Patent application number | Description | Published |
20120166409 | SYSTEM AND A METHOD FOR GENERATING CHALLENGES DYNAMICALLY FOR ASSURANCE OF HUMAN INTERACTION - The invention provides a method, a system, and a computer program product checking for human interaction dynamically to enable access to a resource in a computing environment. The method comprises collecting a plurality of objects. For each object, a plurality of properties is defined. A set of objects is selected from the plurality of collected objects. Thereafter, queries are generated based on the properties of the selected objects. Queries which have a non-unique or ambiguous response are removed. One of the remaining queries is randomly selected. The answer to the query, based on properties of the selected objects, is stored. The selected set of objects and the selected query are presented to the user who is trying to gain access to the resource. The user is enabled access to the resource if the response received from the user is validated against the stored answer of the selected query. | 06-28-2012 |
20120254041 | ONE-TIME CREDIT CARD NUMBERS - Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker. | 10-04-2012 |
20120254964 | METHOD AND SYSTEM FOR GENERATING A TOUCH CAPTCHA - The present invention provides a method and system for automated test for human presence at a client device capable of receiving touch sensitive response. At a server, the method includes receiving and storing user profile information. Receiving request from client device to access a resource on a server. Generating a query based on the user profile information and the query requiring user to generate a touch sensitive response. Receiving the user generated response and authenticating the user if the touch sensitive response matches a predefined response for the query stored on the server. | 10-04-2012 |
20120317083 | SYSTEM AND METHOD FOR DELETION OF DATA IN A REMOTE COMPUTING PLATFORM - Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some embodiments, a user of a cloud computing service that provides data storage may securely delete his stored set of data by acquiring elevated access privileges to the stored set of data, designating at least one most significant bit in at least one data block therein as a sentinel and recording its value and position, updating the value of the sentinels and thereby rendering the data unusable, and verifying the success of the operation by checking the new value of the sentinels against the original value. In some embodiments, the verification process may be repeated in order to ensure that the data has been rendered useless across all nodes of the remote cloud platform. | 12-13-2012 |
20130006642 | SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE - Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user. | 01-03-2013 |
20130305321 | METHODS FOR CONFIRMING USER INTERACTION IN RESPONSE TO A REQUEST FOR A COMPUTER PROVIDED SERVICE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and access manager device includes providing an initial challenge to a client computing device requesting access to a service. The initial challenge includes one or more of one or more objects, one or more indicative answers, and one or more questions based on the one or more objects. At least one challenge response to the initial challenge is received from the client computing device. A determination is when there is a match between the at least one challenge response to the initial challenge and corresponding response data associated with the initial challenge. One or more actions with respect to the request to access the service are performed based on the determination. | 11-14-2013 |
20130305376 | SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR CALCULATING A SECURITY INDEX OF AN APPLICATION HOSTED IN A CLOUD ENVIRONMENT - The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated. | 11-14-2013 |
20130339251 | METHODS FOR CONTROLLING SOFTWARE USAGE - Methods for controlling software usage are described. Methods comprise receiving a request for at least one software application license, wherein the request comprises a user count, generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number, signing each of the one or more sets of license data digitally with a private key, embedding a set of signed license data into the software application, receiving user identification data from a user through an input interface associated with the computing apparatus, and validating the user identification data. Additional embodiments incorporate mechanisms for license renewal, user registration and user authentication by means of associating a range of user identification data with the license data. | 12-19-2013 |
20140019586 | METHODS FOR FORMAT PRESERVING AND DATA MASKING AND DEVICES THEREOF - A method, non-transitory computer readable medium and data masking device comprising receiving an input string comprising one or more input characters from a client computing device. A first numeric value is mapped for each of the one or more input characters of the received input string based on one or more stored datasets. Each of the mapped first numeric values are masked using the one or more stored datasets for each of the one or more input characters of the received input string to a second numeric value. A masked character for each of the second numeric values is remapped based on the one or more stored datasets. The determined masked characters are provided to the requesting client computing device. | 01-16-2014 |
20140026217 | METHODS FOR IDENTIFYING KEY LOGGING ACTIVITIES WITH A PORTABLE DEVICE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output. | 01-23-2014 |
20140047557 | PROVIDING ACCESS OF DIGITAL CONTENTS TO ONLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored. | 02-13-2014 |
20140047558 | SYSTEM AND METHOD FOR PROVIDING ACCESS OF DIGITAL CONTENTS TO OFFLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user's machine and the end user by means of digital certificate. The server generates protected digital content by means of using a standard encryption algorithm. The invention further involves determining whether a license for accessing the protected file is requested by the legitimate user, and if so, generating a license consisting the user rights and the protected decryption key to be downloaded by legitimate user. The DRM client decrypts the protected file using a decryption key of the license, and renders the content to the end user by calling the appropriate and customized viewer during consumption. | 02-13-2014 |
20150085626 | METHODS FOR COMPUTING AN ALARM TIME AND DEVICES THEREOF - The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time. | 03-26-2015 |
20150088777 | SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION - The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field. | 03-26-2015 |