IP connection is established if the network characteristic matches the other network characteristic. In one embodiment, the component sending the SYN message may be a different component than the component receiving the SYN-ACK message. In this embodiment, the secret key may be shared between the two components.Type: GrantFiled: March 4, 2011Date of Patent: June 12, 2012Assignee: F5 Networks, Inc.Inventors: Arindum Mukerji, Jesse Abraham Rothstein
-
Patent number: 8200982Abstract: A method of processing semiotic data includes receiving semiotic data including at least one data set P, selecting a function h, and for at least one of each data set P to be collected, computing h(P), destroying data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P). The method further includes selecting a private key/public key (K, k) once for all cases, one of destroying the private key K and sending the private key K to a trusted party, and choosing function h as the public encryption function corresponding to k.Type: GrantFiled: March 19, 2010Date of Patent: June 12, 2012Assignee: International Business Machines CorporationInventors: Andrea Califano, Stephen Carl Kaufman, Marco Martens, William Robert Pulleyblank, Gustavo Alejandro Stolovitzky, Charles Philippe Tresser, Chai Wah Wu
-
Patent number: 8201241Abstract: This invention relates to a method for publishing presence information, including: receiving, by a presence server, a message carrying presence information to be published sent from a delegated presentity client or application server; publishing the presence information in the message carrying presence information to be published according to delegation authorization rules upon determining that the presence information is published by delegation; sending the processed presence information to a watcher client. This invention also provides, a presence server and a presence information composing and publishing unit for publishing presence information. The invention makes it more flexible to publish presence information and enhances user' experience.Type: GrantFiled: November 8, 2007Date of Patent: June 12, 2012Assignee: Huawei Technologies Co., Ltd.Inventors: Linyi Tian, Yang Zhao, Qian Sun
-
Patent number: 8201230Abstract: A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming interface that uses a security subsystem to unlock, write, and relock the user choice settings to insure that the user's choices are enforced and respected by the applications that attempt to change them in a manner that is verifiable and transparent to the user. The user is notified whenever a change to their user choice settings is made.Type: GrantFiled: February 20, 2004Date of Patent: June 12, 2012Assignee: Microsoft CorporationInventors: Robert F. Day, Sarah E. Schrock, Timothy P. McKee, Isaac A. Sheldon
-
Patent number: 8201234Abstract: Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.Type: GrantFiled: May 9, 2007Date of Patent: June 12, 2012Assignee: Microsoft CorporationInventors: Gerardo Diaz-Cuellar, David Abzarian, Lokesh Srinivas Koppolu, Eran Yariv
-
Publication number: 20120144462Abstract: In one embodiment, an apparatus includes a first access point within a wireless network. The first access point is configured to identify a communication device within a radio frequency (RF) range of the first access point. The first access point is also configured to request a session key associated with the communication device from a first network controller associated with the first access point in response to the communication device being identified. The first access point is further configured to receive the session key associated with the communication device from a second network controller associated with a second access point having an RF range partially overlapping the RF range of the first access point.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: JUNIPER NETWORKS, INC.Inventor: Jeffrey L. POCHOP, JR.
-
SYSTEM AND METHOD FOR EXTENDING SECURE AUTHENTICATION USING UNIQUE SESSION KEYS DERIVED FROM ENTROPY
Publication number: 20120144463Abstract: In some aspects of the present disclosure a device is disclosed that includes a processor; a storage unit; a user interface; a transceiver; a device identifying unit arranged to store device identifying data; a memory unit arranged to store machine-executable instructions that when executed by the processor causes a password to be generated, based on the device identifying data, that is arranged to allow the device to access a public wireless local area network (PWLAN).Type: ApplicationFiled: March 25, 2011Publication date: June 7, 2012Inventors: Prasanna J. SATARASINGHE, Martin Greenwood, Yoon Hee Kim, David Ka-Wai Hui, Vlad Alperovich -
Publication number: 20120144464Abstract: An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a bridge server performing authentication tasks that allow a user to access a server or a group of servers with multiple security levels. The method eliminates the need for the user to remember multiple usernames/passwords for each target server. The method also allows one bridge server and one set of security devices to be used to authenticate the user for multiple servers, thereby reducing security costs and increasing user convenience. A location-based password-ID generating device is also described for secure location-based access.Type: ApplicationFiled: December 6, 2011Publication date: June 7, 2012Inventors: Delaram Fakhrai, Mehran Moshfeghi
-
Publication number: 20120144465Abstract: Technologies for distributed single sign-on operable to provide user access to a plurality of services via authentication to a single entity. The distributed single sign-on technologies provide a set of authentication servers and methods for privacy protection based on splitting secret, keys and user profiles into secure shares and periodically updating shares among the authentication servers without affecting the underlying secrets. The correctness of the received partial token or partial profiles can be verified with non-interactive zero-knowledge proofs.Type: ApplicationFiled: February 11, 2012Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Bin Benjamin ZHU, Min FENG
-
Publication number: 20120144466Abstract: Disclosed embodiments include a method for receiving, at a configuration information server, an encrypted password associated with a configuration item, where the encrypted password is encrypted using an encryption key. The method further includes encrypting a decrypted password to generate a reencrypted password, where the decrypted password is derived from the encrypted password. The method further includes transmitting the reenrypted password to the configuration item and removing the decrypted password from the configuration information collection server.Type: ApplicationFiled: February 14, 2012Publication date: June 7, 2012Applicant: International Business Machines CorporationInventor: Akira Ohkado
-
Publication number: 20120144201Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Patent number: 8196193Abstract: A device, method, and system disclosed herein may be used to integrate and control authentication and passwords among various applications and platforms. The exemplary method may obtain a service ticket from a key distribution center of the key distribution center authentication process and generate a random key. A port between the client and the service may be created and utilized to transmit the service ticket and the random key to a service from the client. The random key may replace a password provided by the user. The random key in the password field of the service logon is transmitted to the service. The service authenticates the random key in the password field with the stored random key in the cache of the service. Once authenticated the service ticket is validated.Type: GrantFiled: July 18, 2008Date of Patent: June 5, 2012Assignee: PistolStar, Inc.Inventors: Thomas J. Hoey, Gregg Browinski
-
Patent number: 8196190Abstract: An authentication server, on receipt of a request to delete a user account, determines whether the account exists in a user authentication table. If the account exists, the authentication server deletes the account, and retrieves, from a requesters list in which information of devices from which users have to date requested user authentication is saved, an address of a device from which the user targeted for deletion has previously issued an authentication request, and issues a deletion request to that device together with account information. Similar processing to change a user account is performed in response to a change request.Type: GrantFiled: February 6, 2009Date of Patent: June 5, 2012Assignee: Canon Kabushiki KaishaInventor: Tsuyoshi Muto
-
Patent number: 8196189Abstract: A secure distributed single-login authentication system comprises a client and a server. The client collects authentication credentials from a user and tests credentials at a variety of potential authentication servers to check where the login is valid. It combines a password with a time-varying salt and a service-specific seed in a message digesting hash, generating a first hash value. The client sends the hash value with a user name and the time-varying salt to a selected server. The server extracts the user name and looks up the user name in the server's database. If an entry is found, it retrieves the password, performing the same hash function on the combination of user name, service-specific seed, and password to generate a second hash value, comparing the values. If the values match, the user is authenticated. Thus, the system never reveals the password to authentication agents that might abuse the information.Type: GrantFiled: June 11, 2010Date of Patent: June 5, 2012Assignee: AOL LLCInventor: James Roskind
-
Patent number: 8195936Abstract: A method for transmitting and receiving data of a terminal in a communication system and a communication terminal thereof are provided, which can minimize an exposure of authentication information. A communication terminal includes a rolling token generation unit for generating the rolling tokens; a memory for storing the generated rolling tokens; and a control unit for, if an authentication of the other terminal for performing a communication is completed, generating and transmitting a rolling token whenever a transmission to the other terminal is performed, and in case of receiving a specified rolling token from the other terminal, determining whether the rolling token currently received from the other terminal is identical to the rolling token most recently transmitted.Type: GrantFiled: November 10, 2008Date of Patent: June 5, 2012Assignee: Samsung Electronics Co., LtdInventor: Jong-Se Won
-
Publication number: 20120137131Abstract: The present invention provides an authentication method, an authentication system, and an authentication device, which is in information security field.Type: ApplicationFiled: December 24, 2010Publication date: May 31, 2012Inventors: Zhou Lu, Huazhang Yu
-
Publication number: 20120137351Abstract: Methods and apparatus include securely launching a web browser from a privileged process of a workstation to minimize enterprise vulnerabilities. The workstation includes a restricted-capability web browser pointed toward a web server. An executable file is wrapped about the browser and imposes restrictions, such as preventing the writing to a registry or installing ActiveX controls. It also has functionality to prevent users from linking to web locations in other than an https protocol or following links beyond an original host. Upon indication of a forgotten password/credential, the restricted-capability web is launched browser toward a web server. Upon authentication of identity, the user changes their password/credential for later logging-on to the workstation, but in a capacity without the limited functionality or the imposed browser restrictions.Type: ApplicationFiled: February 6, 2012Publication date: May 31, 2012Inventors: W. Scott Kiester, Cameron Mashayekhi, Karl E. Ford
-
Publication number: 20120137350Abstract: The present invention relates to a security system using an automatic meter reading protocol. The security system includes a Device Language Message Specification (DLMS) transmission unit for transmitting security DLMS data that includes security key update information and a first authentication value, and a DLMS reception unit for receiving the security DLMS data, searching the security key update information in the security DLMS data, and generating an updated security key using a second authentication value according to the security key update information. The security system can solve various problems occurring due to the operation of a separate security protocol, and can be easily implemented and managed.Type: ApplicationFiled: June 3, 2011Publication date: May 31, 2012Inventors: Seong-Ho JU, Yong-Hoon LIM, Jong-Mock BAEK, Moon-Suk CHOI, Young-Hyun KIM, No-Gil MYOUNG
-
Patent number: 8191131Abstract: A system and method in which authentication data, such as a password, which is sent to a server/firewall as part of an authentication request, for example a logon request, is received at the server/firewall in a plurality of messages at a plurality of logical ports from the user, thus improving protection against replay attacks. In one embodiment, a plurality of user authentication data parts is obtained from a remote user device as part of an authentication request, the plurality of user authentication data parts is assembled into user authentication data; the authenticity of the authentication request is checked using the user authentication data; and communication with the remote user device is enabled if the authentication request data is determined to be authentic.Type: GrantFiled: August 23, 2006Date of Patent: May 29, 2012Assignee: International Business Machines CorporationInventors: Jeffrey Bart Jennings, Kofi Kekessie
-
Patent number: 8191124Abstract: Exemplary methods and systems for acquiring network credentials for network access are described. The exemplary method includes receiving network configuration information from a network device on a communication network, generating a credential request, transmitting the credential request to a credential server over a standard protocol of the network device, receiving the credential request response, and providing a network credential from the credential request response to the network device to access the communication network.Type: GrantFiled: September 6, 2007Date of Patent: May 29, 2012Assignee: Devicescape Software, Inc.Inventors: Simon Wynn, John Gordon
-
Patent number: 8191116Abstract: An authentication and validation architecture utilizing a P-CSCF (proxy-call session control function) service to validate a source IP address against a registered contact IP address upon receiving an initial request for a dialog or a standalone request (except REGISTER) from a registered user. This provides a security measure to prevent IMS (IP multiemdia subsytem) identity spoofing, when SIP security (IPsec) access security is not enabled, or not used, between the user equipment (UE) and P-CSCF service.Type: GrantFiled: October 17, 2005Date of Patent: May 29, 2012Assignee: AT&T Mobility II LLCInventor: Daryl Gazzard
-
Publication number: 20120131655Abstract: An authentication device (100) for use with electronic security devices and user authentication systems is disclosed. The authentication device includes a data store (104) for storing plural secret keys, each secret key associated with a corresponding service, a service selection means (101) for selecting a service from the corresponding services, an authentication code generator (102) for generating, from the secret key associated with the selected service, a one time usable authentication code for communication to an authentication controller associated with the selected service, and an output (106) for outputting the generated authentication code for communication to the authentication controller. A method of authentication a user to a service is also disclosed.Type: ApplicationFiled: May 11, 2010Publication date: May 24, 2012Applicant: EMUE HOLDINGS PTY LTD.Inventors: Jason Frederick Bender, James Evan Lenon, Simon Charles Hughes Hewitt
-
Publication number: 20120131653Abstract: A system, devices and method for authenticating a user requesting access, through a computing device connected to a network, to an on-line resource hosted by a server in communication with the network. The system, devices and method employing an authentication server and a mobile communications device in communication over a wireless network. The authentication server forwarding an authentication to the mobile communications device. Optionally, the authentication server also returning security information related to the authentication in response to the request. The mobile communications device operative to receive and process the authentication, and forward the processed authentication to the computing device over a short-range communications link.Type: ApplicationFiled: November 19, 2010Publication date: May 24, 2012Applicant: Research in Motion LimitedInventors: Jerome Pasquero, David Ryan Walker
-
Publication number: 20120130838Abstract: Techniques for personalizing secure elements in NFC devices to enable various secure transactions over a network (wired and/or wireless network) are disclosed. With a personalized secure element (hence secured element) in place, techniques for provisioning various applications or services are also provided. Interactions among different parties are managed to effectuate a personalization or provisioning process flawlessly to enable an NFC device for a user thereof to start enjoying the convenience of commerce over a data network with minimum effort.Type: ApplicationFiled: January 16, 2012Publication date: May 24, 2012Inventors: Liang Seng Koh, Hsin Pan, Xiangzhen Xie
-
Publication number: 20120131652Abstract: This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile.Type: ApplicationFiled: November 18, 2010Publication date: May 24, 2012Applicant: MICROSOFT CORPORATIONInventors: Gaurav S. Anand, Kevin Michael Woley, Matthew R. Ayers, Rajeev Dutt, Eric Fleischman
-
Publication number: 20120131656Abstract: A system for secure information storage and delivery includes a vault repository that includes a secure vault associated with a user, wherein the secure vault is configured to receive at least one data entry. A mobile vault server coupled to the vault repository creates a mobile vault on a mobile device based on the secure vault and is capable of authenticating the mobile device based on user authentication information. The mobile vault server includes a mobile device handler that communicates with the mobile device. A synchronization utility determines whether the at least one data entry on the secure vault is transferable to or storable on the mobile vault. and transfers the data entry from the secure vault to a corresponding data entry on the mobile vault if the at least one data entry on the secure vault is determined to be transferable to or storable on the mobile vault.Type: ApplicationFiled: January 13, 2012Publication date: May 24, 2012Applicant: INTERSECTIONS, INC.Inventors: Jonathan SLATON, Ryan B. JOHNSON, Toan TRAN, David REED, Abhilash RAVINDRAN, George K. TSANTES
-
Publication number: 20120131657Abstract: A method of assuring integrity of a personal information in a data base, containing personal information provided by multiple users, uses in various embodiments physiological identifiers associated with each of the users. Related systems are also provided. A user may be notified if a merchant verification request to the data base has produced a non-match event.Type: ApplicationFiled: February 1, 2012Publication date: May 24, 2012Applicant: GOLD STANDARD TECHNOLOGY LLCInventors: Bruce D. Sunstein, Eileen C. Shapiro
-
Publication number: 20120131654Abstract: Various methods and systems for propagating identity information in a composite application are presented. State data of a composite application, as executed for a particular entity, may be transferred to and stored by a computer-readable storage medium. The state data may include a portion of a set of subject information linked with the entity. A security attribute of the subject may not be present in the portion of the set of subject information in the state data transferred to the non-transitory computer-readable storage medium. After a period of time, such as an hour or a day, the state data of the composite application as executed for the entity may be retrieved and the security attribute of the set of subject information linked with the entity may be determined. The composite application may then continue to be executed for the entity.Type: ApplicationFiled: May 31, 2011Publication date: May 24, 2012Applicant: Oracle International CorporationInventors: Nickolas Kavantzas, Prakash Yamuna
-
Publication number: 20120130902Abstract: A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure.Type: ApplicationFiled: November 24, 2010Publication date: May 24, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John R. DINGLER, Frank C. FISK, Sri RAMANATHAN, Matthew A. TERRY, Matthew B. TREVATHAN
-
Patent number: 8185949Abstract: In one embodiment, an apparatus includes a hierarchy of authentication folders configured in a control directory server (CDS) of a Universal Plug and Play (UPnP) network, a personal identification number (PIN) code associated with a user and comprising of identifiers, and non-public media content organized in the CDS to provide selective service to users, where the non-public media content is made accessible to the user when the user is authenticated with a selection of the hierarchy of authentication folders.Type: GrantFiled: November 20, 2008Date of Patent: May 22, 2012Assignee: Cisco Technology, Inc.Inventor: Karl Jonsson
-
Patent number: 8185954Abstract: A method or system of receiving an electronic file containing content data in a predetermined data format, the method comprising the steps of: receiving the electronic file, determining the data format, parsing the content data, to determine whether it conforms to the predetermined data format, and if the content data does conform to the predetermined data format, regenerating the parsed data to create a regenerated electronic file in the data format.Type: GrantFiled: June 9, 2006Date of Patent: May 22, 2012Assignee: Glasswall (IP) LimitedInventor: Nicholas John Scales