Class / Patent application number | Description | Number of patent applications / Date published |
340500850 | Password | 16 |
20080231418 | Integrated Physical Unclonable Function (Puf) with Combined Sensor and Display - The present invention relates to a device ( | 09-25-2008 |
20080238614 | METHOD AND SYSTEM FOR SECURING AND RECOVERING A WIRELESS COMMUNICATION DEVICE - A method of securing a wireless device, includes: receiving, from a subscriber, a request to activate one or more security features and recovery functions of a missing wireless device; determining whether the wireless device is powered on; setting, in the event the wireless device is not powered on, a flag in an account of the subscriber to activate the requested functions upon determining the wireless device is powered on; activating, upon determining the wireless device is powered on, the requested functions by blowing at least one of a series of electrically programmable fuses included within the wireless device; and deactivating by blowing at least another of a series of electrically programmable fuses, in the event of receiving another request from the subscriber, the one or more security features and recovery functions, so as to reinstate a set of standard operating features of the wireless device. | 10-02-2008 |
20090140839 | SYSTEMS AND METHODS FOR NON-TRADITIONAL PAYMENT USING BIOMETRIC DATA - Facilitating transactions using non-traditional devices and biometric data to activate a transaction device is disclosed. A transaction request is formed at a non-traditional device, and communicated to a reader, wherein the non-traditional device may be configured with an RFID device. The RFID device is not operable until a biometric voice analysis has been executed to verify that the carrier of the RFID equipped non-traditional device is the true owner of account information stored thereon. The non-traditional device provides a conduit between a user and a verification system to perform biometric voice analysis of the user. When the verification system has determined that the user is the true owner of one or more accounts stored at the verification system, a purchase transaction is facilitated between the verification system. Transactions may further be carried out through a non-RF device such as a cellular telephone in direct communication with an acquirer/issuer or payment processor | 06-04-2009 |
20090295540 | Facsimile machine, facsimile notification system, and communication terminal device - A facsimile machine receives image data, generates a password for received image data, assigns the generated password to the received image data, and stores the received image data. Information indicating a notification destination is extracted from the received image data, and the notification destination is notified of the password. The received image data are output responsive to subsequent input of the password at the facsimile machine. This scheme provides password protection without forcing users to register and remember passwords, and without the risk that a compromised password may be used for unauthorized output of facsimile data received later. | 12-03-2009 |
20100052854 | APPARATUS AND METHOD FOR ACTION CONTROL OF RFID SYSTEM - Provided are an apparatus and a method for controlling an operation of an RFID system, that can selectively control communication of the RFID system. In the method for controlling an operation of the RFID system including at least one REID tag storing predetermined data, and an RFID reader transmitting/receiving data to/from the RFID tag, a password is set to at least one of the RFID tag and the RFID reader. A password is received so that data transmission/reception is performed between the RFID tag and the RFID reader. When the received password coincides with the set password, the data transmission/reception is performed. | 03-04-2010 |
20100085154 | METHOD AND DEVICE OF FORMING RFID VIRTUAL TAG AND METHOD FOR RECEIVING CONTENTS USING THE SAME - Provided is a radio frequency identification (RFID) tag generating method and device, and a contents receiving method using the same. The contents receiving method using the RFID tag generating device includes: a terminal detecting a virtual tag corresponding to contents; receiving a password to be used once, corresponding to the virtual tag; authenticating a user by determining whether the password to be used once corresponds to a password input by the user; receiving an identification code of the virtual tag when the password to be used once corresponds to a password input by the user; and receiving the contents matching the identification code of the virtual tag, and providing the same to the user. | 04-08-2010 |
20100277279 | RFID PRIVACY PROTECTION METHOD AND APPARATUS - A Radio Frequency Identification (RFID) privacy protection method and apparatus is provided. The RFID privacy protection method includes: receiving a password of a tag; reading a code value from the tag; performing authentication of a user with respect to the tag using the code value and the password; and deactivating the tag electrically or physically based on a result of the performing. | 11-04-2010 |
20100308963 | System and Method for Motor Drive Control Pad and Drive Terminals - Embodiments of the invention provide a variable frequency drive system and a method of controlling a pump driven by a motor with the pump in fluid communication with a fluid system. The drive system and method can provide one or more of the following: a sleep mode, pipe break detection, a line fill mode, an automatic start mode, dry run protection, an electromagnetic interference filter compatible with a ground fault circuit interrupter, two-wire and three-wire and three-phase motor compatibility, a simple start-up process, automatic password protection, a pump out mode, digital input/output terminals, and removable input and output power terminal blocks. | 12-09-2010 |
20100328036 | SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state includes: displaying a security access interface on the display unit; selecting one image; changing at least one value of at least one property of the selected image; at least recording the at least one changed value of the at least one property of the selected image; generating an input password at least according to the at least one recorded value of the at least one property of the selected; determining whether the input password matches a predetermined password; and granting access if the input password matches with the predetermined password. A related security system is also provided. | 12-30-2010 |
20110156867 | Gesture-based signature authentication - Embodiments of the invention are generally directed to systems, methods, devices, and machine-readable mediums for implementing gesture-based signature authentication. In one embodiment, a method may involve recording a first gesture-based signature and storing the recorded first gesture-based signature. Then the method compares the first gesture-based signature with a second gesture-based signature. Then the method verifies the first gesture-based signature as authentic when the first gesture-based signature is substantially similar to the second gesture-based signature. | 06-30-2011 |
20120013440 | Method and Apparatus Pertaining to Module-Based Scanning of RFID Tags - These teachings comprise accessing an identifier as corresponds to a given module of RFID-tagged items and then using that identifier to filter the RFID tag readings. By one approach, one can obtain this identifier for the module by reading an optical code as corresponds to the given module of items. By another approach, one can obtain this identifier by reading an RFID tag that specifically correlates to the given module of items. By yet another approach, one can obtain this identifier by receiving the identifier as entered by an end user who is participating in the RFID tag reading process. If desired, this identifier can serve to recall corresponding information that can serve, directly or indirectly, as filter criterion to use when processing the RFID tag responses. | 01-19-2012 |
20120119878 | PORTABLE ELECTRONIC DEVICE, AND CONTROL METHOD AND CONTROL PROGRAM FOR THE SAME - An object of the present invention is to provide a portable electronic device of which operability is improved while maintaining a security function, and to provide a control method and a control program for the portable electronic device. In a case in which a function setting operation key is operated, a function limiting unit displays a screen for requesting password (for example, a personal identification number, a password, etc.) on a display unit, and limits utilization of a function assigned to the function setting operation key (for example, a variety of setting, an address book function, an electronic mail function, etc.). | 05-17-2012 |
20120182125 | PASSWORD CHECKING DEVICE - A password checking device is connected to a power pushbutton. The power pushbutton includes a first terminal connected to a power on terminal of an electronic device and a second terminal configured for being connected to ground. The password checking device includes a touch pushbutton, a capacitive touch sensor, a switching circuit, and a processor. The touch pushbutton includes a metal cover pressed down by the power pushbutton and a metal spring receiving the power pushbutton. The capacitive touch sensor senses the capacitance of the touch pushbutton. When the capacitance changes, the sensor sends a counting signal. The processor is pre-set with a password with the times of the counting signal and an interval between two counting signals. The processor controls the switching circuit make sure the second terminal is connected to ground. | 07-19-2012 |
20140125457 | Underground Asset Management System - A system for managing underground assets with RFID tags provides for expanded virtual storage by wirelessly linking the field RFID tag reader to a centralized database through a unique series code in the RFID tag. Real-time updating of information about underground assets coordination between multiple users may be accomplished through use of the central database as an information broker | 05-08-2014 |
20150123767 | Wearable, non-visible identification device for friendly force identification and intruder detection - A wearable, non-visible identification device that provides reliable, tamper proof, friendly-force identification and intruder detection. The device is integrated as a part of the wearer's uniform and includes a user input surface for periodic entry of a unit- or user-defined pass code. A timeout capability prevents the device and its identification signal from being used if the pass code is not entered within the specified time period. The preferred embodiment uses non-visible optical identification signals for 1-way identification using standard tactical equipment, making the device useful in the field during operations or at temporary security control points away from established bases. Alternative embodiments use radio-frequency, visible and reflective identification signals. All embodiments use identification signaling methods which are effective at safe stand-off distances to minimize the threat to security personnel. The device also supports identification at tactical distances to support identification in the field. Very low cost and low power embodiments for use by security forces in developing nations are described. This invention provides a novel and improved means for defeat of the threat of adversaries or insurgents exploiting stolen or fake uniforms to attack friendly forces. | 05-07-2015 |
20150137944 | PREVENTING THE DISCOVERY OF ACCESS CODES - An example method includes determining a size at which to display one or more keys of a virtual keypad and determining a symbol to display on the one or more keys of the virtual keypad. The method also includes displaying the one or more keys of the virtual keypad on a computing device in accordance with a key's determined size and symbol, where a first displayed key is displayed at a different size than a second displayed key. The method further includes receiving a user input corresponding to the one or more keys and comparing the user input with a sequence of symbols. The method also includes authenticating the user in accordance with the comparison of the user input and sequence of symbols. | 05-21-2015 |