Management Patents (Class 726/6)
-
Patent number: 7448068Abstract: The present invention is directed at providing a system and method for Automatic Client Authentication for a Wireless Network protected by PEAP, EAP-TLS, or other Extensible Authentication Protocols. The user doesn't have to understand the difference between the protocols in order to connect to the network. A default authentication protocol is automatically attempted. If not successful, then the authentication switches over to another authentication method if the network requests it.Type: GrantFiled: April 29, 2003Date of Patent: November 4, 2008Assignee: Microsoft CorporationInventors: Ray Sun, Zeke Koch, Yu Zhang
-
Patent number: 7448066Abstract: Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components.Type: GrantFiled: September 19, 2002Date of Patent: November 4, 2008Assignee: International Business Machines CorporationInventors: Peter Daniel Birk, Ching-Yun Chao, Hyen Vui Chung, Carlton Keith Mason, Ajaykumar Karkala Reddy, Vishwanath Venkataramappa
-
Publication number: 20080271127Abstract: A computer readable storage medium includes executable instructions to retrieve a list of one or more widgets from a repository. A set of items representing the list of one or more widgets is displayed. A widget is selected from amongst the one or more widgets in the repository.Type: ApplicationFiled: April 24, 2007Publication date: October 30, 2008Applicant: Business Objects, S.A.Inventors: Alexis-Jean Laurent NAIBO, Didier Marc Jean BOLF
-
Publication number: 20080271129Abstract: Techniques for identity techniques for single sign-on functionality for secure communications over insecure networks are provided. A principal achieves single sign-on access to a server via a client by initially authenticating to third-party authentication service. Next, a credentialing service supplies a randomly generated credential to the client and the server unbeknownst to the principal. The principal is then equipped to engage in secure communicates over an insecure network using the credential that is managed by services of the client to authenticate to services of the server in a fashion that the principal is unaware of.Type: ApplicationFiled: October 12, 2007Publication date: October 30, 2008Inventor: Prakash Umasankar Mukkara
-
Patent number: 7444505Abstract: A system, method and apparatus for securing communications between a trusted network and an untrusted network are disclosed. A perimeter client is deployed within the trusted network and communicates over a session multiplexing enabled protocol with a perimeter server deployed within a demilitarized zone network. The perimeter client presents requests to make available and communication initiation requests to the perimeter server which presents corresponding sockets to the untrustred network. The session multiplexing capabilities of the protocol used between the perimeter server and perimeter client permit a single communication session therebetween to support a plurality of communication sessions between the perimeter server and untrusted network. In the event data flows across the communication sessions are encrypted, decryption of the data flows is left to the components at the end points of the communication session, thereby restricting exposure of privileged information to areas within trusted networks.Type: GrantFiled: April 22, 2004Date of Patent: October 28, 2008Assignee: AT&T Intellectual Property I, L.P.Inventors: Bill Burcham, Sanjay Cherian, Darron Shaffer
-
Publication number: 20080263647Abstract: A secure framework for wireless sensor networks. The framework provides a system and method for providing network device authentication. The system and method comprises installing a unique device key in a network device and creating a chain of keys, wherein each subsequent key is encrypted using the previous key. The method executes an authentication process for storing and issuing keys, wherein the authentication process uses a unique device key to install a device site key in the network device and uses the device site key and the unique device key to authenticate the network device for communicating with a wireless network router, wherein the wireless network router creates a unique network-device-router key. The unique network-device-router key is used to authenticate the network device for communicating over the wireless network using an encrypted network session key and allows secure encrypted link-layer communications over the wireless network.Type: ApplicationFiled: July 16, 2007Publication date: October 23, 2008Applicant: GENERAL ELECTRIC COMPANYInventors: Bruce Gordon Barnett, Daniel White Sexton, Ping Liu
-
Publication number: 20080263643Abstract: Methods, systems, and program products for a client application provide child passwords mapped to a parent password authorized for login to a secure network resource server. A child user logs in to the client application by entering the child password. When a child user properly requests a secure resource from the secure network resource server, the client application uses the authorized parent password to login to the secure server and retrieve a secure resource without communicating the child password to the secure server. The child user login session is administered by the local application pursuant to access rules or limitation parameters associated with the child password. Child passwords may be set to expire. The client application may also monitor secure server access by a child user; monitored use may also be reported, and an access rule or password limitation parameter may be revised in response to monitoring and use reporting.Type: ApplicationFiled: April 19, 2007Publication date: October 23, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Peeyush Jaiswal, Naveen Narayan
-
Publication number: 20080263352Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.Type: ApplicationFiled: April 1, 2008Publication date: October 23, 2008Applicant: Memory Experts International Inc.Inventors: Darren Krahn, Laurence Hamid
-
Publication number: 20080263646Abstract: Methods and systems for a computer network security system are disclosed. A computer security system includes at least one computer configured to be operably coupled to a remote network and having an application program comprising a login scripts database and a variable database. The security system further includes a client device configured to be operably coupled to the computer to allow for the use of the application program. The application program is configured to dynamically generate a password upon attempting to access a remote network. Furthermore, the application program may update passwords within a user's login scripts database. Additionally, a remote network may support the security system and may include at least one computer system having an administrator application program installed thereon and configured to receive a network device and an administrator device. A network administrator may use the network and administrator device to monitor and modify contents of the security system.Type: ApplicationFiled: June 8, 2007Publication date: October 23, 2008Inventor: Edgar C. Jerez
-
Publication number: 20080263642Abstract: Methods and systems for a computer network security system are disclosed. A computer security system includes at least one computer configured to be operably coupled to a remote network and having an application program comprising a login scripts database and a variable database. The security system further includes a client device configured to be operably coupled to the computer to allow for the use of the application program. The application program is configured to dynamically generate a password upon attempting to access a remote network. Furthermore, the application program may update passwords within a user's login scripts database. Additionally, a remote network may support the security system and may include at least one computer system having an administrator application program installed thereon and configured to receive a network device and an administrator device. A network administrator may use the network and administrator device to monitor and modify contents of the security system.Type: ApplicationFiled: April 18, 2007Publication date: October 23, 2008Inventor: Edgar C. Jerez
-
Publication number: 20080263645Abstract: A secure server installation is provided that abstracts credit card identifiers from its server, network, application and database environments, thus reducing investment in securing, segregating and/or isolating these environments in their entirety. The secure server installation intercepts credit card transactions sent from front end applications to back end applications, and forwards tokens in replacement of credit card identifiers for processing by the back end applications. The same secure server installation can be applied for the encryption, storage (data-at-rest), transmission of private data within a network of other private or sensitive data not limited to social insurance numbers, drivers license numbers, phone numbers, bank account numbers, etc.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Applicant: TELUS COMMUNICATIONS COMPANYInventors: Christopher K. Renter, Denis A. Niles
-
Publication number: 20080263644Abstract: Distributed computing systems can exchange authorization information in a manner which alleviates the need for a receiving system to utilize any external systems when making an authorization decision. The trusted authorization provider can digitally sign authorization snippets of information. The requestor sends the digitally signed authorization snippet with the request. Because both computing processes trust the same authorization provider, the servicer of the request is able to grant or deny access in a completely autonomous fashion without having to rely on external resources for authorization. A requesting process can determine the digitally signed authorization snippet corresponding with the request. The servicing process can rely on the digitally signed authorization snippet to perform the authorization.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Inventor: Doron Grinstein
-
Publication number: 20080263628Abstract: The present disclosure is directed to a system and method for managing communications with robots. In some implementations, a computer network, where operators interface with the network to control movement of robots on a wireless computer network includes a network arena controller and a plurality of robot controllers. The network arena controller is configured to provide firewall policies to substantially secure communication between robot controllers and the associated robots. Each controller is included in a different robot and configured to wirelessly communicate with the network arena controller. Each robot controller executes firewall policies to substantially secure wireless communication.Type: ApplicationFiled: April 21, 2008Publication date: October 23, 2008Applicant: Innovation First, Inc.Inventors: David Anthony Norman, Robert H. Mimlitch, Corey Lee Chitwood, Richard D. Torrance, Mark J. Lambert, Brandon Lee Martus, Lester E. Heath
-
Patent number: 7441263Abstract: A system, method and computer program product for providing unified authentication services in an Application Service Provider (ASP) setting to a registered end-user of one or more online (or web) applications. The system includes client side components, a user management component coupled to the client side components and server side components coupled to the user management component. The client side components include an authentication control component that manages the process of capturing a user-determined policy for a first account and user credentials. This allows the user to define the level of protection to access the first account. This includes, but is not limited to, accounts/applications that have been configured specifically for used with the system and particular user credentials and accounts that have been subsequently set up but configured to use the same user credentials.Type: GrantFiled: March 23, 2001Date of Patent: October 21, 2008Assignee: Citibank, N.A.Inventors: Bikram S Bakshi, David W Helms, Anthony C Rochon, Trevor J Walker
-
Publication number: 20080255877Abstract: Secure network transaction system obtains user-authorized genetic term or bioinformatic profile, and transacts online service according to genetically-based user medical or other risk determined therefrom. Insurance policy, promotional offer, or other service may dynamically address genetically-based condition. Bioinformatic data classifies user per personal mask which filters subset of user genetic sequence. Risk profile may be calculated according to actuarial statistics, genetics and/or heredity using non-discriminatory rules specified for users in temporal or jurisdictional groups. User transactions are modifiable according to bioinformatic data representing genetically-based risk increase or decrease. Data is securely processed, modulated, and stored by network server for remote access and transaction using various portable user devices.Type: ApplicationFiled: November 21, 2007Publication date: October 16, 2008Inventor: Dennis S. Fernandez
-
Patent number: 7437756Abstract: In a method and arrangement for securely exchanging data between a first data processing unit and a second data processing unit, a secure communication channel is established between the first data processing unit and the second data processing unit in a communication configuration step, and a first message is transmitted from the second data processing unit to the first data processing unit via the secure communication channel in a data transmission step. During the data transmission step, the second data processing unit generates a second message by appending a predetermined annex to the first message and a third message by encrypting the second message using a secret key that is available only in the first data processing unit and in the second data processing unit and then transmits the third message to the first data processing unit.Type: GrantFiled: March 5, 2004Date of Patent: October 14, 2008Assignee: Francotyp-Postalia AG & Co. KGInventor: Gerrit Bleumer
-
Patent number: 7437550Abstract: The invention provides secure and private communication over a network, as well as persistent private storage and private access control to the stored information, which is accomplished by imposing mechanisms that separate a user's actions from their identity. The system provides (i) anonymous network browsing, in which event the anonymity system is unaware of both the user's identity and browsing activities, (ii) private network storage and retrieval of data such as passwords, profiles and files in a manner such that the data can be stored into the system and later retrieved without the system knowing the contents or owners of the data, and (iii) the ability of the user to control and manage access to the remotely stored data without the system knowing the contents, owners, or accessors of the data.Type: GrantFiled: October 28, 2003Date of Patent: October 14, 2008Assignee: Ponoi Corp.Inventors: Colin Savage, Christopher Petro, Sascha Goldsmith
-
Patent number: 7437552Abstract: A subscriber's terminal 201 is configured to be connected to an internet service provided 208 via a LAN 202, and an IP subnet distribution switch 209 within a network service provider 203. When a packet signal that has not received the authentication is input, a physical-port changeover switch 204 gives a temporary IP address to the subscriber's terminal 201, and causes the subscriber's terminal 201 to employ this for making an authentication process. If the authentication succeeds, a normal IP address is given, and the packet signal, which made use of this, is distributed to a network that is an object by the IP subnet distribution switch 209.Type: GrantFiled: July 9, 2003Date of Patent: October 14, 2008Assignee: NEC CorporationInventor: Akihiro Shin
-
Publication number: 20080250480Abstract: A system and method for providing secure electronic storage in a plurality of electronic safes which each include a plurality of electronic compartments. The owner of each electronic safe can generate new compartments and determine who has access to each of the compartments in their electronic safe.Type: ApplicationFiled: April 4, 2007Publication date: October 9, 2008Applicant: Value Consulting Group Inc.Inventor: Hamid Meshkat
-
Publication number: 20080250481Abstract: Techniques for authenticating a user are described. In one implementation, a user requests access to protected information or resources by providing a user name and a password to a web server that controls access to the information or resources. If the user name and password match a known user profile, the web server retrieves a user identifier (e.g., a personal identification number) and constructs a translation table around the user identifier. The translation table includes the values that constitute the user identifier, random representations of each value, visual images that represent each value, and random image names for each visual image. The information in the translation table is then used to generate a user interface that allows the user to enter his or her user identifier via the user's computing device without exposing the actual user identifier values to the computing device.Type: ApplicationFiled: April 5, 2007Publication date: October 9, 2008Applicant: Microsoft CorporationInventors: Robert L. Beck, Benjamin Fullerton
-
Patent number: 7434062Abstract: The present application relates to a method and an apparatus of encrypting and/or decrypting password to secure secrecy of the password.Type: GrantFiled: November 19, 2004Date of Patent: October 7, 2008Assignee: Konica Minolta Systems Laboratory, Inc.Inventor: Chet Erez
-
Publication number: 20080244039Abstract: This invention relates to a method for providing a superior file storage system which utilizes the Internet and which has security as well as a superior user experience as foremost goals. The invention is ideal for the secure storage of critical documents, combining the security of a safe deposit box with the advantages of online file storage. Furthermore, the invention is designed to minimize time spent by an end user on organization, security, and file format issues.Type: ApplicationFiled: March 22, 2007Publication date: October 2, 2008Inventor: RUSS WERTZ
-
Patent number: 7430758Abstract: An authentication graphic included in a password prompt can allow a user to visually authenticate the password prompt. In one embodiment, the present invention includes a client device receiving a password challenge from a server, and displaying a prompt asking the user for a password, the prompt including an authentication graphic visible to the user.Type: GrantFiled: February 5, 2004Date of Patent: September 30, 2008Assignee: Microsoft CorporationInventor: Michael J. Toutonghi
-
Patent number: 7430756Abstract: A system and method for generating and authenticating a password to protect a computer system from unauthorized access. The characters of the password are placed in data packets by an access device. Prior to sending the packets, the device inserts a predefined number of blank packets between each of the character-carrying packets. The number of blank packets is retrieved from a number sequence that is shared between the access device and an authentication device. The authentication device determines whether the received set of password characters matches a stored set of password characters, determines whether the received number of blank packets between the received character-carrying packets matches a predefined number of blank packets, and positively authenticates the access device only if both conditions are met.Type: GrantFiled: December 22, 2004Date of Patent: September 30, 2008Assignee: JSM Technologies, LLCInventor: Steven W. Smith
-
Patent number: 7428992Abstract: A secure device capable of reducing influences by interruptions of communication with an external device and allowing a user to install a desired application program speedily and safely. Command storage section (106) of this secure device (100) stores command groups for executing card issuance. Card issuance section (104) extracts a series of card issuance commands corresponding to a function of a card to be acquired from the command group stored in command storage section (106) and writes the commands into a buffer of card management section (102), Card management section (102) executes each card issuance command written by card issuance section (104). Card issuance is completed through internal processing of secure device (100).Type: GrantFiled: January 10, 2006Date of Patent: September 30, 2008Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Masamoto Tanabiki, Mitsuhiro Sato, Yasuo Takeuchi, Emi Tsurukiri
-
Publication number: 20080235773Abstract: A method of irregular password configuration and verification, comprising one irregular character series with a series of texts, numbers or symbols inputted into a system to generate a series of password displaying onscreen of a display device. The series of password comprises at least one register code and at least one random combination unit with a text and a number, or a symbol, wherein the register code is concealed in the random combination unit.Type: ApplicationFiled: May 21, 2007Publication date: September 25, 2008Inventor: Hou-Cheng Chen
-
Patent number: 7428641Abstract: Without actually storing session-state information, the described exemplary implementations of session-state manager identify a user, validate the user's current logon state, and determine whether the user's session should expire. User identification and logon validation are checked by a server in a stateless network by generating a mathematically session-state token and sending that token to a user. Subsequently, the server receives a mathematically session-state token from the user and checks that token. If that token checks out, then the user is allowed continuing access under the same session. If it doesn't check out, then the user may be forced to start a new session by logging-on again. Alternatively, the server may check to see if the token would check out if it had come at an earlier time block. The session-state tokens are mathematical encoded and are generated using a one-way encryption scheme. Such a one-way encrypted token is scientifically impossible to reverse-engineer.Type: GrantFiled: October 28, 2004Date of Patent: September 23, 2008Assignee: Microsoft CorporationInventor: Joshua Allen
-
Patent number: 7428404Abstract: Herein disclosed is a communication apparatus to be operative in combination with first and second external devices for respectively producing first and second information, comprising: first information receiving means for receiving the first information from the first external device; communication performing means for performing a communication with the second external device by receiving the second information from the second external device and producing an exchange information to be transmitted to the second external device and; controlling means for controlling the communication performing means by assuming two different operational states including a first operational state to allow the communication performing means to be operable to perform the communication with the second external device and a second operational state to allow the communication performing means to be inoperable to perform the communication with the second external device, the controlling means being adapted to selectively assume thType: GrantFiled: August 4, 2004Date of Patent: September 23, 2008Assignee: Matsushita Electric Industrial Co., Ltd.Inventor: Kyoko Kawaguchi
-
Publication number: 20080229394Abstract: Techniques for use in enterprise and similar computing systems securely protect data during software application use by generating private table seeds as a function of a predetermined parameters and private tables as a function of the private table seeds. Each of the private tables associates with a distinct one of the private table seeds, each of the private tables associates with a site. An enterprise table seed is formed using other parameters and an enterprise table is derived from the enterprise table seed. The enterprise table permits data communication throughout an enterprise. A string of characters allows accessing a global private information protection system which includes global tables for integrating the private tables, the enterprise tables, and the global tables into a runtime application program at a remote location and coordinating the user's use to control assure only secure use and prevent inadvertent disclosure of the protected information.Type: ApplicationFiled: July 10, 2006Publication date: September 18, 2008Applicant: SCI GROUPInventors: Ronald J. Stering, William N. Peach
-
Publication number: 20080229302Abstract: A method of accessing content on a local trusted network from trusted and untrusted environments. The method includes assigning a software system associated with the local trusted network a unique name; associating the unique name with a local address and a dynamic external address; routing client communications to the software system using the unique name; and accessing the content from trusted and/or untrusted environments with a single method.Type: ApplicationFiled: March 14, 2008Publication date: September 18, 2008Inventors: Philip A. Kufeldt, Andrew Wilcox
-
Patent number: 7424735Abstract: A system and method are disclosed for providing security for a computer network. Content sets are generated for a computer associated with the network. It is determined whether a user should be routed to the generated content sets. If it is determined that the user should be routed to the generated content sets, a generated content set is selected and the user is so routed. Various actions and events may be recorded in a logfile, and the logfile is analyzed using regular expressions.Type: GrantFiled: November 9, 2004Date of Patent: September 9, 2008Assignee: Symantec CorporationInventors: Stephen Sorkin, Michael Lyle, Robert F. Ross, James R. Maricondo
-
Patent number: 7424743Abstract: A security system for a computer network that has a plurality of devices connected thereto comprises a security subsystem, a master system and a secure link. The security subsystem is connected to at least some of the devices in the network. The security subsystem is configured to monitor activities of the at least some devices on the network and detect attacks on the at least some devices. The master system monitors the integrity of the security subsystem and registers information pertaining to attacks detected by the security subsystem. The secure link is connected between the security subsystem and the master system. The master system monitors the integrity of the security subsystem and receives the information pertaining to the attacks through the secure link.Type: GrantFiled: December 29, 2006Date of Patent: September 9, 2008Assignee: Solutionary, Inc.Inventors: Michael Hrabik, Jeffrey J. Guilfoyle, Edward “Mac” Beaver
-
Patent number: 7424739Abstract: The present invention provides for validating that one or more modules reside on the same machine. When a second module wishes to establish communication with a first module, a shared memory that is accessible by the modules—but inaccessible by modules outside the machine—is used to store random data. The first module listens on a transport address corresponding to the random data for communication activity. The second module retrieves the random data from the shared memory, and then uses this data for determining the appropriate transport address to send information to when establishing the communication with the first module.Type: GrantFiled: October 29, 2004Date of Patent: September 9, 2008Assignee: Microaoft CorporationInventor: Janiv Pessach
-
Publication number: 20080212769Abstract: Example embodiments of the present invention disclose a method for processing an application packet for transmission includes receiving a plurality of segments of the application packet in a byte stream, the byte stream including a plurality of blocks, creating a plurality of superblocks within the byte stream by grouping a number of the plurality of blocks within the byte stream, and creating first pseudorandom bits for the plurality of superblocks. The method also includes determining a block number and a superblock number for a beginning of each of the plurality of segments, determining a block number and a superblock number for an ending of each of the plurality of segments in the byte stream.Type: ApplicationFiled: November 16, 2007Publication date: September 4, 2008Inventor: Sarvar Patel
-
Publication number: 20080216160Abstract: The present invention relates to a method of authenticating a user in a communication system comprising a user terminal and an authentication server which is capable of storing two types of nonce values, namely dedicated nonce values unique in the system and common nonce values shared between users in the system. In the method the authentication server receives (401) from the user terminal an access request. Then the authentication server uses a predefined criterion for determining the type of a first nonce value to be sent to the user terminal as a response to the access request. In case the predefined criterion is fulfilled, then a dedicated nonce value is sent, otherwise a common nonce value is sent (402). Then the authentication server receives (403) from the user terminal a response comprising a second nonce value and a response code to the first nonce value.Type: ApplicationFiled: February 29, 2008Publication date: September 4, 2008Applicant: MITSUBISHI ELECTRIC CORPORATIONInventor: Romain ROLLET
-
Publication number: 20080212771Abstract: For authenticating a user using a communication terminal (1) to access a server (4) via a telecommunications network, a personal identification code is received from the user From secure session establishment protocol messages exchanged (S1, S2, S3) between the communication terminal (1) and the server (4), a data set is generated (S4). Based on the data set, a transaction authentication number is generated (S52) using the personal identification code. The transaction authentication number is transmitted (S54) from the communication terminal (1) to the server (4). In the server (4), the transaction authentication number received is verified (S20) based on the secure session establishment protocol messages exchanged with the communication terminal (1). The transaction authentication number enables session aware user authentication that protects online users against real-time man-in-the-middle attacks.Type: ApplicationFiled: October 5, 2006Publication date: September 4, 2008Applicant: PrivaSphere AGInventor: Ralf Hauser
-
Publication number: 20080216161Abstract: The present invention discloses a system and method for configuration of access rights to sensitive information handled by a sensitive Web-Service. In a case of requested configuration changes initiated by the client system the Web-Server system provides a configuration data file to the client system preferably using a SOAP-communication protocol. The changes of the configuration data file are exclusively performed offline at the client side and the updated configuration data file is signed with authentication information and sent as a part of a SOAP-request to the Web-Server system. The Web-Server system provides a filter component for identifying and discarding non-SOAP requests as well as an access control manager for providing authentication examination for incoming SOAP-requests. After successful passing these components the SOAP-request is used for updating the existing configuration data file.Type: ApplicationFiled: May 1, 2008Publication date: September 4, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Wolfgang Eibach, Matthias Gruetzner, Dietmar Kuebler
-
Patent number: 7421733Abstract: When a user successfully logs into an account, the user is provided with a first-class login token, which entitles the user to one or more unsuccessful login attempts without experiencing delays the user would otherwise experience. If attempts with a second-class login token or an expired first-class login token is impermissible, a subsequent login attempt is subject to delays the user would otherwise not experience. The delays minimize the effectiveness of dictionary attacks. Additionally, if the user attempts to login without a login token or an invalid login token, the login attempt is impermissible and the user is provided with a second-class login token for use in a delayed, subsequent login attempt.Type: GrantFiled: February 6, 2002Date of Patent: September 2, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Steven Charles Glassman, Mark Steven Manasse
-
Publication number: 20080209530Abstract: At a vendor-managed web site, purchasing information is received from a first terminal, including purchasing information that is customized for a customer. The customer includes first and second users having respective first and second levels of authorized access to the purchasing information. The first user is identified by a first identifier, and the second user is identified by a second identifier. To a second terminal, access at the vendor-managed web site is provided to: only a first portion of the purchasing information in response to receiving the first identifier from the second terminal which identifies the first user; and at least a second portion of the purchasing information in response to receiving the second identifier from the second terminal which identifies the second user. The second portion includes at least a part of the first portion and a third portion of the purchasing information. The part of the first portion includes at least a portion of the customized purchasing information.Type: ApplicationFiled: April 28, 2008Publication date: August 28, 2008Applicant: Dell USA L.P.Inventor: Amy Van Wyngarden
-
Publication number: 20080209531Abstract: An information output apparatus includes a tray determining unit that determines an output tray to which printed sheets are output, a secret information generating unit that generates first secret information corresponding to tray identification information for identifying the output tray determined, a transmitting unit that transmits the first secret information generated by the secret information generating unit to a terminal, an input accepting unit that accepts an input of second secret information from a user, and a tray controlling unit that specifies the output tray based on the first secret information when the second secret information and the first secret information coincide with each other, and allows a slot of the specified tray to be open.Type: ApplicationFiled: April 30, 2008Publication date: August 28, 2008Inventor: Atsuko Hayano
-
Publication number: 20080209529Abstract: The present invention refers to a process of transaction authenticity and integrity check that allows the user to verify the authenticity of an internet bank site. Said process does not require the use of special devices by the users, thus avoiding extra implementation costs and making its adoption easy.Type: ApplicationFiled: February 22, 2008Publication date: August 28, 2008Applicant: Banco Bradesco S.A.Inventor: Douglas Tevis Francisco
-
Publication number: 20080201767Abstract: Associating a computing device with a group of other computing devices. A service receives a common credential from the computing device and associates the computing device with the other computing devices also associated with the common credential. The service generates a machine-specific credential for use by the computing device in subsequent communications with the service. The machine-specific credential is used to authenticate, identify, and group the computing device with the other computing devices in the subsequent communications.Type: ApplicationFiled: February 21, 2007Publication date: August 21, 2008Applicant: MICROSOFT CORPORATIONInventors: Juanya Davon Williams, Ashutosh Badwe, Adam Patrick Edwards
-
Publication number: 20080201768Abstract: Disclosed herein are a password management apparatus and method, a certification information storage apparatus and a certification information management method. The password management method of accessing and managing desired passwords through a portable password management apparatus and a terminal on which a password management program is installed, includes a first step of executing the password management program on the management terminal, a second step of receiving a user authentication number from the management apparatus, and comparing the first authentication number with a user authentication number previously stored in the management terminal, thereby authenticating whether a user is a legitimate user, and a third step of, only if the user is authenticated as a legitimate user, receiving a password list from the management apparatus and outputting the received password list onto a screen.Type: ApplicationFiled: July 10, 2006Publication date: August 21, 2008Inventors: Hong-Sik Koo, Jong-Sik Koo, Il Joe
-
Patent number: 7412719Abstract: A Centralized Authentication & Authorization (CAA) system that prevents unauthorized access to client data using a secure global hashtable residing in the application server in a web services environment. CAA comprises a Service Request Filter (SRF) and Security Program (SP). The SRF intercepts service requests, extracts the service client's identifier from a digital certificate attached to the request, and stores the identifier in memory accessible to service providers. The client identifier is secured by the SP using a key unique to the client identifier. When the web services manager requests the client identifier, the web services manager must present the key to the SP in order to access the client identifier. Thus, the present invention prevents a malicious user from attempting to obtain sensitive data within the application server once the malicious user has gained access past the firewall.Type: GrantFiled: May 20, 2004Date of Patent: August 12, 2008Assignee: International Business Machines CorporationInventors: Messaoud Benantar, Yen-Fu Chen, John W. Dunsmoir, Randolph Michael Forlenza, Wei Liu, Sandra Juni Schlosser
-
Patent number: 7409705Abstract: Disclosed is a user authentication system, which is designed to present a presentation pattern to a user subject to authentication, and apply a one-time-password derivation rule serving as a password of the user to certain pattern elements included in the presentation pattern at specific positions so as to create a one-time password. An authentication server is operable to generate a pattern seed value adapted to be combined with a user ID so as to allow a presentation pattern to be uniquely determined, and transmit the generated pattern seed value to an authentication-requesting client. The authentication-requesting client is operable to display a presentation pattern created based on an entered user ID and the received pattern seed value and in accordance with a given pattern-element-sequence creation rule, so as to allow the user to enter therein a one-time password, and transmit the entered one-time password to the authentication server.Type: GrantFiled: June 9, 2006Date of Patent: August 5, 2008Assignee: Computer Systems Engineering Co., Ltd.Inventors: Yukiya Ueda, Tsugune Saito, Shigetomo Tamai
-
Publication number: 20080184348Abstract: but a registration-requesting information transmission unit transmits the registration-requesting information containing the terminal ID and a device ID for discriminating the contents reproducing device. A registration unit specifies a registration record on the basis of the terminal ID contained in the registration-requesting information, and registers the device ID in the registration record and returns registration-completed information to the contents processing device. A list update unit adds, as it receives the registration-completed information from the management server, a group ID of the contents processing device itself to a second source ID list of the contents reproducing device.Type: ApplicationFiled: July 21, 2005Publication date: July 31, 2008Applicant: Sony CorporationInventor: Koujirou Tanaka
-
Publication number: 20080177647Abstract: An online compliance engine stored on a computer readable storage medium includes an intercept module programmed to intercept a request by a client for content on a destination server, and a compliance module programmed to access and parse the content from the destination server requested by the client, and to determine whether or not the destination server is authorized to distribute the content, the compliance module being further programmed to allow the destination server to distribute the content to the client if the destination server is compliant, and to block the destination server from distributing the content if the destination server is not compliant. The engine also includes a billing module programmed to bill the destination server if the content is distributed to the client.Type: ApplicationFiled: January 16, 2008Publication date: July 24, 2008Inventor: John W. Veenstra
-
Publication number: 20080178252Abstract: An arrangement is provided for securely sharing data on a network by enabling a user to select and install a commonly-shared password in each terminal device that is on the network. The terminal devices are then able to form a network that is temporarily secured using the user-installed password. A terminal-generated password is next created by one of the terminal devices and distributed over the temporarily secured network to the other devices. The terminal-generated password replaces the user-generated password so that the network is reformed and secured using the terminal-generated password. In one illustrative example, the terminal-generated password is created using a unique identifier, such as one or more MAC (Media Access Control) addresses associated with terminal devices on the network, as an input to a hash function that generates the new password having sufficient length and randomness to provide robust protection against password attack.Type: ApplicationFiled: January 18, 2007Publication date: July 24, 2008Applicant: GENERAL INSTRUMENT CORPORATIONInventor: Ted R. Michaud
-
Publication number: 20080178271Abstract: A system and method for provisioning digital identity representations (“DIRs”) uses various techniques and structures to ease administration, increase accuracy, and decrease inconsistencies of a digital-identity provisioning system. A system is provided using a common identity data store for both DIR issuance and identity token issuance, decreasing synchronization issues. Various methods are provided for creating new DIRs, notifying principals of available DIRs, and approving issuance of new DIRs.Type: ApplicationFiled: September 17, 2007Publication date: July 24, 2008Applicant: Microsoft CorporationInventors: Vijay K Gajjala, Colin H. Brace, Derek T. Del Conte, Kim Cameron, Arun K. Nanda, Hervey O. Wilson, Stuart L.S. Kwan, Rashmi Raj, Vijayavani Nori
-
Publication number: 20080178272Abstract: A system and method for provisioning digital identity representations (“DIRs”) uses various techniques and structures to ease administration, increase accuracy, and decrease inconsistencies of a digital-identity provisioning system. Various methods are provided for creating new DIRs, requesting DIRs, notifying principals of available DIRs, and approving issuance of new DIRs.Type: ApplicationFiled: September 17, 2007Publication date: July 24, 2008Applicant: Microsoft CorporationInventors: Vijay K. Gajjala, Colin H. Brace, Derek T. Del Conte, Arun K. Nanda, Stuart L.S. Kwan, Rashmi Raj, Vijayavani Nori