Entries |
Document | Title | Date |
20080201773 | Image Processing Device - An image processing device is provide with an external storage which is detachably connectable to the image processing device, an inputting unit configured to allow a user to input user information, a registration unit configured to register ID information intrinsic to the external storage and the user information input through the inputting unit with registration data in a related manner, a permission unit configured to retrieve the ID information from the external storage and permit access to the external storage connected to the image processing device only if the retrieved ID information is included in the registered ID information which is registered with the registration data, and a data processing unit configured to read/write data from/to the external storage if access to the external storage is permitted by the permission unit. | 08-21-2008 |
20080216170 | Password strength checking method and appartatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof - A password strength checking method includes operations of inputting a password to be checked, generating a plaintext password candidate according to the same generation procedure as that used by a password guessing tool, determining whether or not the inputted password and the generated password candidate match each other, directing generation of the next password candidate when the match is not determined, determining strength of the inputted password based on the number of the generated password candidates when the match is determined, and outputting information of the determined password strength. | 09-04-2008 |
20080235788 | HAPTIC-BASED GRAPHICAL PASSWORD - A system and method of generating a graphical password is provided. User input into from input device is acquired based upon a grid point of a two dimensional grid mapped to the input device. A haptic input state of a haptic input device is acquired when the grid point when selected by the user. A tuple is generated based upon positional coordinates of the input device at the grid point and a value associated with the haptic input state of the haptic input device. A password can then be generated comprising multiple tuples. | 09-25-2008 |
20080244733 | Information management system, information management method, and computer program product - An information management system includes a management terminal, and a production base terminal, an installation terminal, a recycling base terminal or a reproduction base terminal connected to the management terminal via a network. Upon receipt of product information and recording medium information from the production base terminal and the customer information from the installation base terminal, the management terminal stores therein the information, and selects a recycling base or a reproduction base based on the information. The management terminal transmits at least one of the product information and the recording medium information to the recycling base terminal or the reproduction base terminal. | 10-02-2008 |
20080276312 | COMPUTER READABLE STORAGE MEDIUM STORING SOFTWARE EXECUTION CONTROL PROGRAM, SOFTWARE EXECUTION CONTROL METHOD AND SOFTWARE EXECUTION CONTROL SYSTEM - A character string indicating a date obtained from a calendar clock is combined with a fixed-value character string held internally to generate a hash character string using a hash function. The hash character string is compared with an input character string. When there is a match, the body portion of an application software is executed. When there is no match, a process is terminated without executing the body portion of the application software. | 11-06-2008 |
20080282343 | Digital Rights Management Using Biometric Data - Present inventions relates to a method of digital rights management for content data, comprising the steps of: obtaining ( | 11-13-2008 |
20080313731 | SELF-SERVICE CREDENTIAL MANAGEMENT - A self-service system and method for credential reset permits an administrator to customize policies for credential reset based on any user or group of users. Administrators may choose to set a more stringent policy for credential reset for users or groups that have higher-level permissions to access sensitive information within the resource protected by the credential. Customizable, plug-in gates are provided to permit administrators fine grained control over reset policy definition. When the user initiates a credential reset, the reset policy applicable to that user is invoked, and the user is presented with gates to pass pursuant to the applicable reset policy. The user's responses are compared to responses presented by the user at registration. If the responses meet the reset policy's threshold for accuracy, the user is permitted to reset the credential. | 12-18-2008 |
20090013402 | METHOD AND SYSTEM FOR PROVIDING A SECURE LOGIN SOLUTION USING ONE-TIME PASSWORDS - A method and system for a secure login solution for users logging into computers and systems that require authentication is provided incorporating one-time passwords. The method and system allows a user to establish a login key combination in relation to a login key structure. The login key combination is in association with an identification means, such as a username/ID, and allows the user to generate a one-time passcode in response to a random login key. The method and system is directed at situations where the user desires to log into a system from a computer or other electronic device that may not be secure, including for example from computers or devices other than the user's own and/or by using a communications connection that may not be secure, such as a wireless network connection. The method and system is simple and easy to implement and does not require the use of physical devices. | 01-08-2009 |
20090019540 | Password protection - An authentication system, including a pattern module to provide a pattern, a function module to provide a one-way function having a plurality of input and output values, a function processor to find one of the input values for the one-way function such that a corresponding one of the output values has the pattern, a password module to provide the one input value as a password for use in password authentication against the one output value, the one output value being a check value having a length, a compression module to determine a storage value such that: the check value can be reconstructed from the storage value and the pattern, and the storage value has a length which is shorter than the length of the check value, and a storage module to store the storage value in a storage medium for later retrieval. Related apparatus and methods are also included. | 01-15-2009 |
20090049542 | METHOD OF SOFTWARE DISTRIBUTION VIA THE INTERNET - In one general aspect there is provided a method for distributing software. The method comprising (a) a software user creating a user profile which includes one or more types of biometric data; (b) providing the biometric data to a software distributor; (c) obtaining the software; and (d) utilizing the software on the user's computer having a biometric sensing device that senses or measures a biometric parameter of the user useful for creating biometric data, wherein utilizing the software causes the activation of a verification program or function that compares the sensed or measured biometric data to the biometric data in the user profile. In another aspect, the invention relates to a method of handicapping two or more players of a game of skill, wherein the players are of varying skill levels. Also provided are methods of ranking players according to skill level and generating a professional gaming league based on skill level. Also provided is a system and an apparatus for verifying the identity of a user in a game of skill. | 02-19-2009 |
20090049543 | METHOD FOR BOOTING AND PROTECTING DATA IN HARD DISK OF COMPUTER SYSTEM AND MODULE FOR PROTECTING DATA THEREOF - A method for protecting data in a hard disk includes the steps of creating a password database in a basic input output system (BIOS) of a computer system and providing a first password column in the password database for a user to set a first password string. When the computer system is booted, a request of inputting a password is sent to the user to continue the booting program of the computer system. When the received password is the first password string, the data in the master boot record of the hard disk is backed up to a storage area, and the data in the master boot record is erased. | 02-19-2009 |
20090055923 | Operation system login method and electronic device using the same - An operating system login method and an electronic device using the same are provided. The operating system login method comprises the following steps. Firstly, a facial characteristic of a user is captured. Next, whether the facial characteristic of the user is stored in a database is determined. If the facial characteristic is stored in the database, then a login user's account number and password are automatically read from the database. Then, whether the login user's account number and password pass verification is determined. If the user's account number and password pass verification, then the user is allowed to login the operating system. | 02-26-2009 |
20090064316 | Method and Apparatus for Enhancing Information Security in a Computer System - A method of enhancing information security in a computer system comprises receiving an input signal, reading a starting password, comparing the input signal with the starting password for generating a comparison result, and controlling an operating status of a basic input and output system of the computer system according to the comparison result. | 03-05-2009 |
20090064317 | DATA PROTECTION SYSTEM AND METHOD THEREOF - An exemplary data protection system includes a storage module, an input module, and a logistic module. The storage module is configured for storing data and a preset password. The input module is configured for inputting a password. The logistic module is configured for comparing the input password with the preset password. If the input password is identical to the preset password, the data stored in the storage module is set to accessible. When operations of accessing to data are finished, the data is blocked from accessing. | 03-05-2009 |
20090083848 | PRINTING METHOD - A method and apparatus for printing a data item. The method comprises receiving at a printer a first component of said data item from an external data source; generating a second component of said data item at said printer; and printing said data item by printing said first and second components. | 03-26-2009 |
20090083849 | SECURITY PROTECTION METHOD AND PORTABLE ELECTRONIC DEVICE USING SAME - A security protection method used in a portable electronic device is provided. The portable electronic device provides an ID table for recording IDs of external electronic devices that are allowed to access the portable electronic device. The method includes: obtaining an ID of an external electronic device when the external electronic device is connected to the portable electronic device; determining whether the obtained ID exists in the ID table; and allowing the connected external electronic device to access the portable electronic device when the obtained ID exists in the ID table. A portable electronic device used the method is also provided. | 03-26-2009 |
20090089875 | LOCAL VERIFICATION OF TRUSTED DISPLAY BASED ON REMOTE SERVER VERIFICATION - In a system with a main memory, a network adapter, and a display, a transaction security module in communication with the network adapter. The transaction security module acts to: establish a secure identification item with an entity which positively identifies the entity; accept an application OS of the entity; and initiate a guest OS with the entity; the network adapter acting to connect with the entity subsequent to initiation of a guest OS; and the display acting to display the secure identification item subsequent to connection with the entity. | 04-02-2009 |
20090106833 | ELECTRONIC APPARATUS WITH PERIPHERAL ACCESS MANAGEMENT SYSTEM AND METHOD THEREOF - A method for managing access authorization of peripherals of an electronic apparatus is provided. The method includes the step of: providing a data storage for storing a peripheral registry table which stores hardware IDs of the peripherals; reading the hardware ID of the peripheral when the peripheral is connected to the electronic apparatus; determining whether the hardware ID is recorded in the peripheral registry table; activating an access of the peripheral when the hardware ID is recorded in the peripheral registry table; and registering the hardware ID of the peripheral into the peripheral registry table when the hardware ID is not recorded in the peripheral registry table. | 04-23-2009 |
20090113543 | AUTHENTICATION CERTIFICATE MANAGEMENT FOR ACCESS TO A WIRELESS COMMUNICATION DEVICE - A system and method for authenticating a user to a user device using one or more-factor authentication with a certificate are provided. The status of the certificate is stored at the user device such that the stored status is queried during the authentication process. The status is updated as a background operation on the user device on a periodic basis. In the event that the user device fails to obtain updated status information, further status update requests are issued by the user device at varying time intervals until a response is received. In the event that the user is authenticated to the device but the certificate is subsequently revoked, access to all or a subset of user data and functions on the user device may be restricted. | 04-30-2009 |
20090133120 | PREVENTING TRIVIAL CHARACTER COMBINATIONS - Methods, systems, and products for preventing the selection of trivial character combinations in passwords. Methods may include maintaining a database of trivial patterns representing sequences on the keyboard and independent from the starting point of the sequence. When a new password is proposed a check is done to verify if the pattern of the new password matches with an existing “forbidden” pattern and in such case it is refused by the system. Any number and kind of trivial patterns may be forbidden. The security administrator may choose patterns which should not be permitted. | 05-21-2009 |
20090150991 | PASSWORD GENERATION - A device, method and system for authentication by a user are disclosed herein. The exemplary method may authenticate a user password entered by a user. User specific attributes may be accessed and used to produce a generated password. The generated password may be produced using an algorithm and the user attributes. The generated password may be used to log onto a resource for the user. | 06-11-2009 |
20090172808 | ACCESS CONTROL DEVICE - An object of the invention is to provide an access control apparatus for lessening the occasions of invading a place where no entry is permitted without setting any separate access condition for a temporary user of a visitor, etc., in a room entering and leaving management apparatus using personal identification information of an IC card, etc. | 07-02-2009 |
20090178135 | LANGUAGE INDEPENDENT LOGIN METHOD AND SYSTEM - The present invention prevents illegitimate access to a user computing machine. A method in accordance with an embodiment includes: setting an authentication routine in the user computing machine; generating a virtual keyboard on the user computing machine; entering a user identification through the virtual keyboard, the user identification being entered according to a virtual keyboard form factor; comparing the entered user identification with a secure user identification previously stored in the user computing machine; and validating the user access to the user computing machine if a match occurs, otherwise denying access. | 07-09-2009 |
20090193516 | ONE TIME PASSWORD INQUIRY METHOD AND TOKEN - The invention relates to a one time password inquiry method, including steps of triggering a one time password token, determining whether the trigger is a generation or an inquiry operation, if it is an inquiry operation, inquiring and displaying the latest generated password; otherwise, generating a one time password. Meanwhile, the invention also provides a one time password token with inquiry function, including a trigger module, a determining module, a one time password generating module, a storage module, a display module and an inquiry module. By adding inquiry function, the token meets the need for a user to inquiry a one time password, eliminates the asynchronous problem between the token and a server, and lowers power loss taken by the token. | 07-30-2009 |
20090193517 | IMAGE PROCESSING APPARATUS AND IMAGE PROCESSING SYSTEM - An image processing apparatus capable of managing easily secret information even with detachably attaching an external memorizing device, includes an ID (plug and play ID) retrieving unit for retrieving ID from the connected memory, a user information storing unit for storing user information, an active memory information storing unit for storing the retrieved ID with corresponding to the respective users, a memory use judging unit for judging as to whether the memory is usable based on the ID retrieved from the connected memory and on the ID stored in the active memory information storing unit, and a data writing controlling unit for writing data to the memory judged as usable. | 07-30-2009 |
20090193518 | Keyboard with Programmable Username and Password Keys and System - A computer input system and method that includes a plurality of username keys and a plurality of password keys that can be selectively programmed by the user. When the user is required to enter a username or password to use the computer, a software program, a file, a network or a website, the user moves the cursor on the display to the proper field and touches one of the pre-programmed username and password keys to automatically input the username and password. The system includes a software program that creates a username and password recording page in which the user enters different usernames and passwords and then assigns them to different username keys and password keys on the keyboard. The system also creates a protected asset menu page that allows the user to list different protected assets and the combination of username and password keys needed to use, open or access them. The keyboard may include a security feature that prevents unauthorized use of the keyboard. | 07-30-2009 |
20090199293 | METHOD AND SYSTEM OF MANAGING USER ACCESS IN A COMPUTING SYSTEM - A method and system of managing user access in a computing system is provided. The system can include an operations controller in communication with the computing system for managing the commercial transactions of the computing system over the internet, and an access management controller in communication with the operations controller. The access management controller can receive an input comprising user roles and actions associated with the computing system. The access management controller can generate a matrix indicating a relationship between the user roles and the actions. The access management controller can provide the input to the operations controller for implementation of access rules in accordance with the relationship indicated in the matrix. The access management controller can attempt to access in the computing system at least a portion of the user roles and actions after the operations controller has implemented the access rules. The access management controller can compares the attempted access with the relationship indicated in the matrix to determine access discrepancies. | 08-06-2009 |
20090199294 | Managing Password Expiry - A method and apparatus for managing the expiration of a password. In one embodiment, the method comprises determining whether a behavior anomaly associated with an account has occurred. In response to a determination that the behavior anomaly has occurred, the method expires a password associated with the account and forces the password be changed the next time the password is presented for accessing the account. | 08-06-2009 |
20090199295 | IMAGE PASSWORD AUTHENTICATION SYSTEM OF PORTABLE ELECTRONIC APPARATUS AND METHOD FOR THE SAME - The present invention provides an image password authentication system of a portable electronic apparatus and a method for the same. An image with a plurality of image regions is stored in the portable electronic apparatus, and the image regions are selected on a touch panel to generate an authentication parameter. The authentication parameter comprises user-selected image regions, a sequence of user-selected image regions, an elapsed time of selection operation, and requested times of selection operation. The authentication parameter is stored in a database module and is used to verify a validation parameter which is generated when users select the plurality of image regions on the touch panel of the authentication system in operating the portable electronic apparatus. Hence, the image password authentication can be provided to replace the existing number-input or character-input password authentication scheme. | 08-06-2009 |
20090210938 | Utilizing Previous Password to Determine Authenticity to Enable Speedier User Access - Illustrative embodiments provide a computer implemented method, a data processing system, and a computer program product for previous password based authentication. In one illustrative embodiment, the computer implemented method comprises obtaining a combination of an identifier and a password and determining whether the password is current and correct. The computer implemented method responsive to determining the password is other than current and correct, prompting for an old password and determining whether the old password matches a previous password. Responsive to the old password matching a previous password, thereby creating a password match, permitting access to a resource. | 08-20-2009 |
20090217373 | ACTIVE VERIFICATION OF BOOT FIRMWARE - Techniques are described for generating and actively verifying a boot code associated with a peripheral device of a computer system to prevent potential security threats the boot code may introduce into the computer system. The techniques for generating boot code entail generating the boot code from a high-level programming language using a verification application program interface (API). The API aids in generating a certificate, which is associated with the boot code in that the certificate describes operation of the boot code. After generating the boot code and associated certificate, the two are loaded onto a memory module of the peripheral device. Once the peripheral device is connected to the computer system, the computer system may retrieve the boot code and certificate. The computer system utilizes techniques to actively verify the boot code by performing a security check on the boot code in accordance with the associated certificate. Finally, the computer system executes the boot code based on a result of the security check. | 08-27-2009 |
20090222908 | Device for Transmission of Stored Password Information Through a Standard Computer Input Interface - A novel password management device is interposed between a computer and a conventional computer input device such as a keyboard. Passwords are defined at the input device, stored in a preferably encrypted password vault and forwarded to a secure application. When the user is prompted for a password, the device retrieves the password from the vault and provides it to the computer in a manner indistinguishable from conventional data traffic, mitigating the likelihood that the innocuous data stream will be monitored to recover the password. The transmission of a password is push technology and may be enhanced by a gating feature. Automatic password retrieval from the vault is convenient to the user, particularly if the device automatically generates random passwords. No software is installed on the computer; the device is operating system, application and platform independent. The device may be integrated within the input device or within the computer itself. | 09-03-2009 |
20090222909 | Password Management Outside of a Bios - In accordance with at least one presently preferred embodiment of the present invention, there is broadly contemplated herein the managing of a POP not solely in the BIOS but at least partly in a more secure location. In accordance with a particularly preferred embodiment of the present invention, this location could be in a NVRAM (non-volatile random access memory) inside a TPM (trusted platform module). Most preferably, this location will contain code that the BIOS preferably will need to access and employ in order to complete the booting of the system. | 09-03-2009 |
20090241184 | METHOD FOR GENERATING ACCESS DATA FOR A MEDICAL DEVICE - A method for generating an access code to a medical device including a memory for patient data, the access code being valid only once. According to the method, a query key is generated from a device-internal identification and is transmitted to an authorization entity. The authorization entity generates an associated release key from the query key. The release key grants access and modifies the internal identification when the release key is entered into the device such that the access code cannot be used a second time. | 09-24-2009 |
20090241185 | SECURE PASSWORD ENTRY - A method, system, and program defeating unauthorized keystroke logging during password entry are provided. Secure password entry is facilitated by displaying a password prompt comprising a changing stream of random characters, where a particular character within the stream of random characters is displayed at a visibly detectable higher frequency. A user selects a password character by entering input to increment or decrement the particular high frequency character to reach the password character, such that any unauthorized keystroke logging to detect said password is ineffective. Once the user reaches the password character, the user provides another input indicating a selection of the current high frequency character as the password character. Once the user has selected all the characters of the password, the user enters an input indicating the password is complete and the password entry controller then passes the password to the calling layer. | 09-24-2009 |
20090249477 | METHOD AND SYSTEM FOR DETERMINING WHETHER A COMPUTER USER IS HUMAN - A method and system for determining whether an online service user is human is provided. In one implementation, the method may include collecting personal information about the online service user, generating a question based on the personal information, communicating the question to the online service user in the form of a CAPTCHA, and receiving a response to the question presented in the CAPTCHA, wherein a correct response is interpreted to mean that the online service user is human. The method and system may also include measuring the response time in answering the question. | 10-01-2009 |
20090293117 | AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 11-26-2009 |
20090300755 | PROVIDING HINTS WHILE ENTERING PROTECTED INFORMATION - One or more hints can be presented during the entry of protected information. Traditionally, for security reasons, the protected information is displayed as ambiguous characters, hindering the ability to determine if there was an error inputting the information. A hash can be calculated from some or all of the protected information already input, and the resulting hash value can be used to select a hint. The hints can be selected from a relatively small number of easily distinguishable hints, including visual, auditory and sensory hints, or any combination thereof. The hints are not a globally unique identifier of the protected information and can, instead, be used to detect a deviation from the correct entry of the protected information. | 12-03-2009 |
20090307767 | Authentication system and method - An authentication system includes a user terminal to perform authentication based on a password corresponding to a seed number generated in accordance with a predefined rule. The system further includes a password issuance apparatus to issue the password in response to reception of a request message including the seed number. | 12-10-2009 |
20090320126 | INFORMATION PROCESSING APPARATUS AND METHOD - An information processing apparatus sets positional relationship information indicating positional relationship between a designated position, which is to be designated on a screen by a user in a case where a plurality of images inclusive of the pass image are displayed on the screen at the time of authentication, and a display position of the pass image (S | 12-24-2009 |
20090328197 | USER VALIDATION USING IMAGES - A method of validating a user, includes: —storing for a user data representative of a validation code for the user including a combination of symbols from a set of symbols; presenting a displayed image including a plurality of designatable areas in which the set of symbols is distributed between said designatable areas such that each designatable area contains a plurality of the symbols; varying the image between subsequent presentations such that the distribution of symbols between the designatable areas changes between subsequent presentations, validating a user in an validation routine by detecting designation by a user of a combination of the designatable areas in a presented image, and determining whether the combination of designated designatable areas contains the combination of symbols making up the validation code for the user. | 12-31-2009 |
20090328198 | SECURE PASSWORD ORGANIZER - A computer-readable stored median has stored thereupon a program for performing a method of generating, storing, accessing, retrieving and displaying a plurality of records such as in an electronic device. The electronic device may include a data entry mechanism and a keyboard and may further include a processor, a memory, and a display. The method compromises the steps of generating and saving a master passcode in the memory and generating a record such as an account identification, a user ID and a password, and saving the record in the memory. The method further comprises the steps of generating a user ID for storage in the memory and generating and storing the password corresponding to the user ID in the memory. Access to the memory is provided by entering the master passcode for retrieval of the records. | 12-31-2009 |
20100017874 | METHOD AND SYSTEM FOR LOCATION-AWARE AUTHORIZATION - A method and system for controlling access to a module based on spatial location of the module is provided. One implementation involves detecting spatial location of the module, accessing a set of rules indicating locations where access to the module is not authorized, and controlling access to the module based on the detected location by checking the detected location against the set of rules, and denying access to the module when the detected location is within locations where access to the module is not authorized. | 01-21-2010 |
20100024030 | RESTARTABLE TRANSFORMATION AUTOMATON - Data transformation is lazily performed to facilitate reduced memory footprint, among other things. Rather than constituting an entire data structure, information is saved to enable iterative construction the structure. Moreover, an interface is afforded that appears to operate over a fully resolved structure but which is implemented on top of a restartable transformation mechanism that computes values in response to requests. These computed values could also be released based on one or more configurable policies. | 01-28-2010 |
20100024031 | System and method for transforming hierarchical objects - A method and apparatus for configuring a device, by receiving or creating a hierarchical object controlling the configuration of the device, deriving a set of commands relevant to the hierarchical object, receiving a string from a command line interface, parsing the siring into a command in accordance with the relevant set of commands, and executing the command thus manipulating the hierarchical object. | 01-28-2010 |
20100031343 | USER POLICY MANAGEABLE STRENGTH-BASED PASSWORD AGING - Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period. | 02-04-2010 |
20100031344 | TOUCH-SCREEN BASED PASSWORD INPUT SYSTEM AND ELECTRONIC DEVICE HAVING SAME - An electronic device includes multi-touch screen and a password input system. The multi-touch screen can detect a sequence of user inputs, each of which involves tapping at least one point thereof. The password input system includes a determining unit, a storing unit, an indexing unit, and an outputting unit. The determining unit can count the numbers of touch point(s) of the user inputs. The storing unit stores a character database which includes a collection of numbers of touch point(s) and a collection of corresponding machine-readable characters. The indexing unit can look up matching machine-readable characters for the user inputs in the character database. The outputting unit can output the matching machine-readable characters sequentially as a password. | 02-04-2010 |
20100083368 | THUMB DRIVE GUEST USER - A method and system for managing a computer user, comprising initiating a user session for the computer user based on user data stored in one partition on a removable computer readable medium. The user data is associated with a user ID, and the user ID is stored on a second partition of the removable computer readable medium. The user ID is used to identify the user data to the computer user. The computer user is authenticated as being associated with the user data based in part on the user ID. Also described is an article of manufacture for creating a partition on a removable computer readable medium for storing user data and associating it with a second partition storing an associated user ID on the removable computer readable medium. | 04-01-2010 |
20100083369 | METHOD AND APPARATUS PROVIDING A FRAMEWORK FOR SECURE INFORMATION LIFECYCLE - A method, apparatus and computer program product for handling secure information (e.g., a password, an account number, a personal identification number (PIN), a user identifier, an encryption key, and a path where said secure information is stored) is presented. Secure information is stored in a software container. A plurality of representations of the secure information is provided, each of the plurality of representations for use under different conditions. Dependent on the particular condition, at least one of the plurality of representations of the secure information is provided by the container. The container holds the secure information during all stages of processing in a manner that prevents unauthorized parties from gaining access to the secret in clear form. | 04-01-2010 |
20100088758 | SECURITY SYSTEM, SECURITY METHOD AND RECORDING MEDIUM STORING SECURITY PROGRAM - A security system to give a user in a specific area use authority based on authentication, and to permit use of the specific area by the use authority. The security system includes an authentication unit to authenticate a user, a position detection unit to detect at least one of a position and move of a user, and a use authority control unit to monitor at least one of a position and move of a user to whom the use authority is given based on the authentication of the authentication unit by a detection output of the position detection unit, and, if a distance between users is equal to or below a predetermined value, to change the use authority which is given to each user. | 04-08-2010 |
20100095371 | Visual authentication systems and methods - Methods for authenticating a user including presenting a series of images that are solely identifiable by the user, and that are not otherwise capable of being represented or expressed by the user, apart from the recognition thereof. Additionally, methods are provided that include the use of a gradient of morphed images created from a related set of initial images, including facial photos of various emotions that have been morphed into discernable images that are uniquely identifiable by a single user for use in authenticating the identification of that user by a secure system. | 04-15-2010 |
20100107241 | SECURE CACHING OF SERVER CREDENTIALS - A credential caching system includes receiving a set of authentication credentials, storing the set of authentication credentials in a credential cache memory, wherein the credential cache memory is coupled with a management controller, and supplying the set of authentication credentials for automatic authentication during a reset or reboot. In the event of a security breach, the credential caching system clears the set of authentication credentials from the credential cache memory so that the set of authentication credentials may no longer be used for a reset or reboot. | 04-29-2010 |
20100115607 | SYSTEM AND METHOD FOR DEVICE SECURITY WITH A PLURALITY OF AUTHENTICATION MODES - A security processing element stores authentication data corresponding to a plurality of possible authentication modes. At a time of activation, the security processing element randomly selects one of the authentication modes for presentation to the user. The user must successfully enter data corresponding to the randomly selected authentication mode. In an alternative embodiment, the security processing element can randomly select a plurality of authentication modes that are sequentially presented to the user. The user must successfully respond to each of the plurality of requested authentication modes. In another embodiment, for high security communications, the security processing element may select from a subset of authentication modes that are considered to be more robust. Conversely, the security processing element may select from a subset of randomly presented authentication modes that are considered less robust when used in a low security setting. | 05-06-2010 |
20100115608 | IMAGE PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND COMPUTER-READABLE STORAGE MEDIUM STORING PROGRAM FOR IMPLEMENTING THE METHOD - An image processing apparatus capable of reducing the frequency of a user's inputting work for authentication information to improve the convenience. | 05-06-2010 |
20100122340 | ENTERPRISE PASSWORD RESET - One embodiment of the present invention provides a system for automatically authenticating a user. During operation, the system receives a user's request for authentication. The system then extracts information associated with the user from user-specific information stored in an enterprise computer. The extracted user information does not explicitly relate to a password. The system further generates one or more challenges based on the extracted user information, and receives the user's response to the challenges. Subsequently, the system compares the user's response to the extracted user information, and authenticates the user. | 05-13-2010 |
20100125906 | RESETTING A FORGOTTEN PASSWORD USING THE PASSWORD ITSELF AS AUTHENTICATION - One embodiment of the present invention provides a system for resetting a user's forgotten password. During operation, the system receives a user's request for resetting the user's forgotten password and derives one or more challenges from the user's forgotten password. The system then presents the derived challenges to the user and receives a response from the user to the challenges. The system further compares the user's response to the one or more challenges with the user's forgotten password, thereby facilitating password resetting. | 05-20-2010 |
20100125907 | UPnP CDS USER PROFILE - In one embodiment, an apparatus includes a hierarchy of authentication folders configured in a control directory server (CDS) of a Universal Plug and Play (UPnP) network, a personal identification number (PIN) code associated with a user and comprising of identifiers, and non-public media content organized in the CDS to provide selective service to users, where the non-public media content is made accessible to the user when the user is authenticated with a selection of the hierarchy of authentication folders. | 05-20-2010 |
20100162385 | Method of determining when a computer program password is under attack - Determining the onset of a computer password attack by counting the total number of characters and the number of wrong characters in the submitted password and comparing these numbers to the correct password. If the total number of characters in the submitted password differs from the number in the correct password, or if the number of wrong characters exceeds the user-defined number allowed, a password attack is declared. | 06-24-2010 |
20100175127 | METHOD AND APPARATUS FOR MAXIMIZING CAPACITY OF ACCESS CONTROLLERS - A method and apparatus are provided for controlling access to a secure area. The method includes the steps of providing a plurality of user credentials, generating a Boolean equation based upon the plurality of user credentials where the generated Boolean equation provides a predetermined response to each user credential of the plurality of credentials, saving the generated Boolean equation in a memory in place of the user credentials and recognizing a user credential of the plurality of user credentials by reference to the Boolean equation. | 07-08-2010 |
20100180335 | SELF-PROTECTING STORAGE - A method and apparatus for managing passwords for accessing data in a storage is provided. The method comprises generating and storing a password, generating and providing to the storage a request to access data in response to receiving a first request to access data in the storage, retrieving and providing the password to the storage in response to the request for a password. The apparatus comprises an initialization module and a storage access module. The initialization module is configured to generate and store a password. The storage access module is configured to generate and provide a request to access data in response to receiving a first request to access data in the storage, receive a request for a password, retrieve the password in response to the request for a password, and provide the password to the storage to obtain access to the data in the storage. | 07-15-2010 |
20100251358 | ELECTRONIC DEVICE, UNLOCKING METHOD, AND PROGRAM - There is provided an electronic device capable of automatically unlocking a lock of an external storage device using a password without adding a function to the external storage device. An electronic device | 09-30-2010 |
20100299745 | LOCKING AND RESETTING LOCK KEY OF COMMUNICATION DEVICE - A device, such as a mobile phone, may include a memory to store a device-lock pass code. A processor in the device may compare the device-lock pass code stored in the memory to a device-lock pass code entered by a user to determine whether the entered device-lock pass code is correct. The processor may disallow use of the device when the entered device-lock pass code is not correct. The processor may reset the device-lock pass code stored in the memory when an entered unblock pass code is correct. Whether the unlock pass code is correct or not may be based on a comparison of the unblock pass code entered by the user to an unblock pass code associated with a removable identity module. In one embodiment, the memory in the device may include a boot module and an operating system. The memory may also include a memory area that stores the device-lock pass code. In one embodiment, the memory area is not accessible by the boot module, but may be accessed by the operating system. | 11-25-2010 |
20100299746 | PASSWORD PROTECTION SYSTEM - A password registering method used in an electronic device includes generating and outputting indicating information according to at least one program as an indicating command executed to indicate the user to input a password; detecting and outputting first input information, recording a first time value when the first input information is detected; detecting and outputting second input information, recording a second time value when the second input information is detected; recording time period between the first time value and the second time value; generating password information according to the input operations and the time period; and registering the password information as a password to unlock the electronic device. A password protection method for unlocking the electronic device and the electronic device are also provided. | 11-25-2010 |
20100333195 | PASSWORD PROTECTION SYSTEM - A password registering method used in an electronic device includes displaying one visual dial on a touch screen of the electronic device; recording rotation parameters of the visual dial rotated by a user, and generating input information according to the rotation parameters; and registering the password according to the generated input information the user's confirming the rotation operation. | 12-30-2010 |
20110010770 | SYSTEM AND METHOD FOR PERFORMING KEY INJECTION TO DEVICES - A key injection service module for an asset management system is provided for a secure means of injecting keys into products. To provide this service, a controller is used to define one or more key types defining the format of the keys in a file. The controller is then used to define a product model, and then to bind each key type to the product models. | 01-13-2011 |
20110072510 | APPARATUS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ENTERING SECURE PASSWORDS - Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application. | 03-24-2011 |
20110078786 | Providing a User Input Interface Prior to Initiation of an Operating System - A processor-based system, including systems without keyboards, may receive user inputs prior to booting. This may done using the graphics controller to generate a window which allows the user to input information. The system firmware may then compare any user inputs, such as passwords, and may determine whether or not to actually initiate system booting. | 03-31-2011 |
20110099625 | TRUSTED PLATFORM MODULE SUPPORTED ONE TIME PASSWORDS - A Trusted Platform Module (TPM) can be utilized to implement One Time Password (OTP) mechanisms. One or more delegation blobs can be created by the TPM and the delegation authentication values of the delegation blobs can be based on the version number of the delegation blobs. A data blob with a protected secret can comprise a pointer to the delegation table of the TPM. The version number can be provided to an authority from which an OTP (a delegation authentication value) can be received. The OTP can be utilized to gain access to the secret and an authentication value of the key blob, which can be utilized to increase the version number of all associated delegation blobs. Policy limitations can be associated with the delegation blobs and can be enforced by policy enforcement mechanisms that can reference the TPM tick counter to enforce temporal policy restrictions. | 04-28-2011 |
20110099626 | MULTI-FUNCTIONAL PERIPHERAL CONTROL SYSTEM AND MULTI-FUNCTIONAL PERIPHERAL - A multi-functional peripheral control system is composed of an authentication server having a user information management database for storing authentication information corresponding to each user, and that performs user authentication processing with reference to the user information management database, and one or more multi-functional peripherals managed by the authentication server, in which the multi-functional peripheral has a user information management table for storing authentication information corresponding to a user, when being possible to connect to the authentication server, transmits user information to the authentication server to perform authentication processing, and when being impossible to connect to the authentication server, performs alternate authentication with reference to the user information management table, and the multi-functional peripheral includes a user deletion portion for deleting user information that authentication is not permitted by the authentication server from the user information management table. | 04-28-2011 |
20110162066 | PASSWORD PROCESSING METHOD AND APPARATUS - A password processing method is provided. According to an embodiment, an object is displayed, and moved in at least one direction according to the user's motion. The password is processed in accordance with a combination of motions of the object in the at least one direction. | 06-30-2011 |
20110225648 | METHOD AND APPARATUS FOR REDUCING THE USE OF INSECURE PASSWORDS - One embodiment of the present invention provides a system for reducing the use of insecure passwords. During operation, the system receives a login request at a computer system, wherein the login request includes a username and a password. Next, the system saves the password to an attempted password list, wherein the attempted password list includes passwords that have been attempted during login. The system then receives a password change request, wherein the password change request includes a username and a new password. Next, the system determines whether the new password is a member of the attempted password list. If so, the system rejects the password change request. However, if not, the system processes the password change request. | 09-15-2011 |
20110283353 | Method and a device for generating a secret value - A device and a method for graphical passwords. A device displays an initial image comprising a plurality of graphical elements, each graphical element having at least two variants; receives user input to select a variant of a number of the graphical elements, thereby generating a modified image; and generates the secret value from at least the selected variants of the graphical elements. The graphical elements are advantageously seamlessly integrated in the images, thereby making the system resistant to shoulder surfing attacks. | 11-17-2011 |
20110307952 | ELECTRONIC DEVICE WITH PASSWORD GENERATING FUNCTION AND METHOD THEREOF - An electronic device with a password generating function is provided. The electronic device stores a number of password keys. The electronic device generates a password editing interface for user to edit a graphic password. The password editing interface includes a password key area and a password editing area. The password key area displays the password keys and the password editing area is provided for editing the password keys. The password key is selected from the password key area to the password editing area to edit the graphic password. | 12-15-2011 |
20120005747 | SYSTEM AND METHOD FOR STORING A PASSWORD RECOVERY SECRET - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for storing a password recovery secret on a peripheral such as a power adapter by receiving a password recovery secret at the power adapter via an interface with the computing device, and storing the password recovery secret on a memory in the power adapter. The password recovery secret can be recovered by requesting the password recovery secret from the power adapter, wherein the password recovery secret is associated with a computing device, receiving the password recovery secret from the memory of the power adapter, and recovering a password based on the password recovery secret. The power adapter can include an electrical source interface, an electronic device interface, an intermediate module to adapt electricity between the interfaces, a memory, and a memory interface through which a password recovery secret is received for storage in the memory. | 01-05-2012 |
20120047574 | TERMINAL AND METHOD FOR RECOGNIZING MULTI USER INPUT - A terminal includes an input unit to receive input signals of users, a human information detection unit to detect user human information of the users, a user identification unit to identify the users using the user human information, and a control unit to identify the users corresponding to the input signals, and to control the terminal according to the input signals of the identified users. A method for controlling a terminal includes receiving input signals of users, detecting user human information, identifying the user using the user human information, identifying the users corresponding to the received input signals, and controlling the terminal according to the input signals of the identified users. | 02-23-2012 |
20120060213 | Orderly Change Between New And Old Passwords - A processor stores a current password in a current password storage area, which results in committing the current password as a valid password. In turn, the processor initiates a password change interval that indicates a required point at which to change the current password. The processor also stores a future password in a future password storage area, which activates the future password. Activating the future password allows a user to login using the future password, but is independent of the password change interval (e.g., does not reset the password change interval). The processor subsequently receives a login request from a user that includes a login password, and determines that the login password matches the future password. As a result, the processor authorizes the user in response to determining that the login password matches the future password. | 03-08-2012 |
20120079589 | SYSTEM AND METHOD FOR AUTHENTICATION USING A SHARED TABLE AND SORTING EXPONENTIATION - Disclosed herein are systems, computer-implemented methods, and computer-readable media for authentication using a shared table. The method receives an authentication challenge from a first entity including an accumulator with an initial value, lists of elements in a shared table, and a list of sorting algorithms, each sorting algorithm is associated with one of the lists of elements and modified to include embedded instructions operating on the accumulator. The method then generates a temporary table for each list of elements in the shared table by copying elements from the shared table as indicated in each respective list of elements, each temporary table being associated with one sorting algorithm in the list of sorting algorithms. The method sorts each generated temporary table with the associated sorting algorithm, thereby updating the accumulator with the embedded instructions. Finally, the method transmits the updated accumulator to the first entity for verification. | 03-29-2012 |
20120084854 | HARDWARE-BASED HUMAN PRESENCE DETECTION - A method, system, and computer program product containing instructions to provide hardware-based human presence detection. Rather than rely upon software to display a CAPTCHA image, hardware in the form of a sprite engine of a graphics device is used to write a random text string directly to the display device, overlaying the user interface provided by software. Because the sprite engine is isolated from a host operating system for the system, the random text string cannot be captured and processed by software robots running under the host operating system. | 04-05-2012 |
20120084855 | SECURE PIN RESET PROCESS - A secure password/Personal Identification Number (PIN) reset process is disclosed. The process involves replacing a transportation password/PIN of a terminal with a user-specific password/PIN. During the replacement, the user-specific password/PIN is bound with a token. The token can then be used to securely reset the password/PIN of the terminal back to the transportation password/PIN if the user-specific password/PIN is forgotten or compromised. | 04-05-2012 |
20120096543 | AD HOC TRUST DELEGATION IN HUMAN BASED WORKFLOW SYSTEMS USING ONE TIME ACCESS KEY - A method of ad hoc trust delegation in human-based workflow systems using one-time access key is provided herein. The method may include the following steps: generating a unique access key to a workflow system in response to a delegation of trust to one or more users; associating the unique access key with a specified portion of a workflow within the workflow system; embedding the unique access key in a message sent to the one or more users; and providing the one or more users with a one-time access to the workflow system, such that the access is limited to the specified portion of the workflow, in response to applying the unique access key to the workflow system. | 04-19-2012 |
20120102565 | METHOD AND SYSTEM FOR CONTROLLING THE EXECUTION OF A FUNCTION PROTECTED BY AUTHENTIFICATION OF A USER, IN PARTICULAR FOR THE ACCESS TO A RESOURCE - A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a resource The method includes inputting, by the user, of personal data using an input device, authenticating the user with the input personal data for authorizing or not authorizing the execution of the function; in a secure card connected to the input device, storing limited validity authentication data dependant on the input data; when the card is connected to a processing device by which the user generates a message whose processing implements the function, using the stored data, taking into account the limited validity, to authorize or not authorize the execution of that function. | 04-26-2012 |
20120159611 | Central Administration and Abstraction of Licensed Software Features - Systems and techniques are provided to allow for license abstraction by a central licensing server among a set of remote clients. The central server may generate a configuration file that can be pushed to remote clients, to configure the clients to provide desired software features. The licensed features may be distributed among the clients in any combination desired by an administrator. | 06-21-2012 |
20120159612 | System for Storing One or More Passwords in a Secure Element - The present invention involves a system for storing one or more passwords on a portable communication device having a secured element and a user interface, the system comprising memory associated with the secure element; a card management module operably associated with the portable communication device and with the secure element capable of controlling the secured element to facilitate writing to and reading from the memory; a graphical user interface operably connected via the user interface of the portable communication device with the card management module, the graphical user interface providing for input of the one or more passwords into the memory via the card management module and for viewing the one or more passwords so stored in the memory. | 06-21-2012 |
20120174211 | INFORMATION PROCESSING DEVICE - An information processing device includes a processing unit which performs user authentication. The processing unit includes a setting part that determines setting of operation of a target device using the user authentication. An authentication information setting part determines user authentication information. A password generation part generates a one-time password partially or fully. A transmission part transmits the setting of operation of the target device and the one-time password to the target device. | 07-05-2012 |
20120185934 | METHOD AND APPARATUS FOR INPUTTING PASSWORD IN ELECTRONIC DEVICE - A method inputs a password in an electronic apparatus. In the method, whether an authentication number input request corresponding to a password exists is determined. When the authentication number input request exists, a screen for requiring input of an authentication query number and a corresponding authentication number is displayed. Whether the input authentication number and the input authentication query number match with each other is determined. When they match with each other, relevant approval screen or a relevant function is entered. Since a specific authentication number with respect to a specific authentication query number among a plurality of authentication query numbers is used with a general number or character in a combined manner, a password may be kept safe even when exposed and so use convenience is provided. | 07-19-2012 |
20120198545 | System and Method for Providing Digital Content - A method of electronically displaying glyphs. The method includes receiving a glyph spacing, moving a first glyph toward a second glyph along an axis, identifying an intersection of a first axis coordinate of the first glyph with a second axis coordinate of the second glyph, and moving at least one of the glyphs along the axis to separate the first and second axis coordinates of the respective first and second glyphs by the glyph spacing. | 08-02-2012 |
20120198546 | APPARATUS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ENTERING SECURE PASSWORDS - Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application. | 08-02-2012 |
20120204254 | METHOD AND APPARATUS FOR MANAGING SECURITY STATE TRANSITIONS - A method and apparatus for managing security state transitions within a device is provided herein. During operation a security token will indicate whether or not a device is operating in a secured or unsecured state. The security token controls whether or not image validation will take place and if access to security critical resources is allowed. When a switch to a non secure state is made, the security token will be eliminated and blocked from recreation in the non-secure state, thus preventing non-secure code from spoofing a secure state indication. In the non-secure state, image validation is bypassed and the non-secure code is allowed to execute. Once a switch back to a secure state takes place, the secure token is recreated and all images on the device are analyzed to determine if they are approved. | 08-09-2012 |
20120204255 | MOBILE PLATFORM SECURITY APPARATUS AND METHOD - A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third authentication key for each function called by an application program. The apparatus may store the first authentication key and an identifier for identifying the application program in a first storage unit, the second authentication key and the identifier in a secret domain of a second storage unit, and register the third authentication key and the identifier as a function parameter in the application program. Subsequently, if the function is called by the application program, the apparatus may determine values for the first authentication key, the second authentication key, and the third authentication key corresponding to the called function, and may perform authentication processing using the three authentication key values. | 08-09-2012 |
20120204256 | Method for Inputting Usernames and Passwords to Access or Use Different Assets - A method for imputing different usernames and passwords using an input device with a display to use different protected assets that requires the inputting of a preselected username into a username enter box and the inputting of a preselected password into a password entry box immediately prior to use. The method includes the steps of designating two or more username keys on said input device, each said username key being assigned with a unique letter or number located on said input device and to a unique username made of a plurality of alpha-number characters, designating two or more password keys on the input device each being assigned with a letter or number located on said input device and to a unique password made of a plurality of alpha-number characters. Next the protected asset is then accessed and the username key and keyword key assigned to the asset is imputed. | 08-09-2012 |
20120216277 | USER PROFILE AND USAGE PATTERN BASED USER IDENTIFICATION PREDICTION - Embodiments of the present invention provide method, system and computer program product for user profile and usage pattern based user ID prediction. In accordance with an embodiment of the invention, a user can request a user ID to access a portion of a computing system. One or more characteristics of the user, such as a role or location can be determined and correlated to one or more different additional user ID options. In this regard, the additional user ID options can be a suggested alternative user ID for use by the user commensurate with the role or location of the user, or with past patterns of other users considered similar to the user based upon the characteristics of the user. | 08-23-2012 |
20120272312 | UPPER-ORDER COMPUTER, LOWER-ORDER COMPUTER, MONITORING SYSTEM AND MONITORING METHOD - The present disclosure discloses an upper-order computer, a lower-order computer, a monitoring system and a monitoring method, so as to eliminate the disadvantages of low standardization level and small scale in manually setting and adjusting performance parameters. The upper-order computer includes a central control module and an information interacting module, the information interacting module including a human-computer interacting unit, and the central control module including a processing unit, a display control unit and a parameter configuring unit, wherein the processing unit is adapted for controlling a lower-order computer by sending control commands; the display control unit is adapted for processing effective operating data acquired from the lower-order computer, and is adapted for instructing the human-computer interacting unit to perform presenting; and the parameter configuring unit is adapted for configuring parameters of the lower-order computer by sending parameter configuring commands. It can be seen that the upper-order computer is capable of presenting the processed effective operating data and configuring parameters. Compared with directly setting and adjusting the controller by human, the technical solution of the present disclosure has the advantages of high standardization level and large scale. | 10-25-2012 |
20120311698 | Methods and Systems for Using Derived User Accounts - Methods, systems and articles of manufacture consistent with features of the present invention allow the generation and use of derived user accounts, or DUA, in a computer system comprising user accounts. In particular, derivation rules define how a DUA is linked to or created based on an existing original user account, or OUA. Derivation transformations may also update the state of a DUA based on its corresponding OUA or give feedback from the state of a DUA to the state of its corresponding OUA. | 12-06-2012 |
20130007873 | SYSTEMS AND METHODS FOR POWER-ON USER AUTHENTICATION - Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security controller of a computing device prior to supplying power to a primary processor of the computing device, comparing the authentication input to an authentication code using the security controller, and supplying power to the primary processor in response to the authentication input matching the authentication code. | 01-03-2013 |
20130042318 | Authentication System and Method Using Arrays - The present invention relates to a user authentication system and in particular to a method and system in which the user has to apply a transformation which can be an ArrayCard consists of transparent and/or opaque cells of Physical (static/electronic) or Virtual form or it can be a form of secret remembered which needs to be applied on an array of cells to arrive at a unique One-Time-SecretCode for each authentication request along with a sequence of cells/positions (pattern) in an array as a secret pattern. First, user undergoes registration phase to get authenticated to access the application. While registering user applies a transformation on the array of cells displayed on user terminal and registers a pattern by selecting the corresponding symbols from the resultant array. Once user gets registered, then he can access the application by authenticating himself to the system. At the authentication phase, user has to apply the transformation on the array of cells displayed and enter the symbols from the resultant array as One-Time-SecretCode by recollecting his own secret pattern. This user entered One-Time-SecretCode will be checked by the system and if found genuine, access will be granted or else access will be denied. | 02-14-2013 |
20130055379 | SYSTEM, DEVICE AND METHOD FOR AUTHENTICATION - A computing device and computing device implemented method for setting a security level of the computing device. The method may comprise the computing device presenting a challenge to a user of the computing device. The challenge requiring the user to register a password with the computing device. The computing device may receive the password through a user input interface of the computing device in response to the challenge. The computing device may process the received password to calculate a password strength value and evaluate the password strength value to assign the security level. In an aspect, the security level may assign a higher security level when the password strength value is relatively high. In an aspect, the security level may allow for an expanded range of user selectable security options when the password strength value is relatively high. | 02-28-2013 |
20130055380 | Method for Generating and Detecting Auditable Passwords - A method for creating a password on an electronic computing device is disclosed. On the electronic computing device, a first password is obtained. The first password comprises a string of one or more characters. A first character is appended to the first password to form a second password. A hash function is applied to the second password to generate a first hashed password. The first hashed password comprises a first bit string. A determination is made as to whether the first hashed password includes a predefined sequence of bits. When it is determined that the first hashed password includes the predefined sequence of bits, the second password is designated as an auditable password. | 02-28-2013 |
20130055381 | CREATION OF RHYTHMIC PASSWORD AND AUTHENTICATION BASED ON RHYTHMIC PASSWORD - A method and system for utilizing the biometric factors reflected in the typing as a kind of physiological password, to create a rhythmic password specific to the user, and to authenticate based on the rhythmic password. The method includes providing an original training text to a user, receiving an input training text provided by the user according to the original training text, extracting rhythmic characteristic values between adjacent text units of the input training text, and generating a rhythmic password of the user based on the extracted rhythmic characteristic values between adjacent text units. The invention utilizes the rhythm of a user inputting text can bring multiple advantages, including enhanced security of the password, and saving the user's cost of memorizing the password. | 02-28-2013 |
20130061316 | Capability Access Management for Processes - Capability access management techniques for processes are described. In one or more implementations, a token is formed having one or more security identifiers that reference capabilities described in a manifest for the executable code responsive to an input received to initiate execution of executable code installed on the computing device. The one or more processes formed through execution of the executable code on the computing device are associated with the token, the token usable to manage access of the one or more processes to the capabilities of the computing device. | 03-07-2013 |
20130061317 | SYSTEM AND METHOD FOR ACCESS CONTROL IN A PORTABLE ELECTRONIC DEVICE - A method of access control in an electronic device includes monitoring for input at the electronic device, for each input determined to be one of a plurality of predefined gestures including gestures from a touch-sensitive input device or from a movement sensor, mapping the input to a respective Unicode character and adding the respective Unicode character to a passcode to provide an entered passcode, comparing the entered passcode to a stored passcode, and changing an access state at the electronic device if the entered passcode matches the stored passcode. | 03-07-2013 |
20130074179 | SINGLE SIGN-ON FOR REMOTE DESKTOPS - A mechanism is provided for automatically logging into a cloud based system that does not accept token log-on credentials generated by a single sign-on service. In an embodiment, a one-time password is automatically generated and persisted. The generated password is used to log in automatically to a cloud based system that does not accept tokens generated by the web-ID providers and for connecting to other services. Examples of such systems may include Windows, Linux, and iOS. | 03-21-2013 |
20130074180 | USER CERTIFICATION IN A STRUCTURE DESIGN, ANALYSIS, AND IMPLEMENTATION SYSTEM - A computer-implemented subsystem and method is disclosed for receiving user qualification data, comparing that data to certification criteria, and providing user certification according thereto, in the context of a system for designing a structure. A variety of users may be certified, including architects, designers, component and service providers, permitting authorities, builders, financers, future tenants, etc. A wide variety of certifications may be provided including by trade, by attributes of the structure, by intended use of the design system, etc. Certification may be based on general experience, references, time spent with the design system, training completed, examination passed, other certifications, etc. Certification may be stand-alone or may be part of an ongoing continuing education process. The design system may limit actions a user may perform on a design based on certification and certification level. Certified users may be connected with clients and other opportunities through the design system or otherwise. | 03-21-2013 |
20130086672 | SECURITY METHOD OF A PORTABLE DEVICE - An application program of the portable device receives a command of an owner when the portable device is powered on. The application program notifies a basic input/output system to set a protection variable, and notifies the owner to set a password in a setup menu of the basic input/output system after the application program receives the command of the owner. A keyboard controller turns off the portable device to enable the protection variable after the basic input/output system sets the protection variable and the setup menu of the basic input/output system stores the password. After the protection variable is enabled, whenever the portable device is powered on, the basic input/output system checks a password inputted to the portable device at least once and the basic input/output system executes a corresponding operation according to a check result. | 04-04-2013 |
20130097697 | Security Primitives Employing Hard Artificial Intelligence Problems - A security module generates a random image having a plurality of password-element indicators therein. The random image is provided to a user. The user selects portions of the random image. The security module determines whether the selected portions of the random image correspond to a password for the user. The security module grants access if the selected portions of the random image correspond to the user's password. However, if the selected portions of the random image do not correspond to the user's password, the security module may generate another random image having a plurality of password-element indicators therein, wherein each of the random images are computationally de-correlated. | 04-18-2013 |
20130133062 | System and Method to Capture and Manage Input Values for Automatic Form Fill - A system for automatically completing fields in online forms, such as login forms and new user registration forms, which employs a Master Cookie File containing sets of records associated with the user, his or her accounts or web sites, and registered values associated with form tags (e.g. username, password, address, email, telephone, etc.). When the user encounters another form, the MCF is automatically searched for matching values and form tags, primarily from the same account or web site, or alternatively from other accounts or sites. A flowing pop-up menu is displayed nearby the form fields from which the user can select values to automatically complete the form. Automatic account information updating, value expiration management, mapping of favorite values, and sharing of values are optional, enhanced functions of the invention. | 05-23-2013 |
20130167223 | METHODS AND APPARATUS FOR SECURING A SOFTWARE APPLICATION ON A MOBILE DEVICE - A method of securing a software application on a mobile device is described. The method includes configuring the mobile device with a management server to allow the mobile device to communicate wirelessly over a wireless network. A listing of applications is transmitted to the management server over the wireless network. The management server generates user credentials data to associate at least one user with an authorization to access at least one application residing on the mobile device. The management server transmits the user credentials data to the mobile device over the wireless network. The mobile device accesses the user credentials data when a user attempts to access the software application on the mobile device. The user is permitted to execute the software application when the user credentials data indicates that the user is authorized to access the software application. | 06-27-2013 |
20130167224 | LOCK FUNCTION HANDLING FOR INFORMATION PROCESSING DEVICES - Embodiments relate to a method, program product and an information processing device for handling lock functions. The device includes a lock function for restricting user operations and a lock setting unit responsive to the lock function for transitioning the information processing device to a locked state after a period of inactivity. It also includes a lock releasing unit responsive to the lock setting unit for releasing the locked state in response to the input of a predetermined first password and a changing unit responsive to the lock releasing unit for changing the number of characters to be inputted in the first password to release the locked state. | 06-27-2013 |
20130174249 | SECURE LOCK FUNCTION FOR AN ENDPOINT - Disclosed are apparatus and methodology for providing secure control over stored metrology parameters. A random number key is generated and associated with identifiable information such as a serial number associated with a device. The random number and identification information are stored in a database separate and remote from the device. Alteration of the stored metrology parameters are permitted only upon use of the random number as a key to unlock the device. | 07-04-2013 |
20130174250 | ELECTRONIC DEVICE AND METHOD FOR RESTRICTING ACCESS TO THE ELECTRONIC DEVICE UTILIZING BIOS PASSWORD - A method for restricting access to an electronic device using basic input output system (BIOS) password comprises: generating a first window on a display to receive a first user input in response to a password pre-setting input via an input module; formatting the first user input into American Standard Code for Information Interchange (ASCII); and writing the ASCII into a BIOS chip as the preset password. The electronic device is also provided. | 07-04-2013 |
20130179965 | Information Processing Device and Method for Switching Password Input Mode - The present invention discloses an information processing device and the switching method for the password input mode thereof. The information processing device includes a usage scene monitoring unit configured to monitor the usage scene or the usage environment of the information processing device and a password input switching unit, configured to judge the usage scene or the usage environment of the information processing device | 07-11-2013 |
20130185788 | TRAVERSAL OF A SOFT BAR TO UNLOCK AN APPLICATION - Illustrated is a system and method to receiving input at a soft bar, the input received at a middle position on the soft bar equal distance from a first position and a second position on the soft bar. The system and method also including a traversing of the soft bar from the middle position to one of the first or second position, using the input, a plurality of times to generate a candidate password, each traversal to generate a position value that is part of the candidate password. Further, the system and method to include unlocking a Graphical User Interface (GUI) for use, the unlocking to occur where the candidate password is equivalent to a stored password. | 07-18-2013 |
20130185789 | METHOD AND APPARATUS FOR PROTECTING A PASSWORD OF A COMPUTER HAVING A NON-VOLATILE MEMORY - A method for protecting a password of a computer having a non-volatile memory is disclosed. A password is stored in a non-volatile memory of a computer. The computer is then transitioned to a power saving state. In response to a detection of an unauthorized access to the non-volatile memory during the power saving state transition, a password input is requested from a user. The computer returns to a power-on state from the power saving state when there is a success in authentication of the input password. | 07-18-2013 |
20130191908 | METHODS, DEVICES, AND SYSTEMS FOR UNOBTRUSIVE MOBILE DEVICE USER RECOGNITION - The present invention discloses methods, devices, and systems for unobtrusively recognizing a user of a mobile device. Methods including the steps of: unobtrusively collecting motion data from the mobile device during normal device usage by monitoring standard authorized-user interaction with the device, without any form of challenge or device-specified action; demarcating the motion data into user motion-sequences based on changes in a motion-state or an elapsed time-period without an occurrence of the changes, wherein the motion-state refers to a placement and speed of the mobile device at a point in time; calculating user motion-characteristics from the user motion-sequences; and generating a motion-repertoire from the user motion-characteristics, whereby the motion-repertoire enables unobtrusive recognition of the user. Preferably, the method further includes the step of: detecting unidentified motion-characteristics that are not associated with the motion-repertoire, thereby enabling unobtrusive recognition of unidentified usage. | 07-25-2013 |
20130219489 | SYSTEM AND METHOD FOR STORING A PASSWORD RECOVERY SECRET - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for storing a password recovery secret on a peripheral such as a power adapter by receiving a password recovery secret at the power adapter via an interface with the computing device, and storing the password recovery secret on a memory in the power adapter. The password recovery secret can be recovered by requesting the password recovery secret from the power adapter, wherein the password recovery secret is associated with a computing device, receiving the password recovery secret from the memory of the power adapter, and recovering a password based on the password recovery secret. The power adapter can include an electrical source interface, an electronic device interface, an intermediate module to adapt electricity between the interfaces, a memory, and a memory interface through which a password recovery secret is received for storage in the memory. | 08-22-2013 |
20130227676 | ACCESS REQUEST AUTHENTICATION AND AUTHORIZATION INFORMATION GENERATION - An access request authentication method, an authorization information generation method, an access request authentication system, and a hardware device. The access request authentication method includes: obtaining the current clock information; receiving a first access request, where the first access request includes a first input code; and determining whether to authorize the first access request based on the current clock information and the first input code. | 08-29-2013 |
20130239203 | INFORMATION RECORDING DEVICE, RECORDING MEDIUM, AND INFORMATION RECORDING SYSTEM - An information recording system includes a recording medium capable of limiting a function by password and an information recording device for controlling the recording medium. The recording medium stores an input password, counts updating event (s) of a password, stores the update count of the password, outputs information stored in the password related information storage according to a READ request issued from the information recording device, compares a input password with a password stored in the password register, limits a predetermined function of the recording medium according to the comparison result from the password comparator. The information recording device stores a password and a password identification ID which is associated with the update count of the password, selects a password with reference to the update count of the password and the password identification ID and outputs the selected password into the recording medium to compare the passwords. | 09-12-2013 |
20130239204 | SINGLE SIGN-ON FOR REMOTE DESKTOPS - A mechanism is provided for automatically logging into a cloud based system that does not accept token log-on credentials generated by a single sign-on service. In an embodiment, a one-time password is automatically generated and persisted. The generated password is used to log in automatically to a cloud based system that does not accept tokens generated by the web-ID providers and for connecting to other services. Examples of such systems may include Windows, Linux, and iOS. | 09-12-2013 |
20130247173 | SYSTEM AND METHODS FOR SECURE ENTRY OF A PERSONAL IDENTIFICATION NUMBER (PIN) - Systems and methods for credential character selection are provided. The system includes one or more sensors configured to detect a character selection and generate a character selection signal, and detect a character selection completion and generate a character selection completion signal. The system also includes one or more processors coupled to the one or more sensors, the one or more processors configured to receive the character selection signal and the character selection completion signal, and generate an output signal based on the received character selection signal that includes components of a credential. The system also includes a network interface component configured to transmit the output signal. The credential characters may be components of a PIN or password. Moreover, the credential character selections may be made on one device, but displayed on a separate coupled device. The character selections may be a selection of a character or a modification of character. | 09-19-2013 |
20130263250 | AUTOMATED PASSWORD MANAGEMENT - An embodiment includes an automatic policy managed password management system. One embodiment manages changing the password (with little to no user interaction) every set number of days. Also, password changes can be made within a set amount of time from the password being viewed by a user. Further, an embodiment includes a web service that contains an “insert record” method to insert a password management record into a managed machine and/or database with no “pre-work” required to use the web service. For example, no record needs to be created on a database and/or managed machines in advance of deploying passwords via the web service. The web service can be pushed to various machines and when the web service starts up, it may insert its own record into a database or managed client. This allows for scalability. Other embodiments are described herein. | 10-03-2013 |
20130276099 | PASS-PATTERN AUTHENTICATION FOR COMPUTER-BASED SECURITY - Implementing security access includes mapping input elements of an input device to a coordinate system. Each of the input elements is assigned to a point on the coordinate system that is defined by respective coordinate values. The security access also includes receiving a number of inputs via corresponding input elements. An input element assigned to a first input of the number of inputs is denoted as a starting point for a sequence. Beginning with an input in the sequence that immediately follows the first input in the sequence, the security access further includes identifying a directional orientation of each of the input elements as compared to an input element immediately preceding the input element in the sequence, creating a directional pattern sequence from the directional orientation identified for each of the input elements, and providing access to an information source using the directional pattern sequence as an authentication mechanism. | 10-17-2013 |
20130283372 | MOBILE INFORMATION TERMINAL, GRIPPING-FEATURE LEARNING METHOD AND GRIPPING-FEATURE AUTHENTICATION METHOD - A mobile information terminal is provided that can obstruct operations by a third party without obstructing operations by an authorized user when shaking or tilting occurs. The mobile information terminal includes: a gripping-feature sample acquisition part that acquires gripping-feature samples; an acceleration sensor that measures an acceleration; a switch that switches the mobile information terminal between a learning state and an authentication state; a template learning part that learns a user authentication template; a tilt counter that adds a tilt score when an acceleration exceeds a predetermined value, and resets the tilt score to 0 when a result of user authentication indicates an authorized user; a user authentication part that performs user authentication; a score adder/subtractor that adds/subtracts a score when a result of user authentication performed by the user authentication part indicates an unauthorized user; a threshold slider that calculates a revised threshold; a locking determination part that determines that the user authentication fails when the score changes across the revised threshold; and a locking part that locks some or all functions of the mobile information terminal when the user authentication fails. | 10-24-2013 |
20130291092 | Security Method and Apparatus Having Digital and Analog Components - A method and apparatus for creating and implementing a security protocol. The security protocol preferably includes a dichotomous, or two-part, code. The first part includes a digital component such as an alphanumeric sequence while the second part includes an analog component such as that encountered in any physical attribute. The analog component may also be modeled as a number of different information prototypes, such as a span of time or a musical tone. The resultant combination may be embodied, for example, by a dichotomous password that is used to gain clearance to secure assets and features the ability to “profile” the user requesting secure access in real-time. The password may include a string of characters in which part of the password constitutes entry of each character over varied intervals of time. | 10-31-2013 |
20130298223 | METHODS AND COMPUTING DEVICES FOR PASSWORD VERIFICATION - A method for password verification comprises a first verification step for verifying a password that is input at least one time with a first preset password; and a second verification step for verifying the password that is input in another round with a second preset password when the password input in the first verification step is determined to be incorrect. The number of digits of the second preset password is larger than that of the first preset password. | 11-07-2013 |
20130312086 | IDENTITY VERIFICATION IN VIRTUAL WORLDS USING ENCODED DATA - An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted. | 11-21-2013 |
20130318596 | PASSWORD MANAGEMENT SYSTEM AND METHOD FOR ELECTRONIC DEVICE - A computerized method manages passwords to unlock an electronic device from a standby mode by taking changed GPS coordinates of a location of the electronic device and utilizing the changed coordinates in preset formulas to establish and require a new password in substitution for a current password, to allow unlocking of the electronic device. | 11-28-2013 |
20130340071 | METHODS AND SYSTEMS FOR PROVIDING BIDIRECTIONAL AUTHENTICATION - Methods and systems for providing access to a secure computing device are disclosed. A security device is used to generate a one-time password, a sequence of symbologies, and location information. The security device transmits the password, sequence and location information to the secure computing device for storage and displays the password and sequence to a user. A user device provides a password to the secure computing device in order to obtain access. The secure computing device compares the password with the stored one-time password to verify the user of the user device and sends the sequence to the user device in response. The user or user device verifies the sequence of symbologies to confirm the secure access. The location information may be used to detect fraudulent accesses to the user account. | 12-19-2013 |
20130340072 | PATTERN PASSWORD TRAJECTORY CONFIGURATION SYSTEM AND METHOD USING THE SAME - A pattern password trajectory configuration system used in an electronic device with a graphics input interface and a method using the same are provided. The disclosed pattern password trajectory configuration system includes a central processing module, a pattern defining module electronically connected the central processing module for defining the graphics input interface into a central block and multiple blocks neighboring the central block and assigning different data codes to the different blocks neighboring the central block, a sliding direction defining module electronically connected to the central processing module for assigning different prime numbers to define different sliding directions moving along the blocks neighboring the central block, and a touch sequence defining module electronically connected to the central processing module for counting and recording touch sequences of sliding among the blocks neighboring the central block. | 12-19-2013 |
20140026211 | STRONG PASSWORD ENTRY - A processor executing a password manager randomly selects a first requirement and a second requirement for creating a password from a set of requirements, wherein the second requirement is selected independently of the first requirement. The processor provides the first requirement for creating the password, receives characters for the password, determines whether the characters satisfy the first requirement, and provides information that indicates whether the characters satisfy the first requirement. Responsive to the characters satisfying the first requirement, the processor provides the second requirement for creating the password. | 01-23-2014 |
20140033299 | Protecting data on a mobile device - A password protection application is executed on a mobile device and provides an interface by which an authorized user can define and configure a “data protection profile” for the device. This profile defines at least one security event (criteria or condition) associated with the device, and at least one protection action that should occur to protect data on the device upon the triggering of the event. Once defined in a profile, the application monitors for the occurrence of the security event. Upon the occurrence of the specified event, the protection action is enforced on the device to protect the data. | 01-30-2014 |
20140041018 | TOKENIZED DATA SECURITY - Provided are devices, methods, systems, computer readable storage media and other means for tokenizing data. In some examples, credit card numbers are tokenized using a pre-generated token map and absent the use of a networked database that stores a relatively large quantity of credit card numbers in a central location. The token map may be generated by a token map generator such that the token map can be used by a tokenizer to replace a portion of an account number with a token, and by a detokenizer to replace the token with the original portion of the account number. A pre-parser and parser may also be used to locate an account number and/or token in a message received over a network. | 02-06-2014 |
20140059671 | Device identification for externalizing password from device coupled with user control of external password service - Information and data stored by a mobile device is protected by comprising applying password-protection to the locally-stored information without persistently storing the corresponding password locally. Rather, the corresponding password is stored by a remote password server. In response to a trigger event on the mobile device, such as an unlocking action by the user, a request is sent by the mobile device to the password server to retrieve the corresponding server, and the corresponding password is returned to the mobile device. The mobile device can then use the password to access the protected information. If the user determines that the mobile device is lost, stolen, or out of the user's physical control, the user may access the password server and disable the sending of the password to the mobile device, thereby thwarting attempts to access the protected data on the mobile device. | 02-27-2014 |
20140059672 | METHOD FOR PRODUCING DYNAMIC DATA STRUCTURES FOR AUTHENTICATION AND/OR PASSWORD IDENTIFICATION - A method for generating a changing authentication input or password for a user is provided for accessing a computing device such as a smartphone or computer. Using objects displayed in sequential positions on a graphic display, and input strings of text or alphanumeric characters the user has related to each object, a password can be generated by placing the input strings in an order the same as the sequence. The password can be varied easily for each access attempt by changing the objects displayed and/or the sequence. | 02-27-2014 |
20140068754 | PASSWORD GENERATION AND RECALL - The invention provides the ability to produce long, complex passwords from simple, easy to recall, pictorial selections. The invention features a picture based interface unit, linked to a series of individual process modules. Selecting images contained in the image selection module generates a reference pointer corresponding to coordinates in the reference pointer of the control module which thereby generates a rotor sequence that is passed to the password generator module containing ASCII characters groups. The character groups are processed according to the rotor sequence contents to produce a password that is displayed in a display module for editing and/or use. | 03-06-2014 |
20140075547 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND COMPUTER READABLE MEDIUM - There is provided an information processing apparatus including: a display unit that displays an input interface which includes a plurality of identification information figures corresponding to identification information used to identify an individual, and a reference figure functioning as a reference for arrangement of the identification information figures; a display control unit that hides the identification information figures, which are targets of an operation performed by a user, or changes display positions of the identification information figures with regard to the reference figure, in accordance with the operation performed by the user on the input interface; and an identification information specifying unit that specifies the identification information which is used for a certification process from among a plurality of pieces of identification information in accordance with the operation performed by the user on the input interface. | 03-13-2014 |
20140101753 | Risk Adaptive Information Flow Based Access Control - Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, request/response or free market mechanism. As requested from subjects within the organization for access to objects, i.e. information and data, are received, the amount of risk or risk level associated with each requested is quantified. Risk quantification can be accomplished using, for example, fuzzy multi-level security. The quantified risk associated with the access request in combination with the identity of the object and the identity of the subject are used to determine whether or not the request should be granted, denied or granted with appropriated mitigation measures. | 04-10-2014 |
20140123274 | Password Setting and Verification - Methods and systems for setting and verifying a password in a password protected device. Setting a password includes receiving a configuration password entered via a keyboard, wherein the configuration password includes position information of at least one key on the keyboard, and symbol information of at least one key on the keyboard, and storing the configuration password. Verifying a password includes receiving an entered password on the keyboard, obtaining a stored configuration password, wherein the configuration password includes position information of at least one key on the keyboard and symbol information of at least one key on the keyboard, and verifying the entered password based on the configuration password. The keyboard may be a randomly arranged keyboard. Even if nearby persons can see the selection of symbols displayed on the keys for a password, they cannot determine the real content of the password, and thus cannot access the password-protected device. | 05-01-2014 |
20140150086 | COMPUTER-IMPLEMENTED METHOD FOR REPLACING A DATA STRING - A computer-implemented method for replacing a security-relevant unencrypted data string from a data record by a token in a tokenisation device. The method is structured in such a way that it works more efficiently than a replacement table with randomly generated tokens and is more secure than the generation of tokens by exclusive application of a mathematical function to the unencrypted data string. | 05-29-2014 |
20140150087 | VOICE KEY AND METHOD FOR PROTECTING SECURITY OF COMPUTING DEVICE USING THE VOICE KEY - A voice key includes a voice sensor, a microprocessor chip, a storage device, a port, a record button, and an enter button. When the voice key is connected to a computing device and the record button is pressed, the voice sensor is triggered to record a voice signal input by a user. The microprocessor chip converts the voice signal into a password, stores the password in the storage device, and sends the password to the computing device to lock the computing device. When the voice key is connected to the computing device again and the enter button is pressed, the microprocessor chip retrieves the password from the storage device and sends the password to the computing device. The computing device is unlocked in response to determining that the received password matches the password stored in the computing device. | 05-29-2014 |
20140150088 | TEMPERATURE KEY AND METHOD FOR PROTECTING SECURITY OF COMPUTING DEVICE USING THE TEMPERATURE KEY - A temperature key includes a temperature sensor, a microprocessor chip, a storage device, a port, a record button and an enter button. When the temperature key is connected to a computing device and the record button is pressed, the temperature sensor is triggered to record a temperature signal input by a user. The microprocessor chip converts the temperature signal into a password, stores the password in the storage device, and sends the password to the computing device to lock the computing device. When the temperature key is connected to the computing device again and the enter button is pressed, the microprocessor chip retrieves the password from the storage device and sends the password to the computing device. The computing device is unlocked in response to determining that the received password matches the password stored in the computing device. | 05-29-2014 |
20140150089 | PRESSURE KEY AND METHOD FOR PROTECTING SECURITY OF COMPUTING DEVICE USING THE PRESSURE KEY - A pressure key includes a pressure sensor, a microprocessor chip, a storage device, a port, a record button and an enter button. When the pressure key is connected to a computing device and the record button is pressed, the pressure sensor is triggered to record a pressure signal input by a user. The microprocessor chip converts the pressure signal into a password, stores the password into the storage device, and sends the password to the computing device to lock the computing device. When the pressure key is connected to the computing device again and the enter button is pressed, the microprocessor chip retrieves the password from the storage device and sends the password to the computing device. The computing device is unlocked if the received password matches the password stored in the computing device. | 05-29-2014 |
20140173717 | SYSTEM AND METHOD OF SECURE DATA ENTRY - A computational device having a user interface is disclosed, the user interface enables a user to securely enter data into the computational device. In particular, the user interface may include a user input portion and a user output portion. The user input portion may be partitioned into a number of input zones, each having a data value associated therewith that when engaged by a user causes the data value associated with the engaged input zone to be provided as input to the computational device. | 06-19-2014 |
20140181955 | TWO FACTOR AUTHENTICATION USING NEAR FIELD COMMUNICATIONS - There is provided a method and apparatus for communications using short range communications such as Near Field Communications (NFC). A mobile device comprising an NFC subsystem provides a dynamic credential for use to login to a network requiring two factor authentication. A terminal used for logging in to the network is associated with an NFC reader, and bringing the NFC device in proximity to the NFC reader provides the terminal with the dynamic credential required for two factor authentication. | 06-26-2014 |
20140181956 | METHODS, SYSTEMS, AND MEDIA FOR MEASURING QUALITY OF GESTURE-BASED PASSWORDS - Methods, systems, and media for measuring gesture-based password quality are provided, the methods comprising: receiving a first image; receiving a proposed password; identifying points of interest in the image each associated with an attribute; receiving a gesture selection function sequence, with a plurality of gesture selection functions each associated with a gesture type and a point of interest attribute; determining that a subset of points of interest in the image have attributes corresponding to attributes associated of a gesture selection function sequence; generating a possible password based on the gesture selection function sequence; determining and presenting a relative strength of the proposed password based on whether the proposed password matches the possible password. | 06-26-2014 |
20140189853 | CONTENT PROTECTION KEY MANAGEMENT - This disclosure is directed to content protection key management. In general, devices may include secure processing resources configured to derive content keys (e.g., for use in decrypting secure content) using key ladders. In one embodiment, a device may comprise, for example, at least a secure processing module to derive content keys for use in decrypting secure content. The secure processing module may include, for example, a key ladder storage module and a secure key storage module. The key ladder storage module may be to store at least one key ladder for use in deriving at least one content key. The secure key storage module may be to store the at least one content key derived using the key ladder. | 07-03-2014 |
20140237587 | Managed Biometric Identity - A computing system such as a game console maintains and updates a biometric profile of a user. In one aspect, biometric data of the user is continuously obtained from a sensor such as an infrared and visible light camera, and used to update the biometric profile using a machine learning process. In another aspect, a user is prompted to confirm his or her identify when multiple users are detected at the same time and/or when the user is detected with a confidence level which is below a threshold. A real-time image of the user being identified can be displayed on a user interface with user images associated with one or more accounts. In another aspect, the biometric profile is managed by a shell on the computing system, where the shell makes the biometric profile available to any of a number of applications on the computing system. | 08-21-2014 |
20140259152 | APPARATUS AND METHOD FOR CONFIGURING PASSWORD AND FOR RELEASING LOCK - Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels. | 09-11-2014 |
20140283009 | SYSTEM AND METHOD FOR COMPOSING AN AUTHENTICATION PASSWORD ASSOCIATED WITH AN ELECTRONIC DEVICE - A method for composing an authentication password associated with an electronic device is implemented by a password composing system including a display, a receiving unit, and a processing unit. In the method, the display is configured to display a start point, and a plurality of displayed paths. The receiving unit is configured to detect a set of user-input movements of a contact point at the display. The processing unit is configured to determine whether the user-input movements conform with a predefined valid user-input gesture, store a plurality of codes corresponding to the valid user-input gestures, and to compose the authentication password according to valid ones of the series of the user-input movements. | 09-18-2014 |
20140283010 | Virtual key management and isolation of data deployments in multi-tenant environments - Tenants in a multi-tenant shared deployment are provided their own distinct key spaces over which they control a key management system. In this manner, virtual key management domains are created on a per-tenant (per-customer) basis so that, whenever a particular customer's data is co-tenanted, stored, transmitted or virtualized in the IT infrastructure of the provider's datacenter(s), it is secured using key management materials specific to that customer. This assures that the entirety of a tenant's data remains secure by cryptographically isolating it from other tenants' applications. The virtual key management domains are established using a broadcast encryption (BE) protocol and, in particular, a multiple management key variant scheme of that protocol. The broadcast encryption-based virtual key management system (VKMS) and protocol achieves per-tenant (as well as per-application) secured isolation of data and can be used across any combination of resources in or across all levels of a co-tenanted IT infrastructure. | 09-18-2014 |
20140283011 | APPLICATION LICENSING FOR A CENTRALIZED SYSTEM OF MEDICAL DEVICES - Centralized systems execute one or more applications for monitoring and operating a plurality of network enabled medical devices. An indication to start a selected application at the centralized system or at a network enabled medical device is received at the centralized system/network enabled medical device. The selected application may require a license to operate and, at the time the indication is received, may have a first license available. Instead of using the first license, the centralized system/network enabled medical device may determine to inherit at least a portion of a second license to operate the selected application. The centralized system/network enabled medical device may inherit at least the portion of the second license to form an inherited license, where the inherited license enables features of the selected application. Using the inherited license, the selected application is started with the enabled features. Related apparatus, systems, techniques and articles are also described. | 09-18-2014 |
20140298447 | Method for Enhancing Security of Portable Electronic Device and Related Wireless Charging System - A method for a portable electronic device for enhancing the security of the portable electronic device while charged wirelessly by a power transmission device includes sending a first packet including a security code of the portable electronic device to the power transmission device for starting wireless charging; being charged wirelessly by the power transmission device; and reporting a second packet including the security code to the power transmission device according to a triggering event. | 10-02-2014 |
20140298448 | STORAGE DEVICE, STORAGE SYSTEM, AND AUTHENTICATION METHOD - According to one embodiment, a storage device that has a nonvolatile semiconductor memory includes an authentication information storage unit that previously stores first apparatus authentication information to authenticate an authorized host device and first user authentication information to authenticate an authorized user. The storage device executes apparatus authentication on the basis of second apparatus authentication information received from a newly connected host device and the first apparatus authentication information in the authentication information storage unit and executes an invalidation process of user data stored in the nonvolatile semiconductor memory, when the apparatus authentication is failed. | 10-02-2014 |
20140325640 | SECURE ACCESS-BASED ENUMERATION OF A JUNCTION OR MOUNT POINT ON A CLUSTERED SERVER - Embodiments described herein provide a technique for securely responding to an enumeration request of a data container stored at a location referenced by a junction or mount point within a share served by a storage system. To that end, the technique applies access permissions of the data container at the referenced location instead of permissions that may reside at the junction or mount point. Upon determining that the permissions are insufficient to allow access to the data container, the technique ensures that a descriptor of the junction or mount point is not included in a response to the enumeration request. | 10-30-2014 |
20140337968 | UNLOCKING SCHEMES - An end device may include a camera configured to capture an image of an object, a touch screen configured to receive a touch input and a processor configured to determine to unlock the end device based, at least in part, on a relation between the image of the object and the touch input. | 11-13-2014 |
20140359755 | CONFIGURATOR FOR SECURE FEATURE AND KEY MANAGER - A computing device receives a feature name or key name for an integrated circuit comprising a security manager core and an additional component. At least one of a) the additional component is associated with the key name or b) a feature provided by the additional component is associated with the feature name. The computing device receives a specified number of bits associated with the feature name or the key name, and maps the feature name to a feature address space or the key name to a key interface of the security manager core based at on the specified number of bits. The computing device generates at least one hardware description logic (HDL) module based on the mapping, wherein the at least one HDL module is usable to configure the security manager core for delivery of payloads associated with the feature name or the key name to the additional component. | 12-04-2014 |
20140366126 | BREATH ACTUATION OF ELECTRONIC AND NON-ELECTRONIC DEVICES FOR PREVENTING UNAUTHORIZED ACCESS - A mobile device is presented including an input module for receiving a plurality of breath samples from a user and a breath analysis module for performing a chemical analysis of the plurality of breath samples, the chemical analysis involving identification and selection of a plurality of uncommon molecules and uncommon organic compounds for deriving distinguishing breath characteristics and using such breath information to create an initial chemical breath profile associated with the user. The mobile device further includes a breath authorization module for allowing or preventing access to the mobile device in response to a comparison result derived from comparing at least one subsequently created chemical breath profile with the initial chemical breath profile. | 12-11-2014 |
20140373131 | METHOD FOR CONTROLLING THE ACCESS TO A SPECIFIC TYPE OF SERVICES AND AUTHENTICATION DEVICE FOR CONTROLLING THE ACCESS TO SUCH TYPE OF SERVICES - A method and device for controlling access to a specific type of services among a plurality of type of services proposed by a service supplier. The method includes entering, into an authentication device of the user, a personal identification code specific to the user, the personal identification code being identical for at least two different types of services proposed by the service supplier; and indicating, by said user, said specific type of services for which the access is required, the indication being made in the authentication device. The method further comprises transforming said personal identification code, in a way depending on a cryptographic function specific to said user and to said required specific type of services, the cryptographic function being memorized in the authentication device; transmitting the result of the transformation of said personal identification code to the service supplier; authenticating the user by the service supplier by means of the transmitted result of said transformation, and assigning an access right according to the result of the authentication. The device implements the record. | 12-18-2014 |
20140380463 | PASSWORD SETTING AND VERIFICATION - Methods for setting and verifying a password in a password protected device. Setting a password includes receiving a configuration password entered via a keyboard, wherein the configuration password includes position information of at least one key on the keyboard, and symbol information of at least one key on the keyboard, and storing the configuration password. Verifying a password includes receiving an entered password on the keyboard, obtaining a stored configuration password, wherein the configuration password includes position information of at least one key on the keyboard and symbol information of at least one key on the keyboard, and verifying the entered password based on the configuration password. The keyboard may be a randomly arranged keyboard. Even if nearby persons can see the selection of symbols displayed on the keys for a password, they cannot determine the real content of the password, and thus cannot access the password-protected device. | 12-25-2014 |
20150047016 | IDENTIFICATION TECHNIQUE - A technique for user identification based on a user input. As to one aspect of the technique, a device ( | 02-12-2015 |
20150074795 | ONE-TIME PASSWORD GENERATION APPARATUS AND METHOD USING VIRTUAL INPUT MEANS - One-time password (OTP) generation apparatus and method using virtual input means are provided. Reference information generated by a reference information generation unit is compared with identification information. When the reference information is identical to the identification information, a value corresponding to indication information is generated as an OTP. | 03-12-2015 |
20150106918 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD FOR INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - When user information to be registered for SNMP authentication is input, an information processing apparatus confirms whether or not user information for MFP authentication is already managed for a user to be registered who is indicated by the input user information. In the case where the user information for MFP authentication is not managed for the user to be registered, the information processing apparatus registers the input user information as user information for SNMP authentication. In the case where the user information for MFP authentication is managed for the user, the information processing apparatus registers information specific to SNMP authentication, i.e. information other than an authentication password, out of the input user information. | 04-16-2015 |
20150113633 | ELECTRONIC DEVICE AND AUTHENTICATION METHOD USING PASSWORD THEREOF - An authentication method using a password of an electronic device is provided. The method includes receiving a password. The method also includes determining whether the received password coincides with a password stored in advance. The method further includes determining whether an input condition at the time of password input coincides with a password input condition stored in advance when the received password coincides with the password stored in advance. The method includes executing a function when the input condition at the time of password input coincides with the password input condition stored in advance. | 04-23-2015 |
20150121509 | DISPLAY APPARATUS THAT DISPLAYS ONE-TIME PASSWORD - A display apparatus includes a display panel, a display condition setting unit that defines a specified display point in a specific screen as a display point of a one-time password for a specified user and sets a display condition for the one-time password, and a password display unit that displays, to the specified user, the one-time password at a display point included in the display condition based on the display condition set by the display condition setting unit when the specific screen is displayed in the display panel. | 04-30-2015 |
20150128254 | OFFLINE AUTHENTICATION WITH EMBEDDED AUTHORIZATION ATTRIBUTES - There is provided a method that includes (a) including in a dataset, data indicative of a time, (b) executing a hash function on the dataset to yield a hash value, and (c) employing the hash value as a password for a user to access a device. There is also provided a method that includes (a) including in a dataset, data indicative of a time, (b) executing a hash function on the dataset to yield a hash value, (c) determining that the hash value matches a password from a user, and (d) granting to the user, access to a device. There are also provided systems that perform the methods and storage devices that contain instructions for causing processors to perform the methods. | 05-07-2015 |
20150135307 | Electronic Lock Having Automatic User Slot Assignment for Passcodes - An electronic lock in which new passcodes can be added and/or deleted without specifying the user slot to which the new passcode should be assigned. A circuit in the electronic lock determines whether the new passcode to be added is unique compared to existing passcodes stored in memory. If so, the circuit searches for an available user slot for which no authorized passcodes are associated and associates the new passcode with an available user slot. | 05-14-2015 |
20150143508 | SYSTEMS AND METHODS FOR AUTHENTICATING ACCESS TO AN OPERATING SYSTEM BY A USER BEFORE THE OPERATING SYSTEM IS BOOTED USING A WIRELESS COMMUNICATION TOKEN - Certain embodiments herein relate to authenticating access to an operating system by a user before the operating system is booted. Such authentication may be performed by processing information received from a wireless communication token via Near Field Communication (NFC), in one embodiment. The received information may be processed to determine credentials for accessing the operating system, which if validated, may be sent to a Basic Input Output System (BIOS) which may boot the operating system in response. The BIOS may also perform various other functions if authentication is successful, such as decrypting a hard disk on which an operating system is installed before booting the operating system. According to this configuration, a decryption key may be received from the wireless communication token and subsequently sent to the BIOS to enable the decryption and subsequent booting of the operating system. | 05-21-2015 |
20150143509 | METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR DETERMINING PASSWORD STRENGTH - A method for estimating the strength of a graphicalpassword comprising two or more segments is disclosed. In some embodiments, this advantageous solution is achieved by implementing a multi-step process. In one step, the data processing system applies a first operation on a first segment to produce a transformed segment. In another step, the data processing system performs a comparison operation between the transformed segment and a second segment. In another step, the data processing system performs a penalty operation with respect to the first segment based on an outcome of the comparison operation. The penalty operation includes one or more of (1) calculating a penalty value, wherein the penalty value may be used in calculating a value representing the strength of the graphicalpassword; and (2) disregarding the first or the second segment when calculating the value representing the strength of the graphical password. | 05-21-2015 |
20150294106 | System For Processing Lost Password Using Password Long-Term Memory Of User, and Method For Processing Lost Password - The present invention relates to a system and method for processing a lost password by selectively providing a reset process under the password in the long-term memory of the user. According to the present invention, the system includes a user terminal including: a long-term memory condition registration unit receiving the registration of long-term memory conditions; a long-term condition determination unit determining the long-term memory conditions are satisfied; a user identification unit, after the occurrence of a lost password, authenticating the user through a user identification verification scheme or through a enhanced user identification verification scheme whether or not the password resides in the long-term memory of the user, and a lost state resetting unit cancelling the lost password occurrence state. According to the present invention, provided are an identification verification service or an enhanced identification authentication service whether or not the password resides in the long term memory of user. | 10-15-2015 |
20150294107 | SECURITY-FUNCTION-DESIGN SUPPORT DEVICE, SECURITY-FUNCTION-DESIGN SUPPORT METHOD, AND PROGRAM - A display unit displays a configuration of a system in a display device. An implementation scheme configuration support unit provides a candidate of a security implementation scheme configurable for a component of the system and configures a security implementation scheme selected by a user to a component selected by a user. An associated function element configuration support unit provides a candidate of an associated function element configurable for a component of the system and configures an associated function element selected by a user to a component selected by a user. An evaluation unit determines whether or not the associated function element configured for the component of the system is appropriate based on a condition to determine appropriateness of the configuration of the certain associated function element. An output unit outputs a result of the determination by the associated function element evaluation unit. | 10-15-2015 |
20150294108 | METHOD AND APPARATUS FOR MANAGING AUTHENTICATION - A method of and an apparatus for managing authentication in an electronic apparatus are provided. The method includes obtaining authentication information using an authentication module; pairing the authentication information with an object to which access is controlled; and displaying an image related to the object together with the authentication information. The electronic apparatus includes an authentication module configured to obtain authentication information; a control module configured to pair the authentication information with an object to which access is controlled; and a display module configured to display an image related to the object together with the authentication information. | 10-15-2015 |
20150294109 | Generating or Changing Passwords Using a Degree of Simplicity - A technique for generating passwords. The technique includes displaying objects, enabling a degree of simplicity to be set for a password, and generating a password in accordance with the established degree of simplicity. The technique also includes superimposing and displaying a secondary object icon for at least one secondary object available to a primary object on top of the primary object icon for the primary object, and the superimposing and display entails either superimposing and displaying a display on the superimposed secondary object icon to indicate whether or not the superimposed secondary object is available on the basis of the degree of simplicity, or changing the superimposed secondary object icon so as to differentiate the availability of the superimposed secondary object on the basis of the degree of simplicity. | 10-15-2015 |
20150302190 | METHOD FOR DYNAMICALLY ADJUSTING PROGRAM LOGIN INTERFACE, AND INTERNET TERMINAL - Embodiments of the present disclosure disclose a method for dynamically adjusting a program login interface. The method includes: displaying a preset flash on a program login interface; detecting a user operation within a preset area in the login interface; and updating the displayed flash according to the user operation within the preset area. The embodiments of the present disclosure further disclose a computing terminal. During implementation of the embodiments of the present disclosure, dynamic interaction may be achieved in the program login interface, and more abundant content may be provided. | 10-22-2015 |
20150319339 | DATA COMMUNICATION APPARATUS, CONTROL METHOD THEREFOR, AND STORAGE MEDIUM STORING CONTROL PROGRAM THEREFOR - A data communication apparatus that is capable of improving operability when inputting authentication information. An authentication unit accepts authentication information inputted when a user logs in to the data communication apparatus and authenticates the user based on the accepted authentication information. A designation unit designates a file transmission destination that is inputted by the authenticated user. A transmission unit transmits a file to the transmission destination inputted. A registration unit registers the transmission destination of the file. A control unit prohibits registration of the authentication information at the time of registration of the transmission destination of the file when the accepted authentication information is used for file transmission, and permits registration of the authentication information at the time of registration of the transmission destination of the file when the inputted authentication information is not used for file transmission. | 11-05-2015 |
20150324573 | METHOD AND SYSTEM FOR GENERATING VERIFICATION CODES - Generating verification codes includes selecting at least two verification code generators from a verification code generator set comprising a plurality of verification code generators to compose a current use set, executing each verification code generator in the current use set to obtain corresponding partial verification codes, composing a current verification code from the partial verification codes, outputting the current verification code to a user, receiving a user response that is made in response to the current verification code, and comparing the current verification code and the user response to determine whether the user is verified. | 11-12-2015 |
20150339464 | Restricted accounts on a mobile platform - Systems and techniques are provided for restricted accounts on a mobile platform. A request to create a restricted account may be received. The restricted account may be a user account with a restriction. Credentials for the restricted account may be received. A restriction for the restricted account may be received. The restriction may include an access restriction or a lifetime restriction. An access restriction may prevent an application from accessing the restricted account and a lifetime restriction may limit the lifetime of the restricted account. The restricted account may be stored with the credentials and the restriction. A request may be received for a list of user accounts from an application. The restricted account may be determined to include an access restriction that prevents the application from accessing the restricted account. The list of user accounts may be sent to the application and without an identifier for the restricted account. | 11-26-2015 |
20150339470 | MANAGING COMPROMISED PASSWORDS - A system and computer implemented method for determining compromised passwords is disclosed. The method may include displaying, in a first set of positions, a set of entry keys of a device. The method may include collecting a first set of tracking data including the first set of positions for entry of a first password. The method may also include displaying the set of entry keys of the device in a second set of positions. The method may also include determining a second password based on the second set of positions and entry of the first password. The method may also include determining whether the second password was entered into the device. | 11-26-2015 |
20150347726 | MANIPULATOR AUTHENTICATION OPERATING SYSTEM - A manipulator authentication operating system, wherein the mobile terminal has “authentication holding means” for holding unique authentication-information and “a communication section” that transmit the authentication information to the manipulation section and perform information communication relating to an operation and manipulation between the communication section and manipulation section, and manipulation section has “authentication-information decoding means” that decodes authentication information transmitted by the “authentication-information holding means” of the mobile terminal via the “communication section” and, when the decoded authentication information is consistent with collation information held in advance, transmits a signal indicating the consistency to the mobile terminal; and a manipulation of an object to be manipulated in cooperation with the manipulation section by the mobile terminal when the “authentication-information decoding means” has transmitted a signal indicating the unique authentication information transmitted from the mobile terminal is consistent with the collation information to the mobile terminal. | 12-03-2015 |
20150347728 | Providing a User Access to a Computer System - A method and related electronic apparatus for providing a user access to a computer system, the method comprising: determining at least one object in contact with a surface; generating at least one pulse sequence; actuating the surface based on the at least one pulse sequence; determining an absence of the at least one object from the surface; determining at least one character of a password input based on the at least one pulse sequence. | 12-03-2015 |
20150347733 | EYE-CONTROLLED PASSWORD INPUT APPARATUS, METHOD AND COMPUTER-READABLE RECORDING MEDIUM AND PRODUCT THEREOF - The present invention provides an eye-controlled password input apparatus, which comprises a display device to display a password menu, an image capturing device to capture an user's eye region image, a memory unit to store at least one preset password and a corresponding account number, a control unit to generate the password menu according to the preset password, and an image processing unit. The image processing unit obtains a plurality of reference objects from the eye image so as to recognize the eye movement direction and to confirm password input. After input a character of the password, the display device generates another password selection menu for the user to input another password character until the password input program is completed. | 12-03-2015 |
20150350202 | Processing Method For Piecing Together Fingerprint Based on Mobile Terminal and Mobile Terminal - A processing method for piecing together a fingerprint based on a mobile terminal and a mobile terminal are disclosed. The method includes: acquiring fingerprint information of a user via a fingerprint multiplexing button; comparing the fingerprint information of the user with fingerprint information which is stored in advance; unlocking the mobile terminal if the fingerprint information of the user matches the fingerprint information which is stored in advance; and locking the mobile terminal and prompting the current operating user to re-input fingerprint information to unlock the mobile terminal if the fingerprint information of the current operating user is inconsistent with the fingerprint information which is stored in advance. When the user utilizes the mobile terminal, a fingerprint match is performed. If different, the mobile terminal is locked for increasing the safety of the information. | 12-03-2015 |
20150356288 | PASSWORD INPUT INTERFACE - A trigger instruction is received to set a password input interface. A setting of a term represented by a key is triggered. A selection or input of the term represented by the key on the password input interface is received. A first corresponding relationship between the key and the represented term is established. The password input interface is displayed. An electronic device sets terms, which are commonly used by a user to set a password, in a same password input interface. Thus, when a user password includes different types of terms, the user inputs the password without switching among different input interfaces to ensure that the user input the password conveniently. | 12-10-2015 |
20150363593 | APPARATUSES AND METHODS FOR PASSWORD AUTHENTICATION - A user inputs a password entry at a computer, which processes the entry using a function to obtain a plurality of sub-entries that are sent to a server. Each sub-entry is generated by padding the password entry to obtain a fix-length password entry from which are generated a number of strings in which different combinations of k characters are missing and then passed through a one-way function. The server receives the sub-entries and compares each sub-entry with stored password verifiers for the user to determine if they match. If at least one sub-entry matches a password verifier, the user is authenticated and a notification is sent to the user via the computer. If no sub-entry matches a password verifier, then the user is not authorized. Up to k typing errors can be accepted in the password entry. | 12-17-2015 |
20150365236 | PASSWORD PROCESSING DEVICE - A device to process information is provided. According to an embodiment, a display unit is configured to display computer-generated objects. A processor is configured to receive selection input effective to select a particular computer-generated object from amongst the computer-generated objects. Manipulation input corresponding to detected motions is received. The particular computer-generated object is moved and rotated in its entirety in response to the manipulation input and in accordance with the detected motions. Each of the detected motions has a corresponding time period. A password is generated using the detected motions and the time periods. A user is authenticated by use of the generated password and an identified unrevealed authentication. The authentication of the user includes an indication of an authentication failure when the detected motions are different from an expected input and any of the corresponding time periods are outside of an allowable time range. | 12-17-2015 |
20150371024 | SMART BAND AND BIOMETRIC AUTHENTICATION METHOD THEREOF - Provided are smart band and biometric authentication method thereof. The biometric authentication method of a smart band, comprises generating motion data by measuring motion of a user via a motion sensor; extracting a plurality of feature points based on the generated motion data; and performing biometric authentication of the user based on a distribution state of the extracted feature points. | 12-24-2015 |
20160012217 | MOBILE TERMINAL FOR CAPTURING BIOMETRIC DATA | 01-14-2016 |
20160012218 | VALIDATION OF THE RIGHT TO ACCESS AN OBJECT | 01-14-2016 |
20160026781 | EAR BIOMETRIC CAPTURE, AUTHENTICATION, AND IDENTIFICATION METHOD AND SYSTEM - The current document discloses an ear-biometrics-based authentication and identification system that includes an ear-image-capture subsystem that generates an image of a user's ear, a template-generation subsystem that extracts features from the generated image to generate a template that is stored in an electronic memory, and a template-comparison subsystem that compares the generated template to previously generated and stored templates in order to identifier the user. | 01-28-2016 |
20160028714 | SECURE BIOS ACCESS AND PASSWORD ROTATION - A device may periodically update a BIOS password on a client device. In some implementations, the device may determine a particular password generation algorithm; determine password generation seed values; and generate a first password and one or more second passwords based on the particular password generation algorithm and the password generation seed values. The first password may be a password that should be set for the BIOS. The one or more second passwords may be possible current passwords currently set. The device may individually output the one or more second passwords to the client device to cause the client device to update a password of the BIOS to update to the first password; receive an indication that the BIOS password has been updated to the first password; and output the indication that the BIOS password has been updated to the first password. | 01-28-2016 |
20160034676 | ELECTRONIC SYSTEM, ELECTRONIC DEVICE AND METHOD CAPABLE OF ERASING PASSWORD FROM BASIC INPUT/OUTPUT SYSTEM AUTOMATICALLY - A method capable of erasing a password from a BIOS automatically includes steps of the BIOS determining whether a password erasing flag has been set when an electronic device is booting; the BIOS erasing the password if the password erasing flag has been set; the BIOS displaying a password input window if the password erasing flag has not been set; inputting a comparison data in the password input window; the electronic device transmitting the comparison data to a server; the server comparing the comparison data with a registration data, generating a comparison result, and transmitting the comparison result to the electronic device; the BIOS determining whether the comparison result is correct; the BIOS setting the password erasing flag and rebooting the electronic device if the comparison result is correct; and the BIOS rebooting the electronic device directly if the comparison result is wrong. | 02-04-2016 |
20160042161 | PROVIDING ACCESS CONTROL OF APPLICATIONS ON COMPUTING DEVICE BY ESTABLISHING SCREEN PASSCODES THAT ALLOW ACCESS TO DESIGNATED SCREENS WITH DESIGNATED APPLICATIONS - A method, computing device and computer program product for providing access control of applications on the computing device. The computing device receives a selection of a set of one or more screens from the owner of the mobile device. The computing device further receives a selection of application(s) to be placed in the selected set of screens. The computing device additionally receives a screen passcode to be assigned to the selected set of screens. The computing device then assigns the received screen passcode to the selected set of screens which enables access to the application(s) on the selected set of screens. In this manner, the owner of the computing device can limit other users' access to certain applications on the computing device by segregating the applications on different sets of screens, where each set of screens is assigned a screen passcode which grants access to that set of screens. | 02-11-2016 |
20160063236 | INFORMATION PROCESSING DEVICE, METHOD FOR CONTROLLING INFORMATION PROCESSING DEVICE, PROGRAM, AND INFORMATION STORAGE MEDIUM - Authentication data indicates a plurality of types of operation which a user should perform in a predetermined order via a touch panel and a number of fingers, as to each one of the plurality of types of operation, with which the user should touch the touch panel when performing an operation corresponding to the one of the plurality of types of operation. An authentication processing execution unit executes authentication processing by determining, based on a result of detection by the touch panel, whether or not an operation corresponding to each of the plurality of types of operation has been performed in the predetermined order by touching the touch panel with a number of fingers set for each of the plurality of types of operation. | 03-03-2016 |
20160070904 | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING POSITIONING FUNCTION ACCORDING TO PASSWORD INPUTTED ON USER INTERFACE - An electronic device and positioning control method are provided. Programs in a storage device, executed by at least one processor, cause the at least one processor to display a password inputting interface; recognize an inputted password; determine whether the inputted password matches a preset password stored in the storage device and display a positioning setting interface for enablement or disablement of a positioning device if the inputted password matches the preset password. The method activates the positioning device if an option for enabling the positioning device on the positioning setting interface is selected; and then obtains current positional information of the electronic device if the positioning device is activated. | 03-10-2016 |
20160078209 | METHOD AND APPARATUS FOR MEASURING BODY BALANCE OF WEARABLE DEVICE - A wearable device includes a communication unit that wirelessly communicates with a first external device; a motion sensor that senses the user's motion; and a control unit. The wearable device collects a first motion data generated by the user's motion and transmits the first motion data to the first external device, receives a first security level data and a second security level data from the first external device, and receives only the first security level data from the first external device when the wearable device is converted into a non-wearing state from a wearing state. | 03-17-2016 |
20160078210 | USER-AUTHENTICATION GESTURES - This document relates to user-authentication gestures. One example can capture multiple biometric features when a user-authentication gesture is performed as a device authentication attempt. The example can compare values of the multiple biometric features to previous values stored for the user. The example can further unlock the computing device in an instance where the values of the multiple biometric features satisfy a similarity threshold relative to the previous values. | 03-17-2016 |
20160078217 | Computer Implemented Systems and Methods for Generating and Recovering an Authorization Code - A computer implemented system and method for generating and recovering an authorization code. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system also has provisions to manage forgotten authorization code. This is done by fragmenting the base-sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question answer and with a secret key provided by the user. | 03-17-2016 |
20160085957 | AUTOMATED PASSWORD AUTHENTICATION - A system connected to an existing computer includes a unit for monitoring the screen and provides input, a storage unit that stores data that pairs screen buffer regions with authentication details, wherein the system learns new pairs via user training and presents stored authentication details when the screen buffer regions match a related stored region which is paired with a region of the screen, and a unit that determines which of stored passwords need to be presented to the system by a pattern matching of regions of screen pixels. | 03-24-2016 |
20160092670 | Answer Question User Authentication Process - A process of authenticating a person into a computer system as an authorized user by comparing the person's answers to questions that were defined by the authorized user during computer system account creation. The process is analogous to a property security system in that they both use concepts of Gate, Door, Safe, Frisk, and Key. Gate question prevents imposters from entering the computer system. Door question prevents imposters from viewing data should they get past the Gate. Safe question prevents imposters from updating data and viewing confidential data should they get past the Door. Frisk question catches imposters should they enter the computer system by guessing the correct answers to the authorized user's Key, Gate, Door or Safe questions. Key question mitigates imposter brute force attacks by silently locking and unlocking the authorized user account during Gate, Door, Safe, and Frisk questions when the authorized user answers with the Key question instead. | 03-31-2016 |
20160098550 | Method and Apparatus of Three-Type or Form Authentication with Ergonomic Positioning - A system and methods for authenticating a user for access to a system input terminal comprising an infrared imager, a user input terminal, and a processing section including a plurality of processing instructions operable to perform image capture for wrist areas of a user in proximity to an input terminal or other structures requiring authentication and comparison to determine access or deny access. An aspect of an embodiment of the invention permits initial and frequent authentication that reduces or eliminates user action to perform such authentication. Also provided are user interfaces, and additional authentication sections operable with the infrared section. Alternative embodiments of the invention include a mobile embodiment as well as an embodiment including a sensor positioned with respect to a user in an operational position where the user is performing a task in relation to an input terminal or structure requiring authentication (e.g. a keyboard). | 04-07-2016 |
20160103991 | SELF-AUTHENTICATION DEVICE AND METHOD - A self-authentication device and method. The self-authentication device being for the user or owner of an electronic security device, wherein the self-authentication recovery device is separate from the security device and is configured for connecting to a computing device via a first communication link for authentication processing, preferably for authentication and recovery processing. | 04-14-2016 |
20160117494 | KEYBOARD NEUTRAL AUTHENTICATION - A method of performing user authentication including the steps of receiving a password comprising a sequence of characters, accessing one or more alternative keyboard layout definitions, generating one or more additional passwords from applying the alternative keyboard layout definitions to the sequence of characters, and using the received password and the additional passwords in the user authentication process. | 04-28-2016 |
20160125178 | Systems And Methods For Spoof Detection In Iris Based Biometric Systems - The invention provides methods, systems and computer program products for spoof detection in iris based biometric recognition. In an embodiment, the invention comprises (i) obtaining a first image of an iris at an imaging apparatus configured to a first exposure setting (ii) obtaining a second image of the iris at the imaging apparatus configured to a second exposure setting (iii) comparing incidence of reflection patterns within the first and second iris images and (iv) determining authenticity of the imaged iris based on a result of comparing the incidence of reflection patterns within the first and second iris images. | 05-05-2016 |
20160125182 | EVALUATION OF A PASSWORD - A method and computer for assessing whether a password can be generated by using characteristics of a physical arrangement of keys of an input device. A received password includes characters corresponding to respective select keys in a sequence of select keys of the input device. For each select key, a final detection frequency is calculated as a sum of an initial detection frequency and an additive correction. A password determination value is calculated as a ratio of a total number of select keys having a final detection frequency equal to a minimum detection frequency and the total number of select keys in the sequence of select keys. A determination of whether the calculated password determination value is, or is not, less than a predetermined threshold value indicates that the password cannot, or can, respectively, be generated by using the characteristics of the physical arrangement of keys of the input device. | 05-05-2016 |
20160132676 | SECURE PASSWORD STORAGE AND RECALL SYSTEM - A method and system for securely storing passwords and recalling any of the stored passwords in the computer using a single, master password. The system provides password handling software that is configured to enable a user to store in and retrieve from the computer the passwords via user interface. Whenever the password handling software is utilized, a facility in the software turns off communication hardware through which the computer ordinarily communicates with other computers over public communication lines, in order to prevent snooping or eavesdropping on the user's communications during password storage and retrieval sessions. | 05-12-2016 |
20160140331 | Method and system for biometric identification and verification - Financial entities and other organizations that have customers who set up accounts with the entity are at risk of having people set up multiple accounts at different branches of an entity or at different entities and their different branches. Many of these accounts will be set up under different names and may use false identities. A single customer, often a Money Mule, will then have multiple accounts across multiple branches of multiple entities and will use the multiple accounts to facilitate the illegal transfer of funds from the customer accounts of the entity. The entities have no way of knowing that the person has set up multiple accounts under the same name or multiple accounts under various identities and is thus not equipped to prevent cybercrimes that use those multiple accounts. Using the biometric identification system and method described in this invention disclosure solves that problem for the participating entities. | 05-19-2016 |
20160140337 | System to Create Mobile Digital Identifier - A method, system and computer-usable medium are disclosed for producing a digital identifier. A set of design elements are selected for inclusion in the digital identifier, followed by the selection of an associated digital identifier template and a set of user credentials. The selected design elements, template and user credentials are then used to produce the digital identifier. | 05-19-2016 |
20160147546 | Managing the Customizing of Appliances - Disclosed is a method of customizing an appliance. The method includes steps of pre-storing a public key in the appliance; connecting the appliance to an external storage device; and booting up the appliance to automatically proceed with the following customization process: obtaining a customization file from the external storage device; authenticating the customization file with the public key; and executing customization with the customization file if the authentication succeeds. | 05-26-2016 |
20160162678 | VEHICLE AND METHOD OF CONTROLLING VEHICLE - A vehicle and a method of controlling the vehicle are provided. The vehicle includes an input device that is implemented as at least any of one or more hard keys and a jog shuttle that rotates or is inclined in at least one direction within the vehicle. The input device is configured to receive a command according to a manipulation. In addition, a storage unit is configured to store a combination of commands for the input device as a security pattern. A controller is then configured to perform user authentication based on whether a combination of commands input from the input device matches a security pattern previously stored in the storage unit. | 06-09-2016 |
20160162684 | METHODS FOR ENABLING REAL-TIME DIGITAL OBJECT AND TANGIBLE OBJECT INTERACTIONS - A method for authorizing an electronic device to perform an action includes detecting interaction data from an interaction between a hardware sensor and an identity-augmented tangible object; wherein data of the first set of interaction data is intrinsically dependent on physical characteristics of the identity-augmented tangible device; computing parametric descriptors from the interaction data; transmitting the parametric descriptors and supplementary data to a remote database system; generating, on the remote database system, identity data from a comparison of parametric descriptors with a known set of parametric descriptors; and authorizing, in response to both of the identity data and the supplementary data, the electronic device to perform a first action. | 06-09-2016 |
20160180067 | UNLOCKING ELECTRONIC DEVICES USING TOUCHSCREEN INPUT GESTURES | 06-23-2016 |
20160180070 | PROCESSING METHOD AND SYSTEM FOR IDENTITY AUTHENTICATION WITH MOBILE TERMINAL BASED ON IRIS RECOGNITION | 06-23-2016 |
20160180071 | METHOD AND SYSTEM FOR BIOMETRIC IDENTIFICATION WITH ACCELERATED TREATMENT | 06-23-2016 |
20160180074 | SENSOR IDENTIFICATION | 06-23-2016 |
20160188858 | INFORMATION PROCESSING DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND PROGRAM - An information processing device ( | 06-30-2016 |
20160188859 | METHOD AND APPARATUS FOR AUTHENTICATING USER - The present disclosure provides a method performed by a user authentication apparatus for authenticating a user of an information processing device. The method includes: visually outputting a code image including predetermined information to allow the information processing device to capture the code image; determining whether an authentication request including the code image and authentication identification information is obtained from the information processing device; and performing a user authentication process based on the authentication identification information after the authentication request is obtained. | 06-30-2016 |
20160188860 | BIOMETRIC AUTHENTICATION DEVICE AND BIOMETRIC IMAGE OUTPUT CONTROL METHOD - A biometric image output control method in a biometric authentication device comprises the step of generating a biometric image by imaging an living body to be authenticated; determining whether an imaging environment; if the imaging environment satisfies a predetermined recognition condition, controlling a change rate of a size of a biometric image, a change rate of a focal point of the biometric image and a change rate of a brightness of the biometric image according to a distance to the living body to be authenticated; and if the imaging environment does not satisfy the predetermined recognition condition, overly controlling at least one of the change rate of the size of the biometric image, the change rate of the focal point of the biometric image and the change rate of the brightness of the biometric image according to the distance. | 06-30-2016 |
20160188863 | BIOMETRIC AUTHENTICATION - A method comprising using at least one hardware processor for: providing a set of development supervectors representing features of biometric samples of multiple subjects, the biometric samples being of at least a first and a second different biometric modalities; providing at least a first and a second enrollment supervectors representing features of at least a first and a second enrollment biometric samples of a target subject correspondingly; wherein the at least first and second enrollment samples are of the at least first and the second different biometric modalities correspondingly; providing at least a first and a second verification supervectors representing features of at least a first and a second verification biometric samples of the target subject correspondingly, wherein the at least first and second verification samples are of the at least first and second different biometric modalities correspondingly; concatenating the development supervectors to a set of development generic supervector, the at least first and second enrollment supervectors to a single enrollment generic supervector and the at least first and second verification supervectors to a single verification generic supervector; and verifying an identity of the target subject based on a fused score calculated for the verification generic supervector, wherein the fused score is calculated based on the enrollment generic supervector and the set of development generic supervectors. | 06-30-2016 |
20160188867 | MULTI-LEVEL PASSWORD AUTHORIZATION - A method and system for using multi-level passwords is provided. The method includes receiving a request for access to a first level of access associated with secure components associated with a device of a user. In response, a portion of a passcode is received. The portion of the passcode does not include an entire portion. The portion of the passcode is compared to security group policy it is determined that the portion of the passcode meets requirements the security group policy. Access is enabled to a group of components of secure components based on the security requirements. The group of components is associated with the first level of security access. | 06-30-2016 |
20160188870 | ELECTRONIC APPARATUS AND SCREEN UNLOCK METHOD THEREOF - An electronic apparatus and a screen unlock method thereof are provided in the invention. The method includes the following steps. First, when a screen of an electronic apparatus is locked, a password unlock option is displayed on the screen, where the password unlock option is configured to unlock the screen via a preset password. A password delete option is displayed on the screen, where the password delete option is configured to delete the preset password to unlock the screen. In response to a select operation on the password delete option performed by a user, a random code is generated and set to a preset account. Next, an input code input by the user is received, and whether the input code and the random code are identical is determined. When the input code and the random code are identical, the preset password would be deleted, and the screen would be unlocked. | 06-30-2016 |
20160196415 | Measurement Method, Electronic Device, and Measurement System | 07-07-2016 |
20160196420 | ELECTRONIC SYSTEM AND DEVICE UNLOCK METHOD OF THE SAME | 07-07-2016 |
20160253489 | USER AUTHENTICATION SYSTEM | 09-01-2016 |
20160253493 | DYNAMIC PASSWORD LOCK AND REMOTE PASSWORD LOCK APPARATUS | 09-01-2016 |
20170235932 | AUTHENTICATION DEVICE, AUTHENTICATION SYSTEM, AND AUTHENTICATION METHOD | 08-17-2017 |
20180025171 | METHOD AND APPARATUS FOR CONTROLLING APPLICATION TO ACCESS MEMORY | 01-25-2018 |
20190147146 | Providing a User Access to a Computer System | 05-16-2019 |
20220138304 | USER AUTHENTICATION - In an example there is provided a method of authenticating a user. An authentication challenge is received in response to a request to authenticate a user. The challenge is distributed to each device from a subset of a set of registered devices. At each device a share of an authentication token is accessed and a partial response to the challenge is generated based on an authentication token and challenge. A response to the challenge is generated by combining the partial responses from the subset of devices, and is communicated to an authenticator. The user is authenticated when the subset of devices is an authorised subset. Every authorised subset of the set of registered devices comprises at least one device from the first group of devices. | 05-05-2022 |
20220138307 | Automated Mobile Device Staging System - A method of staging mobile computing devices includes, at a computing device: receiving a staging request from a mobile computing device in response to insertion of the mobile computing device in a network-connected charging rack; selecting a source of staging data to fulfill the staging request; sending a source identifier of the selected source of staging data to the mobile computing device; and in response to sending the source identifier of the selected source of staging data, sending an access control command to the network-connected charging rack to lock the mobile computing device in the charging rack. | 05-05-2022 |
20220138356 | ACCESS REGULATION OF PERIPHERAL DEVICES - In an example, an apparatus for access regulation of peripheral devices may include a processor and a communication interface to communicate to a peripheral device and to the processor. The processor may identify a pattern associated with receiving input data from a first peripheral device, wherein the pattern includes a keystroke rate, a delay in a keystroke pattern, a keystroke pressure, or a combination thereof. Similarly, the processor may, in response to detecting enumeration of a second peripheral device coupled to the apparatus, compare particular input data received from the second peripheral device with the pattern, and regulate access of the second peripheral device to the apparatus, based on the comparison. | 05-05-2022 |