Entries |
Document | Title | Date |
20080201774 | Security System - A security system for controlling access to a plurality of secure areas, an interface to obtain verification data, particularly biometric scan data of the user, processing means arranged to compare the biometric scan data with stored template data and return a match condition, and signal means arranged to allow access to at least one of the plurality of secure areas if the match condition is satisfied. | 08-21-2008 |
20080201775 | Multifunction peripheral, password setting system, method and computer readable medium for password setting - There is provided a multifunction peripheral comprising an operation unit, a key definition unit to define usable keys for password setting depending on a type of a certain function, a password setting unit to accept a password through the usable keys defined by the key definition unit and to set the password in the multifunction peripheral, a password authentication unit configured such that when execution of the certain function is instructed, the password authentication unit accepts a password through the plurality of keys of the operation unit and judges whether the password accepted through the plurality of keys matches the password set by the password setting unit, and a function control unit configured to permit execution of the certain function if it is judged by the password authentication unit that the password accepted through the plurality of keys matches the password set by the password setting unit. | 08-21-2008 |
20080209545 | Authentication System, Information Processing Apparatus and Method, Program, and Recording Medium - An authentication system includes a mobile device carried by a user and a sensor sensing the user's biometric information. The mobile device includes a template storage unit storing the user's biometric information as a template, a first mutual authentication unit performing mutual authentication with the sensor via the user's body, and a template transmitter transmitting the stored template to the sensor via the user's body when the sensor is verified as valid. The sensor includes a second mutual authentication unit performing mutual authentication with the mobile device via the user's body, a sensing unit sensing the user's biometric information, a degree-of-match determining unit determining whether the biometric information matches the template, and a control-signal output unit outputting a preset control signal when the mobile device is verified as valid and when the biometric information and the template are determined to match each other. | 08-28-2008 |
20080209546 | EVENT DISPLAY METHOD AND APPARATUS FOR MOBILE TERMINAL - Disclosed is an event display method and apparatus for a mobile terminal, which displays events occurring in a mobile terminal on a multi time graphic (divided into a plurality of time graphics), thereby enabling easy checking and management of various types of events. For this, the event display method includes detecting at least one or more events in a mobile terminal, displaying a multi time graphic divided into a plurality of time graphics on a display screen, and locating the detected events on the multi time graphic. | 08-28-2008 |
20080216171 | Wearable device, authentication method, and recording medium - A wearable device is provided that is used while being worn on a body of a user. The wearable device includes a biometric-information authentication portion that acquires biometric information from the user for biometric authentication. The wearable device acquires biometric information from a portion in contact with or in the vicinity of the user's body to perform the biometric authentication without requesting the user to operate for the biometric authentication. | 09-04-2008 |
20080229408 | Access control system based on brain patterns - The invention includes a control system and a method for access control of an application system, with electrically measurable data acquired as the result of a biometric reaction of a user, the biometric reaction triggered by stimulatory information presented to the user. An acquisition means for acquiring the electrically measurable data, a provision means for providing reference data and a comparison means for comparing the data are provided in the control system. The reference data is provided relating to the stimulatory information and/or the acquired, electrically measurable data. The acquired measurable data is compared with the provided reference data by means of the comparison means. An authorization of the user to the application system takes place on the basis of the comparison results. By means of this control system it is possible to dynamically authorize and identify a user with absolute reliability and to unambiguously authenticate said user. | 09-18-2008 |
20080229409 | CONTROL OF EQUIPMENT USING REMOTE DISPLAY - An example display unit for facilitating operation of equipment includes a housing, an electronic display supported by the housing, and an electronic circuit located within the housing. The display unit may include one or more data receivers, such as a wireless receiver and/or an electrical interface. A biometric scanner, including a biometric sensor and proving an authorization signal when an authorized biometric input is detected by the biometric sensor, may be configured to electrically (and optionally mechanically) interconnect to the display unit. The example display unit receives an authorization status for operation of the equipment from the biometric scanner, and displays the authorization status and operational parameters relating to equipment use on the electronic display. | 09-18-2008 |
20080235789 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING REGISTRATION AND CONFLICT RESOLUTION OF WEB APPLICATION KEYBOARD SHORTCUTS - Conflict resolution of web application keyboard shortcuts implementation includes a web application being loaded in a web browser and application keyboard shortcuts for the web application are registered with the web browser. The web browser identifies application keyboard shortcuts for the web application that conflict with keyboard shortcuts for the web browser. Then the web browser resolves each conflict. | 09-25-2008 |
20080244734 | INFORMATION PROCESSING APPARATUS AND METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus limiting access to a storage medium from outside, includes unlock command obtaining means for obtaining, from an authentication unit configured separately from the information processing apparatus, a unlock command requesting release of inhibition of access to the storage medium, and also an authentication mode ID for identifying an authentication mode of the authentication unit, authentication data supplying means for supplying the authentication unit with authentication data used as sample data indicating that a user is verified in an authentication processing of a user instructing access to the storage medium, the authentication data being corresponding to the authentication mode ID obtained together with the unlock command from the unlock command obtaining means, authentication result obtaining means for obtaining, from the authentication unit, an authentication result of the authentication processing performed by using the authentication data supplied from the authentication data supplying means, authentication result confirming means for confirming contents of the authentication result, and release means for releasing inhibition of access to the storage medium from outside when, as a result of confirmation made by the authentication result confirming means, the user is authenticated as being verified. | 10-02-2008 |
20080244735 | Identification and Computer Login of an Operator of a Vehicle - A method for identifying and performing a vehicle operator computer login to a vehicle computer provided in a vehicle. A device is arranged to request and receive vehicle operator data stored on a data carrier provided for a tachograph comprising a reader for reading the data carrier. The device controls communication of vehicle operator related data to the vehicle computer, wherein the device is arranged to initiate a vehicle operator login procedure of the vehicle computer, in dependence on the data carrier inserted in the tachograph. The invention is also related to a vehicle arrangement, a computer program and a computer program product. The invention solves the problem of providing identification and login of an operator of a vehicle to the vehicle computer in a simplified and secure way. The invention also enables shortened start up/stop times of a vehicle by reducing systems login/logoff time for an operator. | 10-02-2008 |
20080250494 | Image processing apparatus - An image processing apparatus is provided that is capable of displaying a customize screen without input operation to the own machine. An image processing apparatus (MFP) is communicatably connected to an information processing apparatus (PC) and includes a displaying portion. The MFP acquires user information related to a login user logging in to the PC, authenticates based on the acquired user information whether the login user is a usage permitted user permitted to use the MFP, and displays a customized screen corresponding to the login user on the displaying portion of the MFP when it is authenticated that the login user is the usage permitted user. | 10-09-2008 |
20080289032 | Computer Control Method and Computer Control System Using an Externally Connected Device - A computer system and appertaining control method allow, when an operation of a computer is controlled in accordance with an authentication result due to biological information using an externally connected device, setting up an authentication authority regarding a plurality of users, and setting up an authority per application and operation. The authentication condition on a biological authentication needed per application or operation is stored in the externally connected device along with the biological information of a plurality of users for whom biological authentication is needed. When using an external computer, it is connected to the externally connected device which performs biological authentication. When a predetermined operation requesting the biological authentication is performed in this computer, a presence of the biometrics is verified according to the authentication condition set to this operation stored in the external device, if the authentication condition is satisfied, the execution of this normal operation is permitted. | 11-20-2008 |
20080289033 | Method and system for GNSS receiver login protection and prevention - Embodiments of the present invention recite a method and system for implementing login protection and prevention to a Global Navigation Satellite System (GNSS) receiver. In one embodiment, a geospatial data collection device which is communicatively coupled with a GNSS receiver is authenticated. It is then determined that the geospatial data collection device is authorized to collect data from a geographic region in which the GNSS receiver is located. The geospatial data collection device is then permitted access to a control interface of the GNSS receiver. | 11-20-2008 |
20080289034 | METHOD AND APPARATUS FOR PROVIDING PROCESS-BASED ACCESS CONTROLS ON COMPUTER RESOURCES - A method, apparatus, and computer instructions for process-based access controls on computer resources to processes. An access mechanism is provided in which a specific invoker obtains an object access identity (ACI). Another mechanism is provided in which a specific object, such as a file system resource, requires a specific object access identity to obtain one of the forms of access denoted by an access control list. A process may “grant” an identifier that is later “required” for a system resource access. Objects may specify their own access requirements and permitted access modes. The granted identifier, ACI, is stored in the process's credentials once these credentials match a specific “grant” entry in the access control list. This identifier has no meaning outside of being used to make an access decision for a specific resource. When a process tries to access the object, the object's access control list is scanned for “required” entries. If a match occurs between the “required” entry's identifier and the ACI stored, access to the object is granted with access rights specified in the “require” entries. | 11-20-2008 |
20080295165 | Method for Safely Logging Onto a Technical System | 11-27-2008 |
20080295166 | OUTPUT TERMINAL APPARATUS FOR PRINTING DATA BY EMAIL | 11-27-2008 |
20080320588 | System of Assigning Permissions to a User by Password - A data processing system includes a data storage unit for storing data sets accessible to a user upon receipt of permission. The data processing system restricts access to data sets by requiring a username and then requiring a password to obtain permission for access to a data set stored in a data storage unit. The system is adapted to support use of more than one said password associated with a username; and each of those passwords associated with that username permits a distinct level of access to a particular data set, whereas other passwords can provide different levels of access to any data set assigned thereto. | 12-25-2008 |
20080320589 | SECURING SYSTEM AND METHOD USING A SECURITY DEVICE | 12-25-2008 |
20090007256 | Using a trusted entity to drive security decisions - An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user credentials and a set of user's credentials having such privilege. The trusted entity determines if a requested process is included in the list of processes, and responds to the privilege requests generated by the kernel of the operating system for such processes, eliminating the need for the user to manually authenticate using some type of input mechanism. | 01-01-2009 |
20090007257 | SYSTEM, METHOD, SERVER, CLIENT TERMINAL, PROGRAM FOR BIOMETRIC AUTHENTICATION - The present invention provides a biometric authentication system including: a parameter manage server having a user parameter generating portion for generating a user parameter using a user ID transmitted from a client terminal, a master key and a temporary parameter; the client terminal having an input unit by which a user ID provided in advance for a user is input, a biological information sensor which acquires biological information of a user, a feature extracting portion which extracts feature from the biological information acquired by the biological information sensor and a transforming portion which transforms the feature using the user parameter generated by the parameter manage server to generate transformation feature; and an authentication server having a matching portion which matches the transformation feature transmitted from the client terminal against a template stored in advance in the storing portion. | 01-01-2009 |
20090007258 | Secure Access to Information Associated With a Value Item - Privacy of information is protected by a method of securing access to information associated with a value item, the method including comparing a security signature and a stored profile, and permitting access to the information associated with the value item if the security signature matches the stored profile. The value item may be a machine readable document or other item of high value. The associated information may be stored in an electronic storage medium attached to the value item, or may be stored in an external database, or both. Permitting access to the associated information may include generating an access code unique to the associated information and to the value item. | 01-01-2009 |
20090013403 | AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM - An authentication apparatus includes: a database section that stores a password; an entry section through which a password is entered; a storage section that stores an entered password which is entered through the entry section; an authentication section that authenticates whether the password and the entered password match with each other; and a determining section that determines whether or not a re-entered password is to be subjected to an authentication processing performed by the authentication section when the re-entered password is entered through the entry section after the authentication section determines that the password and the entered password do not match with each other. | 01-08-2009 |
20090019541 | Sequence-acitvated applications | 01-15-2009 |
20090038003 | SYSTEM AND PROCESS FOR SECURITY CONTROL OF A PROJECTOR - An exemplary projector crypto system includes a key storage unit, a password inputting unit, a comparing unit, and a switch module. The key unit is configured for determining and storing a secret picture for operating the projector. The password inputting unit is configured for reading a picture input by a user. The comparing unit is configured for determining whether the input picture is identical to the secret picture. The switch module activates the projector only if the input picture is identical to the secret picture. | 02-05-2009 |
20090049544 | Habit-Based Authentication - A method for authentication is disclosed. During use, the observed usage of the device is compared to an expected pattern of usage of the device. Deviation between the observed and expected usage indicates that the user might not be authorized to use the device. If the deviation exceeds a threshold, a credential is required from the user to authenticate itself as the authorized user. | 02-19-2009 |
20090064318 | METHOD OF INPUTTING BOOTING PASSWORD - A method of inputting a booting password includes the following steps. When a computer is powered on, firstly, a first password input screen is outputted, which waits for a first password to be inputted. Next, if a second password input activating signal is received during the waiting process, a second password input screen is outputted, which waits for a second password to be inputted. Then, after the input of the first password or the second password is finished, an operating system is booted. | 03-05-2009 |
20090064319 | ELECTRONIC TRIP UNITS WITH LIMITED READ/WRITE ACCESS - A method of limiting read/write access of information stored on an electronic trip unit is disclosed. The method includes requesting a valid password on one of a communication port of the electronic trip unit and a display device of the electronic trip unit, receiving a password at a processor of the electronic trip unit in response to the request, determining if the received password is valid based on password information stored on a memory of the electronic trip unit, and limiting read/write access of information stored on the electronic trip unit based on the determination. | 03-05-2009 |
20090064320 | Image processing apparatus and image processing system - An image processing apparatus and an image processing system, in which burdensome operation for user authentication is unnecessary, are provided. | 03-05-2009 |
20090083850 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 03-26-2009 |
20090100516 | Secure Bait and Switch Resume - Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file. | 04-16-2009 |
20090113544 | ACCESSING PASSWORD PROTECTED DEVICES - Embodiments of the invention include a method that comprises receiving and storing a power-on password. Embodiments of the invention include a method that comprises receiving and storing a power-on password. In one embodiment, the method includes receiving a power-on password, wherein the receiving of the power-on password occurs during power-on operations of a computer. The method can also include storing the power-on password, wherein the storing includes saving the power-on password in memory. The method can also include loading an operating system to control the computer, wherein the loading occurs after the power-on operations. The method can also include detecting, after the loading, that a peripheral devices has been added to the computer and determining that an access password is needed to access the peripheral device. The method can also include transmitting the power-on password to the peripheral device and presenting a prompt requesting a secondary password; receiving the secondary password. The method can also include transmitting the secondary password to the peripheral device; and accessing the peripheral device. | 04-30-2009 |
20090126007 | IDENTITY MANAGEMENT SUITE - A server platform hosting an integrated software-based identity management suite used in a system for authenticating users with respect to a legacy application. The identity management suite includes an administration console for domain administration, an authentication services module for user authentication, an activity intelligence engine for monitoring user activity, an open-source-based virtual layer for mapping fields of a legacy user directory to fields within the server platform, and an internal interface using an open communication protocol adapted to provide communication between the open-source-based virtual layer and at least the authentication services module within the server platform. | 05-14-2009 |
20090126008 | ADAPTIVE CAPACITY POWER SUPPLY - Methods and systems are disclosed for automatically tracking and controlling the capacity ratings of UPS units. The methods and systems provide a central server or repository for storing the capacity ratings, grant kVA and grant code authorized for each UPS unit along with a unique security key for each unit. When a customer purchases a capacity upgrade, the server updates the capacity rating for the customer's unit and issues an upgrade grant that includes the new rating and the grant code. The upgrade grant may thereafter be downloaded by a service technician and used to upgrade the unit. Alternatively, the upgrade grant may be downloaded directly to the UPS unit, and the unit's software and/or firmware may perform the upgrade automatically. In either case, the upgrade may be performed through a software modification, thus eliminating the need for the technician to physically swap out hardware. Such an arrangement helps ensure that only authorized capacity upgrades are performed. | 05-14-2009 |
20090126009 | PORTABLE COMPUTING SYSTEM, APPARATUS AND METHOD - A computing system comprising a pocket personal computer and a reader are disclosed. The pocket PC is credit card-sized and comprises flash memory, and optionally a processor and a GPS chip. In some embodiments, the pocket PC also includes an operating system. The reader includes a monitor, a keyboard with docking port and an optional processor and at least one input/output USB connector. A user cannot interact with the pocket PC without the reader. The reader is a non-functioning “shell” without the pocket PC, however, when they are connected the system becomes a fully functional personal computer. To log on, a user provides security information, for example, a password or biometrics, such as fingerprints. The credit card size and capabilities of the pocket PC allows a user to easily carry virtually their entire computer in a pocket for use anywhere there is a reader. In addition, the pocket PC provides security against unauthorized use, even if lost or stolen, since a password or fingerprints are required to access to the device. | 05-14-2009 |
20090150992 | KEYSTROKE DYNAMICS AUTHENTICATION TECHNIQUES - A keystroke dynamics authentication system collects measurements as a user types a phrase on a keyboard. A first set of derived data values are computed based on the collected measurements, and then a second set of derived data values are computed based on the first set of derived values. The first and second sets of derived values are used to construct a template for identifying the user based on his typing. | 06-11-2009 |
20090150993 | Mobile Device with Frequently Operated Biometric Sensors - A mobile device having a user input component receiving input from a user and a biometric sensor incorporated in the user input component collecting biometric data from the user when the user input component is receiving the input, wherein the input is non-biometric data. In addition, a system and method for receiving input from a user via a user input component of a mobile device and collecting biometric data from the user via a biometric sensor incorporated within the user input component when receiving the input from the user, wherein the input is non-biometric data. | 06-11-2009 |
20090158423 | LOCKING MOBILE DEVICE CRADLE - Systems, devices and/or methods that facilitate an improved locking system are presented. An improved locking system can employ biometric sensing to facilitate improved mobile device security, more specificity in user access, specificity in levels of access, user accountability, selection of available devices, or combinations thereof, among many others. An improved locking system can employ remote oversight, multiple layers of locking, and inferential determinations to further facilitate a more transparent, effective, and substantial locking system for mobile devices. The improved locking system can be employed in devices, cradles, docking stations, and/or aftermarket products, and the like, among many others. | 06-18-2009 |
20090158424 | METHOD OF INPUTTING PASSWORD - The present invention discloses a method of inputting a password, and a background pattern is provided for helping a user to remember a password position and prevent the password from being stolen by others. The method of inputting a password sets a number of password characters on the background pattern, so that the user can remember at least one password position from the background pattern, and input a password character shown at the password position into a system. Therefore, the method can use the background pattern to help the user to remember the password position and prevent the password from being stolen by others. | 06-18-2009 |
20090165121 | Touch Pad based Authentication of Users - Touch pad based authentication of users. In an embodiment, a user can touch (and move on) a touch pad in a specific pattern (e.g., up, down, etc.) to authenticate oneself. In an embodiment, a device translates the touch movement to the same set of characters as those a user can manually enter using a keyboard to authenticate oneself. As a result, the user can use the same password when accessing the same application from other systems which have only keyboards, but not touch pads. | 06-25-2009 |
20090165122 | Image processing apparatus and copy machine control method - An image processing apparatus is an image processing apparatus capable of reading a security paper document that has a ground design pattern and performing image processing, and is provided with: a second modification processing unit that visualizes a latent image included in the ground design pattern; a first modification processing unit that performs a modification process so that the latent image included in the ground design pattern is not visualized; a CPU that performs authentication regarding whether or not a user of the security paper document is an authorized user; and a CPU that performs control so that the first modification processing unit performs modification processing and the latent image is not visualized, or performs control so that the latent image is not visualized by the second modification processing unit, in the case where the user has been authenticated as an authorized user of the security paper document. | 06-25-2009 |
20090165123 | SECURITY SYSTEM AND METHOD FOR CONTROLLING ACCESS TO COMPUTING RESOURCES - A security system comprises a personal digital key (PDK), a reader and a computing device. The PDK is a portable, personal transceiver that includes a controller and one or more passwords or codes. The computing device includes a detection engine, vault storage and a set up module. The detection engine detect events relating to the access of any files and third-party systems by the computing device and receives information from the reader as to whether the PDK is present/linked. The detection engine controls whether a user is able to access any of the functionality provided by the computing device based upon whether the PDK is in communication with the reader or not. The present invention also includes a number of methods such as a method for initializing the security system, a method for setting up a computing device, and a method for controlling access to computing resources. | 06-25-2009 |
20090172809 | Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 07-02-2009 |
20090172810 | Apparatus and method for inputting graphical password using wheel interface in embedded system - Provided are an apparatus and method for inputting a graphical password that use representative pictures and elemental pictures of a graphic to form a graphical password and that receive the graphic via a wheel interface and a select button for user authentication. The apparatus includes: an input unit having a wheel interface and a select button; a display for displaying a graphic consisting of representative pictures and elemental pictures, and displaying a changed graphic in response to an input from the wheel interface; a memory for storing a graphical password of a user; and a controller for recognizing, when the select button is pressed, the graphic displayed on the display as a user-input graphical password, and determining whether the input graphical password matches the stored graphical password for user authentication. Thus, it is possible to increase the number of cases for a password using a wheel interface for a higher security level of an embedded system that has a low security level due to a limited type and length of letters input as a password. | 07-02-2009 |
20090172811 | IMAGE PROCESSING APPARATUS, PROCESSING FLOW CONTROL METHOD, IMAGE FORMING SYSTEM, AND STORAGE MEDIUM - An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired processing flow. The image processing apparatus including an authentication unit adapted to execute user authentication, and an execution unit adapted to execute processing on image data with a plurality of processes as a sequential processing flow while cooperating a plurality of different functions with one another. Setting data personalized for a user authenticated by the authentication unit is obtained, and the plurality of processes is registered as a sequential processing flow. The processing flow is executed with a part of the processing flow replaced by processing personalized for the user set in the setting data, upon executing the registered processing flow. | 07-02-2009 |
20090178136 | METHOD AND DEVICE FOR ENTERING A COMPUTER DATABASE PASSWORD - The invention relates to computers, more particularly to a method and apparatus for entering a password to gain access to computer databases. The object of the invention is to provide efficient protection of the user's password from reproduction by an unauthorized person, to substantially increase the number of possible combinations and to create passwords that are maximum easy for the users to memorize. An embodiment of the invention comprises entering parameters of a password entry dynamic image to a computer; displaying to the user the dynamic image with the selected parameters; pointing at least one predetermined object of the dynamic image that has taken a user-predetermined position in space and/or state in time. Another embodiment comprises setting a predetermined access code in the form of a rhythmic pattern; preliminary entering said rhythmic pattern via a user's entry device to a computer to store and use the rhythmic pattern in subsequent password entries; when entering the password, entering said rhythmic pattern via a set of contact means of the user's entry device. | 07-09-2009 |
20090193519 | Systems and Methods for Accessing a Tamperproof Storage Device in a Wireless Communication Device Using Biometric Data - A novel system and method for accessing data stored in a secure or tamperproof storage device in a wireless communication device is provided. The wireless communication device may include a biometric sensor for capturing a biometric sample of the user. The captured biometric sample may be compared to known biometric samples of users stored in a memory device of the wireless communication device. If the captured biometric sample matches one of the known biometric samples, the user is allowed access to the tamperproof storage device for a preset amount of time. The user may delete existing data, add new data, modify existing data or view existing data stored in the tamperproof storage device. | 07-30-2009 |
20090205042 | EXTERNAL USER INTERFACE BASED MEASUREMENT ASSOCIATION - A health management system ( | 08-13-2009 |
20090210939 | SKETCH-BASED PASSWORD AUTHENTICATION - A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of the user and an input edge orientation pattern from an input sketch of the user, compares the similarity between the two edge orientation patterns, and makes an authentication decision based on the similarity. The edge orientations are quantized, and each edge orientation pattern includes a set of quantized orientation patterns each corresponding to one of the quantized edge orientations. The number of quantized edge orientations, as well as other parameters such as the dimension of the final orientation patterns and acceptance threshold, can be optimized either globally or user-specifically. | 08-20-2009 |
20090210940 | SYSTEM AND METHOD OF USING RFID TAG PROXIMITY TO GRANT SECURITY ACCESS TO A COMPUTER - A system and method of granting and removing a user's security access to applications on a computer using proximity of authorized RFID tags is disclosed. A user having an authorized RFID tag that is located near the computer will be granted access to pre-authorized applications. | 08-20-2009 |
20090210941 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND IMAGE FORMING APPARATUS - Provided is an image forming apparatus that improves operability while securing security of image data stored in an apparatus. In the image forming apparatus having a filing function, when image data is stored with the filing function, a password of a user authenticated by an authenticating portion is set as a password for storing the image data, and at the time of reading image data with the filing function, when the password of the user authenticated by the authenticating portion is set to the image data, the password of the image data is released. | 08-20-2009 |
20090217374 | License Scheme for Enabling Advanced Features for Information Handling Systems - A method for BIOS to pass license key information to a device via CLP interface during a power on self-test (POST). The license key may be stored in different locations within the information handling system. For example, the license key may be stored within a secure location on a BIOS flash chip, in which case the license key is maintained across BIOS updates. Alternately, the license key may be stored within motherboard persistent storage (such as an internal universal serial bus (USB) key that is provided on certain servers. Alternately, the license key may be stored on a central location on a network to which the information handling system is coupled. | 08-27-2009 |
20090217375 | Mobile Data Handling Device - A mobile data handling device comprising a memory comprising software; a communications module for communication via a data network. The device further comprises a control means for connecting to a data processor ( | 08-27-2009 |
20090222910 | MEMORY DEVICE AND CHIP SET PROCESSOR PAIRING - Systems, devices and/or methods that facilitate mutual authentication for processor and memory pairing are presented. A processor and a suitably equipped memory can be provided with a shared secret to facilitate mutual authentication. In addition, the memory can be configured to verify that the system operating instructions have not been subjected to unauthorized alterations. System integrity can be ensured according to the disclosed subject matter by mutual authentication of the processor and memory and verification of the authenticity of system operating instructions at or near each system power up. As a result, the disclosed subject matter can facilitate relatively low complexity assurance of system integrity as a replacement or supplement to conventional techniques. | 09-03-2009 |
20090222911 | MULTI-USER LOGIN METHOD FOR COMPUTER NUMERICAL CONTROL MACHINE - An exemplary multi-user login method for a computer numerical control (CNC) machine includes: initializing a program installed in the CNC machine, thereby displaying a user selection interface on a screen of the CNC machine; a user inputting a user name and password on the user selection interface; the program of the CNC machine determining whether or not the user is registered based on the user name and password entered; if the user is registered, an operating system of the CNC machine loading a driver program installed in a motion control card of the CNC machine, and the driver program reading the user's personal information stored in the motion control card; and accessing a user operation interface of the registered user. | 09-03-2009 |
20090222912 | IDENTIFICATION DEVICE AND AUTHENTICATION METHOD THROUGH SUCH A DEVICE - An identification device comprises a seat for containing a sample of biological material and at least one storage support suitable for containing a record in electronic format of the DNA. An authentication method compares the record of the sample of DNA with the one stored in said support. | 09-03-2009 |
20090241186 | Method for removable element authentication in an embedded system - The present invention proposes a method for protecting and monitoring removable entities in an embedded system. In accordance with the present invention, prior to insertion of a removable entity in the embedded system, a user registers details of the removable entity in the device host. The details may be entered after entering a password or a PIN. A registration identification is calculated based on an algorithm in the device host and is then stored in the host. After the removable entity is inserted, it is registered in an unalterable area (e.g. flash memory) of the device host. Information such as the category of the removable entity, a device number, etc. may be exchanged between the device host and the removable entity. The device host then computes a registration identification based on a Removable Entity Registration Algorithm. The identifications are then compared, and the device host displays the details of the removable entity to the user. | 09-24-2009 |
20090249478 | User Authentication System and Method - A user authentication system and method are disclosed. The user authentication system includes an authentication device which can be donned and doffed by the user, a sensor to determine whether the authentication device is donned or doffed by the user, and an authentication server to receive information from the sensor and to authenticate the user based on whether the authentication device is donned by the user. | 10-01-2009 |
20090260077 | SECURITY-ENHANCED LOG IN - A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device. | 10-15-2009 |
20090260078 | AUTHENTICATION SYSTEM AND METHOD - An authentication apparatus and technology operable to change a response time based on a degree of authentication failure is disclosed. A degree of authentication failure can be determined in response to an authentication failure. A response time such as an authentication response time can be changed based on the degree of authentication failure. Intervals between entries of a password may be increased logarithmically based on the number of failed login attempts to deter unauthorized access. | 10-15-2009 |
20090276849 | INTELLECTUAL PROPERTY MANAGING SYSTEM, INTELLECTUAL PROPERTY MANAGING METHOD, AND PROGRAM FOR THE SAME - It is made possible to share information on intellectual properties between enterprises and between an enterprise and an office, and system development efficiency and maintenance efficiency are improved. An intellectual property managing system includes: a database | 11-05-2009 |
20090293118 | SYSTEMS FOR AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device. | 11-26-2009 |
20090293119 | User authentication method and system and password management system - In one embodiment of the present invention, a user authentication method including the steps of automatically generating a set of deviation parameters; deviating from a reference password object, within an object space defined by appearance parameters previously acquired from a training set of objects, in a direction and with an amount determined by the set of deviation parameters, to thereby synthesize a password object; assigning a perceptual password including the password object to a user, and receiving a user identity claim including a user-provided perceptual password. The method further includes the steps of comparing the user-provided perceptual password with the perceptual password assigned to the claimed user, and, based on the result of this comparison, accepting or rejecting the user identity claim. | 11-26-2009 |
20090307768 | PASSWORD INPUT SYSTEM AND METHOD - A password input system includes a touch screen, a storing module, and an authentication module. The touch screen is capable of displaying a number of symbols, and is used for inputting a password by drawing a line group between the symbols on the touch screen, the line group includes one or more lines. The storing module stores a password consisting of characteristics of a preset line group. The authentication module is capable of comparing the characteristics of the line group drawn on the touch screen with the characteristics of the preset line group stored in the storing module, and allowing or denying a user's access to a main system by judging whether the characteristics of the line group drawn on the touch screen is matched with the characteristics of the preset line group stored in the storing module. | 12-10-2009 |
20090328199 | Apparatus for Detecting Password Attacks Using Modeling Techniques - Provided is an apparatus for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile. then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes arc from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended. | 12-31-2009 |
20090328200 | Hidden Markov Model ("HMM")-Based User Authentication Using Keystroke Dynamics - Hidden Markov Models (“HMMs”) are used to analyze keystroke dynamics measurements collected as a user types a predetermined string on a keyboard. A user enrolls by typing the predetermined string several times; the enrollment samples are used to train a HMM to identify the user. A candidate who claims to be the user provides a typing sample, and the HMM produces a probability to estimate the likelihood that the candidate is the user he claims to be. A computationally-efficient method for preparing HMMs to analyze certain types of processes is also described. | 12-31-2009 |
20090328201 | PASSWORD INPUT DEVICE, COMPUTER SECURITY SYSTEM USING THE SAME AND METHOD THEREOF - A password input device includes a detection module, a recognition module, and an output module. The detection module is configured for detecting angular velocities and accelerations of hand movement. The recognition module includes a conversion unit, a character database, and an indexing unit. The conversion unit is configured for converting the detected angular velocities and accelerations, in analog format, into usable data. The indexing unit is configured for seeking a character corresponding to user input in the character database according to the usable data, and outputting the corresponding character. The output module is configured for receiving the corresponding characters from the indexing unit and determining the password. | 12-31-2009 |
20090328202 | MOBILE TERMINAL DEVICE, METHOD OF ACTIVATING TERMINAL APPARATUS FUNCTION AND COMPUTER READABLE MEDIUM - A method and apparatus for activation of a terminal apparatus function is disclosed. User identification information is received, and a characteristic of the user identification information is determined. The characteristic is compared to a required characteristic corresponding to the terminal apparatus function. A first activation process is selected if the characteristic matches the required characteristic; otherwise access to the terminal apparatus function is restricted. | 12-31-2009 |
20100005523 | COMPUTING DEVICE WITH ENVIRONMENT AWARE FEATURES - A method and mobile electronic device are provided which automatically adjust settings based on the environment of the mobile electronic device. The settings of the mobile electronic device which are adjusted may be security settings, filter settings, or status for instant messaging in dependence on the determined location of the mobile electronic device. | 01-07-2010 |
20100011439 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM - The present invention enables improvement in user convenience while reducing security degradation. To accomplish this, an information processing apparatus includes a display unit that displays an operation screen; an acceptance unit that accepts input from a user; a display control unit that controls display so as not to change the operation screen to a predetermined state when a predetermined time elapses without accepting input from the user by the acceptance unit; and an acquisition unit that acquires biological information of the user, wherein the display control unit does not change the operation screen to the predetermined state even if the predetermined time elapses without accepting input from the user by the acceptance unit if, within the predetermined time, the acquisition unit acquires biological information of the last user from whom input was accepted by the acceptance unit before the predetermined time started to be counted. | 01-14-2010 |
20100017875 | PASSWORD AUTHENTICATION APPARATUS AND PASSWORD AUTHENTICATION METHOD - A password authentication apparatus and a password authentication method for preventing the leakage of password information from user's password input operations includes a storage means for storing a correct answer symbol and selection information for selecting at least one input symbol for each digit of a password; a display means for displaying combinations of input symbol candidates based on user operation; a determination means for selecting, for each digit of the password, one or more input symbols from the combinations of input symbol candidates displayed by the display means based on the selection information corresponding to the digit to determine whether the correct answer symbol corresponding to the digit is included in the selected one or more input symbols; and an authentication means for authenticating that the password is entered correctly when the determination means determines that correct answer symbols for all the digits of the password are included. | 01-21-2010 |
20100031345 | Access to a processing device - Authorizing access to one or more restricted functions provided by a processing device is described. A method for authorizing such access comprises: reading at least one time from a clock associated with the processing device; storing the read time as a reference time; after the read time is stored, reading another time (a current time) from the clock. The method also includes comparing the reference time with the current time; reading a trend status associated with the reference time; and authorizing access to the restricted functions provided by the processing device if an acceptance criterion is satisfied. The acceptance criterion may require (i) the read current time to be chronologically earlier than the reference time and the trend status to be trusted backward mode, or (ii) the read current time to be chronologically later than the reference time. | 02-04-2010 |
20100031346 | AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND RECORDING MEDIUM HAVING AUTHENTICATION PROGRAM RECORDED THEREON - It is determined whether a login button is pressed or not. If the login button being pressed is sensed, a user authentication window appears. After the user authentication window appears, it is determined whether an authentication code is input or not. If an authentication code is input, then it is determined whether a prescribed period of time has passed or not since the last logout. If it is determined that a prescribed period of time has not passed since the last logout, authentication is performed in MFP. It is then determined whether the authentication is “OK” or not. If the authentication is “OK,” the authentication is successful. A login process is then executed. | 02-04-2010 |
20100031347 | REPRODUCING APPARATUS, SYSTEM LSI, AND INITIALIZATION METHOD - Hardware of a playback apparatus | 02-04-2010 |
20100031348 | LOCKED-DOWN COMPUTING ENVIRONMENT - Some embodiments of the present invention provide a system that presents an alternate computing environment on a host computing device. During operation, this system detects the presence of a removable storage device which is in communication with an interface of the host computing device. The system also locates code which implements the alternate computing environment on the removable storage device. Finally, the system runs the code which presents the alternate computing environment through an environment player on the host device, wherein the environment player prevents a user of the alternate computing environment from interacting directly with a native computing environment of the host computing device. | 02-04-2010 |
20100037313 | Identification and Authentication using Public Templates and Private Patterns - A system and method for providing access by a user to a secured area is provided. Access is provided after a user performs predetermined actions on a pre-selected template. The templates, in an embodiment, may include graphical, audio, and other elements and the actions may include the performance of one or more acts, such as clicking, double-clicking, or tracing a feature, on the graphical images or interacting other ways. The sequence of template elements may be dependent upon the actions taken on one or more preceding template elements. If the path and actions taken by the user match a predetermined set of paths and actions, then the user is allowed access to the secured area. | 02-11-2010 |
20100064363 | IMAGE PROCESSING APPARATUS, SCREEN SELECTION METHOD, AND SCREEN SELECTION PROGRAM EMBODIED ON COMPUTER READABLE MEDIUM - In order to improve operability by decreasing the number of times of switching between screens, an MFP includes an authentication portion which authenticates a user using authentication information input into one of first to third user I/Fs, a process executing portion which executes processes according to settings input, a first association data storing portion which stores first association data associating input data with the authenticated user, a second association data storing portion which stores second association data associating processes executed for the input data with the respective user I/Fs, and a determining portion which determines, in response to authentication by the authentication portion, a screen for the process associated by the second association data with one of the first to third user I/Fs that accepted the authentication information used for the authentication, if data associated with the authenticated user by the first association data is stored. | 03-11-2010 |
20100071059 | Information processing system, input apparatus, and information processing method - An information processing system uses an input apparatus to input user information. After authentication of the user information, the input apparatus-transmits control information to an information processing apparatus, indicating which functions of the information processing apparatus the user may use. The control information is independent of the particular method by which authentication is performed. Use of the information processing apparatus can accordingly be controlled by a variety of methods without requiring any user authentication capability to be provided in the information processing apparatus itself, and new authentication methods can be implemented without modification or replacement of existing information processing apparatus. | 03-18-2010 |
20100071060 | ELECTRONIC DEVICE AND METHOD FOR VERIFYING USER IDENTIFICATION - A method for verifying user identification receives an original symbol input by a user via a touch screen of an electronic device. A symbolic password is determined according to the original symbol. The method receives a login symbol input by the user via the touch screen and determines if the login symbol matches the symbolic password. The user is allowed to access the electronic device if the login symbol matches the symbolic password. | 03-18-2010 |
20100083370 | SYSTEM AND METHOD FOR DYNAMIC CYPHER AUTHENTICATION - A dynamic cypher authentication system is applied to an electronic device having an authentication password. The system includes an input module, a password triggering module, an operation module, and an authentication module. The input module receives an operator password input by a user. The password triggering module generates a trigger signal and then generates a prompt password according to the trigger signal. The operation module performs a mathematical operation on the prompt password according to the operator password, so as to generate the authentication password. The authentication module receives a login password and compares the login password with the authentication password, so as to determine whether to authorize a login request on the electronic device. | 04-01-2010 |
20100083371 | User Access Control System And Method - A user access control system, comprising an electronic device comprising an electronic device comprising a reduced function operating system configured to enable access to at least one type of media content and a content control module executable by the reduced function operating system, the content control module configured to authenticate an identity of a user and control access to the at least one type of media content based on the identity of the user. | 04-01-2010 |
20100083372 | IMAGE FORMING APPARATUS AND SECURITY SETTING METHOD THEREOF - An image forming apparatus and a security setting method thereof. The security setting method of the image forming apparatus includes supplying power initially to the image forming apparatus, displaying an administrator setting screen for the image forming apparatus, and changing a preset administrator password of the image forming apparatus from the displayed administrator setting screen. | 04-01-2010 |
20100100956 | METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information. | 04-22-2010 |
20100107242 | IMAGING SYSTEM AND AUTHENTICATION METHOD - An imaging system is disclosed that performs authentication of a user. The system includes one or more manipulation detecting parts that detect one or more manipulations by the user related to an imaging process, one or more biometric information acquiring parts that acquire biometric information of the user when the manipulation detecting parts detect the manipulations by the user, and an authentication determining part that determines an authentication result of the authentication based on the biometric information acquired by the biometric information acquiring parts. | 04-29-2010 |
20100115609 | DEVICE FOR ACCESSING MEDICAL INFORMATION - A device for accessing medical information provides an emergency responder and/or emergency personnel the ability to access medical information in an emergency situation. The device can be used to access an individual's medical records for display, storage, and/or manipulation of the information on the device. The device can access an individual's medical information directly from the individual's mobile device, via removable memory, a SIM card, a port on the device, or the like. Thus, if there is no wireless access to the individual's mobile device, or the mobile device is inoperable, medical information is still obtainable. | 05-06-2010 |
20100115610 | METHOD AND SYSTEM FOR PROVIDING AUTHENTICATION THROUGH AGGREGATE ANALYSIS OF BEHAVIORAL AND TIME PATTERNS - A method and a system for evaluating identification of a user based on behavioral patterns and time patterns, including an analysis component for analyzing data; an authentication component for authenticating the analyzed data; and a behavioral biometric device for collecting behavioral biometric data related to the user, the authentication component and the analysis component operably connected at least with the behavioral biometric device; wherein the behavioral biometric data is matched against previously obtained or expected behavioral biometric data stored in a first database component of the analysis component in order to progressively, continuously, and incrementally evaluate the identification of the user to determine a confidence factor. | 05-06-2010 |
20100115611 | METHOD, DEVICE, AND SYSTEM FOR JUDGING USER AUTHENTICATION - A user authentication judging device includes a proper environment information memory unit, a proper environment judging threshold memory unit, a changed environment information collecting unit, an environment authentication judging unit, an authentication controlling unit, and a verification authenticating unit. The proper environment information memory unit stores proper environment information. The proper environment judging threshold memory unit stores a proper environment judging threshold. The changed environment information collecting unit detects a change in a use environment of an information processing device and collects changed use environment. The environment authentication judging unit determines whether to authenticate or not the changed environment based on proper environment information stored in the proper environment information memory unit. The authentication controlling unit instructs reception of living body information from an applicant, and setting of a proper environment judging threshold. The verification authenticating unit performs authentication judgment and verification of the living body information using the set proper environment judging threshold. | 05-06-2010 |
20100125908 | STORAGE DEVICE, INFORMATION PROCESSOR, AND INFORMATION PROCESSING SYSTEM - According to one embodiment, a storage device includes a storing module, a determining module, and a releasing module. The storing module stores generated authentication information generated by a host connected to the storage device and set as authentication information for releasing access restriction to a storage module in the storage module. The determining module determines, when the storage device is turned on upon the host resuming from suspend mode and receives generated authentication information from the host in a state where access to the storage module is restricted, whether the generated authentication information matches the generated authentication information stored by the storing module in the storage module. The releasing module releases, when the determining module determines that the generated authentication information received from the host matches the generated authentication information stored by the storing module in the storage module, the access restriction to the storage module. | 05-20-2010 |
20100132034 | REGISTRATION FOR INTERACTIVE WHITEBOARD - There is provided a method of controlling a computer system of an interactive display system, comprising: predetermining one or more positions on an interactive display of the interactive display system; displaying an image representing the predetermined one or more positions; receiving data identifying one or more detected positions selected on the interactive display; comparing the detected positions and the predetermined positions, wherein in dependence on a match the computer system registers the interactive display with the computer systems. | 05-27-2010 |
20100132035 | DATA PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - In a case where a processing request corresponding to an instruction transmitted from a data processing apparatus is accepted from an external apparatus, an appropriate processing based on a processing request corresponding to an instruction made by a user who operates the data processing apparatus is performed. | 05-27-2010 |
20100138914 | SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device. | 06-03-2010 |
20100138915 | Password Protected Built-In Test Mode For Memories - In accordance with some embodiments, a semiconductor memory may be provided with a built-in test mode that is accessible through a password protection scheme. This enables access to a built-in test mode after manufacturing, if desired. At the same time, the password protection prevents use of the built-in test mode to bypass security features of the memory. | 06-03-2010 |
20100146619 | ELECTRONIC DEVICE AND ACCESS CONTROL METHOD THEREOF - An electronic device and method for controlling access to an electronic device includes setting a username and a password of an authorized user, and creating a keystroke biometric template of the authorized user. The electronic device and method further includes receiving an input username and an input password of a user, and recording keystroke dynamics of the user, and determining an identification of the user by identifying the input username and the input password of the user and determining if keystroke characteristic values of the user match the keystroke biometric template of the authorized user. | 06-10-2010 |
20100154053 | STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING - Methods and systems for presenting a virtual disk to a client device are disclosed. One method includes receiving client credentials from a client device, the client credentials including a client identifier. The method also includes authenticating the client device at a secure storage device. The method further includes determining a volume is associated with the client device based upon the client identifier, the volume associated with a plurality of shares stored on a corresponding plurality of physical storage devices. The method also includes, upon determining the volume is associated with the client device, presenting the volume to the client device. | 06-17-2010 |
20100162386 | CONTEXT AWARE BIOMETRIC AUTHENTICATION - A biometric sample of the user is received at a biometric interface of a device as part of a biometric authentication request by the user, with the biometric sample characterized by a match score when the biometric sample matches at least one stored template that uniquely identifies the user. The presence of a context usage override condition of the biometric authentication request causes a context usage factor to be updated based upon the context usage override condition. A biometric recognition threshold required for the user to access the application and indicative of a threshold security level required for biometric authentication is calculated based on the context usage factor. The user is permitted to access the application when the match score of the biometric sample is at least equal to the biometric recognition threshold. | 06-24-2010 |
20100162387 | Mobile device with separate access to private and public information stored in the device - An exemplary method is implemented by a wireless mobile device that transmits and receives text-based messages. Public records are stored in a public contact database in the mobile device, the public records containing public contact information for persons. Public contact information contained in a public record corresponding to a person selected by a public user is displayed upon the request of any public user of the device. Private records are stored in a private contact database in the mobile device, the private records containing private contact information for persons. Upon a valid password being received by the device from a private user, access to the private contact information is provided to the private user. In response to the receipt of a request from the private user, private contact information for a selected person from a corresponding private record is displayed on the screen of the mobile device. | 06-24-2010 |
20100162388 | Wireless mobile device with automatic segregation of received messages for private and public access - An exemplary method is implemented by a wireless mobile device that transmits and receives text-based messages. Received messages are stored in memory of the wireless mobile device. Based on a privacy criteria stored in the memory, some of the received messages are automatically identified as public and others of the received messages are automatically identified as private. Access is provided to stored received messages that are designated as public to any user of the mobile device. Access is provided to stored received messages that are designated as private only after receipt of a password entered by a user of the wireless mobile device that permits access to the privately identified messages. | 06-24-2010 |
20100180336 | System and Method for Authenticating a User Using a Graphical Password - The present invention is directed to a system and method for authenticating a user of a device or computer system using a graphical password. In an exemplary embodiment, a user is presented with a plurality of graphical images on a display screen of an access device, such as a handheld smart phone. Each graphical image includes one or more associated attributes. The user sequential selects graphical images and a password is generated based on the combination of attributes of the selected images. The generated password is compared with a stored password to authenticate the user and grant access to the device. In another aspect, the graphical password includes time, motion, and/or keyboard input attributes such that the password is multidimensional. | 07-15-2010 |
20100180337 | ENABLING ACCESS TO A SUBSET OF DATA - A method includes receiving, at a computing device, one or more replicated authorization databases. At least one of the one or more replicated authorization databases corresponds to a subscription to access selected data. The selected data is aggregated from a plurality of sources. The method also includes storing the one or more replicated authorization databases at the computing device. The method also includes determining, via the replicated authorization databases, user permission to access the selected data via the computing device. The method also includes enabling access to the selected data at the computing device after determining the user permission to access the selected data. | 07-15-2010 |
20100180338 | Multi-Domain Computer Password Management - A computer system has first and second password-protectable domains. The first domain has a multi-domain password manager for determining whether a password candidate is valid for both the first domain and the second domain. If so, the password manager submits the password candidate to the second domain. | 07-15-2010 |
20100186082 | Web Management Authorization and Delegation Framework - Described is a technology in which a non-administrator computer/web user is allowed to perform an administrative-level task within a certain context and/or scope. An authorization store is queried based on information (e.g., a provider, a username, and a path) provided with an authorization request, e.g., from an application via an API. The information in the authorization store, set up by an administrator, determines the administrative action is allowed. If so, a credential store provides credentials that allow the action to be runs before reverting the user to the prior set of credentials. Also described is a pluggable provider model through which the authorization store and/or delegation store are accessed, whereby the data maintained therein can be any format and/or at any location known to the associated provider. | 07-22-2010 |
20100186083 | APPARATUS AND METHOD FOR AUTHENTICATING USER - A user authenticating apparatus stores user information where identification information to identify each of a plurality of users and biological information of each user are associated with each other, acquires identification information of the user, when the user starts to use a predetermined target, authenticates each user using the acquired identification information and the stored user information, as first authentication, stores the identification information of the user whose first authentication is succeeded as success information, acquires the biological information of the user, and authenticates each user using the acquired biological information and the biological information corresponding to the identification information of the users stored as the success information among the stored biological information, as second authentication. | 07-22-2010 |
20100186084 | REMOVABLE MEMORY STORAGE DEVICE WITH MULTIPLE AUTHENTICATION PROCESSES - A method comprises providing first user authentication data of a user and comparing the first user authentication data to first stored template data. When the comparison is indicative of a match, a first session is provided, which supports one of user access for retrieving first data that are stored within a peripheral memory storage device and user access for modifying a data content of the peripheral memory storage device. The first session does not support the other one of user access for retrieving first data that are stored within the peripheral memory storage device and user access for modifying a data content of the peripheral memory storage device. During the first session, second user authentication data of the same user is provided and compared to second stored template data. When the comparison is indicative of a match, a second session is provided, which does support the other one of user access for retrieving first data that are stored within the peripheral memory storage device and user access for modifying the data content of the peripheral memory storage device. | 07-22-2010 |
20100192219 | TEMPORALLY SYNCHRONIZED VIDEO DISPLAY UNIT SCREENSAVER OR WALLPAPER BASED ON USER PREFERENCES - A method of generating an audiovisual object such as a wallpaper or screensaver keyed to a user's preferences, local time, and location, comprising: collecting a set of user preferences for a user; providing a metadata stream associated with an audiovisual input; comparing elements within the metadata stream with the set of user preferences to form a comparison; and outputting an audiovisual object to the user's video display unit if the comparison indicates that the metadata stream matches one or more elements of the set of user preferences. User preferences may be collected from user habits based on metadata streams associated with the audiovisual input, or may be directly input by the user. The methods above may also be stored on a computer readable medium. | 07-29-2010 |
20100192220 | APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA - The APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA (“SYNONYM”) provides a development and test environment with reduced database storage requirements that uses synthetic data based on anonymized real data. SYNONYM allows the use of sensitive data for testing while protecting such data as required by privacy laws, secrecy laws and company policies. | 07-29-2010 |
20100192221 | System and Method for Automated Data Retrieval Based on Data Placed in Clipboard Memory - A data retrieval system and method of the invention provide automatic retrieval of information based on data placed into, for example, a Windows™ clipboard. A user highlights and cuts (or pastes) data into the clipboard during execution of an application program. A data retriever program periodically reads the clipboard to determine whether new data has been placed therein. Upon finding new data in the clipboard, the data retriever program determines whether the data or a variation thereof satisfies a predetermined criterion. If the criterion is satisfied, the data retriever program initiates a data-retrieval operation, such as a Web-based search, based on the data. If the criterion is not satisfied, the data retriever program does not perform any data-retrieval action. The data retrieval program does not interfere with the clipboard; any application program sharing the clipboard can use data placed therein, e.g., by a paste operation. | 07-29-2010 |
20100205667 | Video-Based Privacy Supporting System - Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction between a computer and a user of the computer based on the environment of the computer and the user. For example, the computer-controlled system provided by the invention comprises an input-output device including an image sensor configured to collect facial recognition data proximate to the computer. The system also includes a user security parameter database encoding security parameters associated with the user; the database is also configured to communicate with the security processor. The security processor is configured to receive the facial recognition data and the security parameters associated with the user, and is further configured to at least partially control the operation of the data input device and the data output device in response to the facial recognition data and the security parameters associated with the user. | 08-12-2010 |
20100212008 | Identification Security Elevation - Security elevation techniques are described. In an implementation, a request is received for additional security access beyond that which is currently specified for a program. An identity that describes the program is checked with a plurality of conditions. The security level is automatically elevated to grant the additional security access when the identity corresponds to one of the conditions that indicates that the security level is to be automatically elevated. | 08-19-2010 |
20100212009 | Multi-Method Emergency Access - A method or system for providing multiple fallback authentication options via self-service, also known as emergency access, for users to access PC or network systems when their primary authentication method has been lost, blocked or otherwise unavailable. | 08-19-2010 |
20100218249 | AUTHENTICATION VIA A DEVICE - The claimed subject matter provides a system and/or a method that facilitates authentication of a user in a surface computing environment. A device or authentication object can be carried by a user and employed to retain authentication information. An authentication component can obtain the authentication information from the device and analyze the information to verify an identity of the user. A touch input component can ascertain if a touch input is authentication by associating touch input with the user. In addition, authentication information can be employed to establish a secure communications channel for transfer of user data. | 08-26-2010 |
20100223667 | APPARATUS, SYSTEM, AND METHOD FOR START-UP AUTHENTICATION - An apparatus, system, and method are disclosed for start-up authentication. A prompt module prompts for a hardware password and authentication data on a single display screen. The authentication data comprises a user password. The user password is distinct from the hardware password. A store module stores the authentication data in a target storage space. In addition, the store module stores a pointer to the target storage space in a system register. A retrieve module retrieves the authentication data from the target storage space using the pointer. An authentication module automatically authenticates a user with the authentication data. | 09-02-2010 |
20100235905 | REALIZATION OF ACCESS CONTROL CONDITIONS AS BOOLEAN EXPRESSIONS IN CREDENTIAL AUTHENTICATIONS - A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may contain a Boolean expression including one or more Boolean conditions. If an appropriate group of credentials are presented to a reader such that the Boolean expression is satisfied, then the group of credentials and the holders thereof are allowed access to a protected asset. | 09-16-2010 |
20100251359 | USER-DEFINED MULTIPLE INPUT MODE AUTHENTICATION - A user can define two or more input modes with respective input values to establish an authentication protocol to unlock a computer or govern other computer behavior. As an example, the user may first establish a particular voice recognition pattern followed by a particular image recognition and subsequent logons can be accomplished only by speaking the voice recognition pattern into the device and then by presenting the commanded image, such as an image of the use's face, to the device. | 09-30-2010 |
20100251360 | ACCESSING A PROCESSING DEVICE - The invention relates to a method of controlling access to a processing device using an access token with a machine readable identity. The method comprises reading the identity of the access token at the location of the processing device and querying a database comprising valid identities of access tokens, wherein each identity is associated with an access permission level. If the identity is a valid identity, the method further comprises determining the associated level of access and allowing a level of access to the processing device according to the associated access permission level. In some embodiments, the processing device is an Automated Teller Machine (ATM). | 09-30-2010 |
20100251361 | SYSTEM AND METHOD OF MANAGING SECURITY BETWEEN A PORTABLE COMPUTING DEVICE AND A PORTABLE COMPUTING DEVICE DOCKING STATION - A method of managing portable communication device (PCD) and PCD docking station security is disclosed and may include determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station, initiating a back-end security call when the PCD is not mated with the PCD docking station, querying a user for a primary access code, and determining whether the primary access code is correct. The method may also include terminating the back-end security call when the access code is correct and providing limiting access to PCD content items and applications via the PCD docking station. | 09-30-2010 |
20100275257 | ELECTRONIC DEVICE - According to one embodiment, an electronic device includes a receiver, a selector, a converter, and an authentication module. The receiver receives data on a password input through a keyboard. The selector selects one of key layouts of different keyboards. The converter converts the data on the password received through the keyboard to a password character string according to the one of the key layouts. The authentication module determines that the password is authenticated when information based on the password character string obtained by the converter for the one of the key layouts matches information based on a registered password character string. | 10-28-2010 |
20100275258 | METHOD AND APPARATUS FOR PROCESSING BIOMETRIC INFORMATION - A biometric-information processing apparatus and method including storing sample biometric information of a user each time biometric authentication processing for verifying sample biometric information of a user against enrolled biometric information registered in a first storage unit succeeds, where the user's sample biometric information is stored in a second storage unit, and selecting an update-candidate biometric information for updating the user's enrolled biometric information from the user's sample biometric information stored in the second storage unit, based on a result of verification of multiple pieces of the user's sample biometric information stored in the second storage unit against enrolled biometric information of other users. | 10-28-2010 |
20100275259 | METHOD AND SYSTEM FOR CREATING AND OPERATING BIOMETRICALLY ENABLED MULTI-PURPOSE CREDENTIAL MANAGEMENT DEVICES - A method and system used to integrate and control multiple secure credentialing approaches including magnetic stripes, bar codes, contact and contactless SmartCard chips, Short Message Systems (SMS), Global Positioning Systems (GPS), vicinity type Radio Frequency Identification Devices (RFID), and proximity type RFID, into compact, self-powered, biometrically-protected devices. | 10-28-2010 |
20100287610 | METHOD FOR PROTECTING THE ACCESS TO AN ELECTRONIC OBJECT CONNECTED TO A COMPUTER - An electronic object carries out at least one operation on one element of an application installed in a computer. The method includes transmitting a random value of the electronic object to the computer, when such operation is completed, while maintaining in the electronic object the right of access to the electronic object by the user; storing the random value in the computer; giving access to the electronic object by the application and, in the case of a new access to the electronic object by the application; transmitting the random values stored in the computer to the electronic object; comparing, in the electronic object, the random value received from the computer with the random value previously transmitted to the computer; and, in case the random values are matching, re-establishing the previously acquired rights in the electronic object and thereby giving the application the access to the electronic object. | 11-11-2010 |
20100299747 | IDENTITY VERIFICATION IN VIRTUAL WORLDS USING ENCODED DATA - An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted. | 11-25-2010 |
20100299748 | METHOD FOR ALTERATION OF INTEGRITY PROTECTED DATA IN A DEVICE, COMPUTER PROGRAM PRODUCT AND DEVICE IMPLEMENTING THE METHOD - The invention relates to a method for enabling modifications of integrity protected data, such as SIM lock settings, in a device. The method comprises: in a device, creating a data entity containing signed change information about allowable alterations, the change information being bound to the device, a certificate with a public key corresponding to the private key used to sign the change information; accessing the device and requesting alteration; verifying the requested alteration against the data entity; and if the verification succeeds, performing the requested alteration. By centrally preparing dedicated replacement devices, which locally can be altered in a simple and secure way, without compromising sensitive information or data, a more secure handling of alteration is achieved. Also, the invention relates to a corresponding computer program product and a device implementing the method. | 11-25-2010 |
20100299749 | Secure Booting System And Method - In a method for securing and disabling an electronic device, the electronic device automatically executes a basic input/output system (BIOS) component of a security and tracking service during boot up. The BIOS component automatically determines whether an application component of the security and tracking service has requested disabling of the electronic device. In response to a determination that the application component has requested disabling of the electronic device, the BIOS component automatically displays system information and unlock key. The BIOS component also automatically prompts a user of the electronic device to enter an activation password to re-enable the electronic device. Other embodiments are described and claimed. | 11-25-2010 |
20100306841 | SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state is provided. The method includes: displaying a security access interface on a display unit, wherein the security access interface comprises a first image input field and a second image input field; selecting one first image and at least one second image; moving the at least one selected second image to the selected first image; recording at least one property in relation to the selected first image and the at least one selected second image; generating an input password according to at least one of the at least one recorded property; determining whether the input password matches a predetermined password; and granting access if the input password matches the predetermined password. A related security system is also provided. | 12-02-2010 |
20100306842 | Information Processing Apparatus Capable of Authentication Processing Achieving Both of User Convenience and Security, Method of Controlling Information Processing Apparatus, and Recording Medium Recording Program for Controlling Information Processing Apparatus - Whether a log-in button has been pressed or not is determined. When it is determined that the log-in button has been pressed, an ID selection screen is displayed. Whether an ID has been selected or not is determined. When it is determined that an ID has been selected, whether a secure printing job is present or not is determined. Thereafter, whether password matching is successfully achieved or not is determined. Thereafter, whether a password image function is ON or not is determined. Then, when it is determined that password matching was successfully achieved and a password image authentication function is ON, password image authentication is carried out. | 12-02-2010 |
20100325721 | IMAGE-BASED UNLOCK FUNCTIONALITY ON A COMPUTING DEVICE - Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are defined and thereafter identified and presented to a user via a touch screen. A user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device. In an embodiment, in addition to the specified sequence of selections, a movement or sequence of movements may be also be stored as part of the lock/unlock code. | 12-23-2010 |
20100325722 | INFORMATION PROCESSING APPARATUS INCLUDING LOCKING FUNCTION, LOCKING (UNLOCKING) METHOD FOR INFORMATION PROCESSING APPARATUS AND PROGRAM THEREOF - The present invention provides an information processing apparatus capable of dynamically changing a security level according to significance of overall data saved in a terminal. A portable telephone terminal 100 includes a lock function to inhibit (allow) use of predetermined functions (part of or all of the functions) of the terminal when a lock-in condition (an unlock condition) is satisfied. The terminal 100 includes a secret level evaluating section 16 for calculating a secret level of the overall apparatus on the basis of scores set respectively to saved data items and a lock-in condition setting section 15 for making, in response to the secret level, the lock-in condition (unlock condition) more mitigated or more severe. Due to the configuration, for example, when significant data is received, the secret level of the overall terminal increases and the lock-in condition (unlock condition) is made more mitigated (more severe). | 12-23-2010 |
20100333196 | Systems for Controlling Access to Locked Content Contained in a Recording Medium - A communication apparatus located remotely from an individual entering into communication with said apparatus, comprises a module for: receiving a key signal uniquely representative of an individual at a remote communication apparatus; further receiving a signal representative of a specific recording medium; determining a signal representative of one or more personal identification characters based on said key signal and said recording medium signal; and transmitting said signal representative of said personal identification characters. | 12-30-2010 |
20100333197 | SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state includes: displaying a security access interface, wherein the security access interface comprises a graphical region, the graphical region is filled with a plurality of colors; selecting at least one color in the graphical region; at least recording at least one color property according to the at least one selected color; generating an input password at least according to the at least one recorded color property; determining whether the input password matches a predetermined password; and granting access if the input password matches with the predetermined password. A related security system is also provided. | 12-30-2010 |
20100333198 | AUTHENTICATION METHOD AND INPUT DEVICE - An authentication method and an input device are provided in which a password which a user has inputted in person can be easily reproduced, and it is unlikely for a password leak to occur even when peeped at. An authentication password includes position identification information disposed in an arbitrary position in an input section of an input device. Position identification information corresponding to a first indicated position of an input trajectory inputted from the input section is acquired. Based on the input trajectory, trajectory information representing repetitions of the trajectory from the first indicated position and movement information representing a movement direction with respect to the first indicated position are calculated. The acquired position identification information, and the calculated trajectory information and movement information are compared with preset setting information, and whether they correspond to the setting information is determined, thereby the authentication is carried out. | 12-30-2010 |
20110016520 | AUTHENTICATION SYSTEM AND METHODS - A system and methods authenticate sensitive information such as passwords. Password characters are transformed into distorted characters and distorted character groups are generated such that each distorted password character is part of a group. An image is created containing the groups and the password or other sensitive information is authenticated when groups are identified within the image that contain the password characters in an expected sequence. | 01-20-2011 |
20110016521 | INFORMATION PROCESSING METHOD, COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING APPARATUS - According to an aspect of the invention, a computer readable medium stores a program causing a computer to perform a process. In the program, the process includes receiving an instruction from a user, determining a rule based on a strength of authentication information of the user, and executing information processing according to the received instruction and the determined rule. | 01-20-2011 |
20110023113 | System and method for inhibiting access to a computer - A computer security system which prevents an unauthorized user from accessing the computer system when an authorized user has already logged onto the computer system and has temporarily left the workstation. The computer security system generally includes a sensor which is configured to detect the presence of a person in the region around a workstation and a processing unit which logs out of the computer when a person is no longer present in the region. An optional calibration tool may be provided to set the sensitivity of the sensor and prevent accidental logging out when the authorized user is still present in the region around the workstation. | 01-27-2011 |
20110030052 | COMPUTER PROGRAM FOR SECURELY VIEWING A FILE - A method for distributing a password protected content file without revealing the password to a recipient. An unlocking program that has access to at least one password corresponding to the password protecting the password protected content file is distributed to the recipient's computer. The password protected content file is distributed to the recipient's computer wherein upon activation of the unlocking program, the unlocking program automatically supplies the at least one password upon loading of the password protected content file. | 02-03-2011 |
20110035798 | SYSTEM FOR IDENTIFYING AN INDIVIDUAL, A METHOD FOR IDENTIFYING AN INDIVIDUAL OR A BUSINESS METHOD - An individual may be identified by using a portable communication device. Biological information of the user is input into the communication device. The inputted biological information of the user is checked with reference biological information previously stored in the portable communication device. The portable communication device is connected to the Internet after the inputted biological information of the user and the reference biological information have matched. Then information that the inputted biological information of the user and the reference biological information have matched is transmitted to a server from the portable communication device. | 02-10-2011 |
20110047614 | Permission management system for data accessing and method thereof - The invention discloses a permission management system for data accessing and a method thereof, applicable to operating system. The method of permission management for accessing data comprises the steps of: first, monitoring an unoccupied drive letter in operating system; then, detecting a drive letter request event and actively executing an authorizing procedure to produce an access right of the drive letter; and stop monitoring the drive letter and allowing a user to access data corresponding to the drive letter according to the access right. | 02-24-2011 |
20110047615 | SYSTEMS AND METHODS FOR LOCALLY GENERATING LICENSE AND ACTIVATING DRM AGENT - Systems and methods for locally generating a license and activating a Digital Rights Management (DRM) agent are provided. The system includes a storage device and an electronic device. The storage device includes a DRM treated file, operation information, and a management application. The electronic device activates the management application from the storage device to retrieve information, such as a Unique Identification (UID) or a DRM machine certificate from the electronic device, and generate a license for the electronic device according to the operation information, and the retrieved information of the electronic device. The electronic device activates a DRM agent by providing the DRM treated file and the license to the DRM agent for playing back the DRM treated file based on the license. The management application may set the license expired after the DRM treated file is played back on the electronic device. | 02-24-2011 |
20110047616 | INFORMATION PROCESSING APPARATUS AND ACCESS METHOD - An information processing apparatus configured to control authority, the apparatus including a log-in-sequence storage configured to store a log-in ID used to log in the apparatus and a search user ID that is searched for when the apparatus is logged in using the log-in ID in association with each other; a log-in processor configured to accept a log-in ID, and if a search user ID associated with the log-in ID is present in the log-in-sequence storage, to receive the search user ID from an authentication device in the vicinity of the information processing apparatus; and an operation-state reproducer configured to output the screen of an operation state corresponding to the log-in ID received by the log-in processor and the received search user ID with reference to a cooperation-history information table in which log-in IDs and search user IDs are recorded in association with operation states. | 02-24-2011 |
20110067097 | PLATFORM SECURITY APPARATUS AND METHOD THEREOF - A platform security apparatus and a method thereof are capable of protecting a mobile communication terminal from an abnormal or unintended operation of an application program installed over a platform of the mobile communication terminal. An authentication key is created with respect to each function of an application program, and the authentication key and an identifier of the application program are associated with each other and stored. An authentication process is performed by comparing an authentication key and an identifier of an application program registered as function parameters with an authentication key and an identifier of the application program which have been stored, when the application program calls the function. | 03-17-2011 |
20110072511 | SYSTEMS AND METHODS FOR SUPPORTING PRE-BOOT LOG IN - In one embodiment, a system and method for supporting pre-boot log in pertain to receiving a password selected by a user for use in a pre-boot log in, determining whether the password can be entered by the user prior to completion of booting of the computer system, and if the password cannot be entered by the user prior to completion of the booting, signaling that the password is unacceptable. | 03-24-2011 |
20110078787 | METHOD AND SYSTEM FOR PROVISIONING PORTABLE DESKTOPS - A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data file relating to an image for being stored within the peripheral portable desktop device is provided. The image includes secured data that is other than accessible absent user authorization data of a virtual user. Within the peripheral portable desktop device is stored data reflective of the image. A first user is then authorized to the peripheral portable desktop device by providing first user authorization data. For the first user is created a user account secured based on the first user authorization data. The account of the virtual user is accessed via the user account and the user account is configured to access the account of the virtual user upon access to the user account. | 03-31-2011 |
20110078788 | Electronic Device and Authentication Method of Electronic Device - An authentication method of an electronic device is disclosed. A plurality of key inputs is received from a user via activation of input keys. At least one key input from the key inputs is validated based on a predefined criterion to obtain a password. The password is compared to a registered password to obtain an authenticated password. | 03-31-2011 |
20110083177 | SOFTWARE LICENSE MANAGEMENT - Disclosed is a system and method for automatically managing software licenses that are specifically tied to end users. A repository located on an authentication and license checking server contains the license requirements needed for each application. The repository is searched to determine which license(s) the requester needs to get access to an application. A user authentication is combined with a license checking at the server to grant or deny access to the application. A procurement license server may also be coupled to the license authentication and checking server to order any missing license(s). | 04-07-2011 |
20110088090 | ENHANCEMENTS TO CLAIMS BASED DIGITAL IDENTITIES - A system and method of identifying a user to a digital system is disclosed. The method includes receiving a request for a value of an identification claim of a digital identity from a relying party, allowing a user to select the digital identity via an identification selector, querying an identification provider for the value of the identification claim, and providing the value of the identification claim to the relying party. | 04-14-2011 |
20110093949 | SYSTEM AND METHOD FOR USING SYMBOL COMMAND LANGUAGE WITHIN A COMMUNICATIONS NETWORK VIA SMS OR INTERNET COMMUNICATIONS PROTOCOLS - A system and method for generating actions utilizing predefined commands within a communications network comprises predefined commands called symbol commands. These are character strings entered into a platform during an internet or SMS communications protocol session. The method and system can be used via the internet or a GSM network and is well-suited for mobile use. In addition, utilization of keywords and alpha-numeric or other character symbols to form symbol commands allows for complex command structuring. A search process is used in combination with a symbol command and a symbol command directory to identify specific goods and services, or related symbol commands. In addition, a platform performs specific predetermined actions in response to the symbol command such as making product purchases or providing services such as location-based services, coupon delivery or travel ticketing. The symbol command structure and platform will also utilize identification information associated with an individual user. Furthermore, the platform may implement a response using location information associated with the user from the country code, area code or prefix code of a user's telephone number, or use GPS location information associated with the user's internet device. The symbol command system and method provide an improved form of access to products and services via the internet or SMS. | 04-21-2011 |
20110107415 | PORTABLE COMPUTING DEVICE AND HEADSET INTERFACE - A method of authenticating the interoperability of a headset and a device, as well as a headset and a device, is provided. The method includes, in a headset, monitoring at least one input for a verification signal, and, in response to failing to detect the verification signal within a predetermined period of time, selectively disabling a speaker and/or microphone of the headset. An alternative method includes, in a device, detecting a coupling of a headset to the device, transmitting a verification signal to the headset, and receiving, from the headset, at least one of a serial number associated with the headset, an identification of a user of the headset, a security certificate, or a voice translation template associated with the user. | 05-05-2011 |
20110107416 | PORTABLE DEVICE HAVING BIOMETRICS-BASED AUTHENTICATION CAPABILITIES - Apparatus and method for implementing biometrics-based authentication. In a preferred embodiment, the present invention is embodied in a portable device. Specifically, in one embodiment, the portable device includes a microprocessor, a non-volatile memory coupled thereto, and a biometrics-based authentication module controlled by the microprocessor. Preferably, the biometrics technology used is fingerprint authentication technology. The authentication module is capable of registering a fingerprint upon first use of the portable device, storing an encoded version of the fingerprint in the non-volatile memory. Subsequently, the authentication module can read a person's fingerprint and reliably determine whether the fingerprint matches the registered fingerprint stored in the non-volatile memory. If a match is found, access to information in the non-volatile memory is granted to that person; otherwise, access is denied. Embodiments of the present invention thus provide a highly convenient, secured and reliable method and system for user authentication and access control which was not achievable in prior art password-based authentication approaches. | 05-05-2011 |
20110113484 | UNIFIED SYSTEM INTERFACE FOR AUTHENTICATION AND AUTHORIZATION - A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication. | 05-12-2011 |
20110113485 | CREDENTIAL DEVICE PAIRING - In one or more implementations, a computing device receives an indication that a device is attempting to pair with the computing device. If a user is not currently authenticated with respect to the computing device, inputs received by the device are restricted from being used by the computing device for uses other than authenticating the user. | 05-12-2011 |
20110113486 | Credentialing User Interface for Gadget Application Access - An approach is provided to receive a selection of a displayed window from a group of displayed windows that are visible on a display. The displayed window corresponds to a software application and the displayed window is displayed at a location on the display. Another displayed window is shown visually animating and forming from the first displayed window. An authentication input dialog is displayed on the second displayed window, with the displayed authentication input dialog corresponding to the software application. Authentication data is received at the authentication input dialog and is authenticated. | 05-12-2011 |
20110113487 | ICON CARD VERIFICATION SYSTEM - An identity verification system uses a master key formed of first and second sets of symbols arranged in a one to one relationship. A distinct public key is assigned to each user of a plurality of users. A unique private key is established for each user and formed of at least some of the first symbols in the first set. The symbols of the private key for a user are placed in an arrangement where each first symbol is distinctly identifiable by a location. The first symbols in the arrangement are translated to a visual corresponding second symbol from the master key. Upon receiving the public key of one user, an identity validation challenge formed of at least two locations of the second symbols in the arrangement is presented to the user. The identity of the user is validated upon receiving the correct second symbols corresponding to the challenge locations. | 05-12-2011 |
20110119759 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 05-19-2011 |
20110126280 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus according to the present invention includes a biometric authentication unit that authenticates one piece of biometric information based on registered biometric information, wherein the one piece of biometric information is image information unique to a living body, and a plurality of pieces of user information are associated with the one piece of biometric information, and the registered biometric information is biometric information registered in advance, and a login processing unit that selects, based on user specification information for specifying user information used for login processing, one of the plurality of pieces of user information associated with the biometric information successfully authenticated by the biometric authentication unit so that the login processing unit uses the selected one of the plurality of pieces of user information to perform the login processing. | 05-26-2011 |
20110131649 | Method and apparatus of securing data in a portable flash memory - A method and apparatus of securing data stored in a memory of a portable memory storage device are disclosed. One example may include activating an authentication detection component of the portable memory storage device, and verifying an authentication key via the authentication detection component of the portable memory storage device. Once the authentication is complete, additional operations may include interfacing the portable memory storage device with a computing device and accessing data stored in the memory device. Upon ending the access operation, the discontinuing of the interfacing of the memory storage device with the computing device will automatically lock the memory storage device after a predetermined time has passed. | 06-02-2011 |
20110138459 | TERMINAL AND METHOD FOR CONTROLLING THEREOF - Disclosed are a terminal and a method for controlling thereof that load a user authorization function in a terminal such as a remote controller that remotely controls an external display apparatus such as a TV, etc. and allow only users who accept user authorization to use the display apparatus. | 06-09-2011 |
20110145913 | Project Management - Methods, systems, and computer program products for project management. A method embodiment for project management includes accepting a designation of disparate enterprise data from disparate sources in an enterprise system as plan data for a project. The disparate enterprise data is governed by business rules in the enterprise system. The method also includes dynamically aggregating the plan data from the disparate data sources; presenting the aggregated plan data in a project management interface; accepting a manipulation of a portion of the aggregated plan data; enforcing business rules on the aggregated plan data in the project management interface; and committing the manipulated aggregated plan data back to the datasources. | 06-16-2011 |
20110145914 | MOTHERBOARD AND METHOD FOR MANAGING USE OF COMPUTER - A system and method for managing use of a computer determines if a first system time of the computer is in one of the preset available time segments when the computer is powered on, and logs into the operating system of the computer if the first system time is in one of the available time segments. The system and method further determines if a second system time is in one of preset unavailable time segments if a time interval elapses after logging into the operating system, and shuts down the power of the computer if the second system time is in one of the unavailable time segments. | 06-16-2011 |
20110145915 | METHOD FOR MANAGING AUTHENTICATION PROCEDURES FOR A USER - A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application. | 06-16-2011 |
20110145916 | METHODS AND SYSTEMS FOR PREVENTING ACCESS TO DISPLAY GRAPHICS GENERATED BY A TRUSTED VIRTUAL MACHINE - The methods and systems described herein provide for preventing a non-trusted virtual machine from reading the graphical output of a trusted virtual machine. A graphics manager receives a request from a trusted virtual machine to render graphical data using a graphics processing unit. The graphics manager assigns, to the trusted virtual machine, a secure section of a memory of the graphics processing unit. The graphics manager renders graphics from the trusted virtual machine graphical data to the secure section of the graphics processing unit memory. The graphics manager receives a request from a non-trusted virtual machine to read graphics rendered from the trusted virtual machine graphical data and stored in the secure section of the graphics processing unit memory, and prevents the non-trusted virtual machine from reading the trusted virtual machine rendered graphics stored in the secure section of the graphics processing unit memory. | 06-16-2011 |
20110154481 | SECURE AUTHENTICATION AT A SELF-SERVICE TERMINAL - A method of providing secure authentication of a service user at a self-service terminal is described. The method comprises: detecting attempted access by the service user to a restricted function on the self-service terminal and ascertaining if a predefined operating system account is present on the terminal. In the event that the predefined operating system account is not present, then the method comprises permitting access to the restricted function by the service user. In the event that the predefined operating system account is present, then the method comprises requesting the service user to provide login credentials and authenticating the login credentials using the operating system account. If the login credentials are not authenticated, access to the restricted function is denied; whereas, if the login credentials are authenticated, access to the restricted function is permitted. | 06-23-2011 |
20110154482 | USER AUTHENTICATION - An apparatus lets a user to determine a pool of images and then forms from the pool of images a set of images for user authentication and divides the set of images into two mutually exclusive subsets: a key image subset comprising images referred to as key images and a decoy image subset comprising images referred to as decoy images. The apparatus displays the key images to the user to teach the key images to the user. Then, to authenticate the user, the apparatus produces an assortment of decoy images and key images, and displays the assortment to the user. The apparatus receives from the user identification of images held as key images and verifies whether the identification of key images matched with the key images selected by the processor. | 06-23-2011 |
20110154483 | ELECTRONIC DEVICE WITH PASSWORD PROTECTION FUNCTION AND METHOD THEREOF - An electronic device with a password protection function is provided. The electronic device provides a password input area, which includes a number of sub-areas. Each of the sub-areas is designated a distinctive attribute, and is provided for inputting a single character. The characters and the attributes of the sub-areas are used to generate a login password according to a predetermined rule, thus the security of the login password is strengthened. | 06-23-2011 |
20110154484 | INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING AUTHENTICATION PROCESS, AND RECORDING MEDIUM - An information processing apparatus includes, a determining unit to determine whether a boot trigger of a boot is power recovery, a memory to store count information indicating a skip count, a booting unit to skip an authentication process depending on a result of a determination by the determining unit and the count information to continue the boot; and an updating unit to update the count information when the authentication process is skipped. | 06-23-2011 |
20110154485 | AUTHENTICATION APPARATUS USING HUMAN BODY COMMUNICATION, PORTABLE DEVICE HAVING AUTHENTICATION FUNCTION USING HUMAN BODY COMMUNICATION, AND AUTHENTICATION METHOD USING HUMAN BODY COMMUNICATION - Disclosed are an authentication apparatus using human body communication capable of improving the security and convenience of user authentication by using human body communication, a portable device having authentication function using human body communication, and an authentication method using human body communication. In the authentication method using human body communication, an authentication device acquires user biometric information and provides the acquired biometric information to a portable device by using human body communication. The portable device then compares the acquired biometric information with previously stored biometric information, and when the acquired biometric information and the previously stored biometric information are identical, the portable provides authentication information to the authentication device. Upon receiving the authentication information, the authentication device performs an authentication procedure based on the authentication information. Thus, security and user convenience can be improved, and an authentication can be quickly performed. | 06-23-2011 |
20110154486 | METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information. | 06-23-2011 |
20110162067 | Cognitive-based loon process for computing device - A method of user logon to a computing device or computer system that, distinct from requiring entry of a set of known logon credentials such as a username and password, introduces an additional thought-directed user interface whereby the user must respond to one or more prompts that measure the user's cognitive function at the time of logon or during an active logon session. The user's responses to these prompts are evaluated for several purposes, including determining whether the user demonstrates the required level of cognitive function to gain access to the computer system or continue an active logon session. The user's responses and associated data may also be stored and retrieved at a later time for various purposes, including determining whether and to what extent the user's level of cognitive function is improving, diminishing, or remaining static over time. | 06-30-2011 |
20110162068 | Authentication apparatus - An authentication apparatus performs local and global corrections on image data. Local correction uses the shape of a local line indicated by line information contained in a neighboring region on image data whose feature value extracted from the shape of a line is used for authentication. Global correction uses the shape of a global line indicated by line information contained in a region larger than the neighboring region. The authentication apparatus calculates the difference between line information contained in image data corrected by local correction and line information contained in image data corrected by global correction and compares the difference with a threshold. If the difference is less than the threshold, the authentication apparatus outputs, as line information contained in image data, line information corrected by local correction and, if the difference is greater, it outputs, as line information contained in image data, line information corrected by global correction. | 06-30-2011 |
20110167489 | Apparatus and Method for Securing Data on a Portable Storage Device - A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device under a user password, the microprocessor also operable to exclude access to the secure user data area unless the user password is provided. | 07-07-2011 |
20110173693 | Assessment and analysis of software security flaws - Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports. | 07-14-2011 |
20110202994 | BIOMETRIC SENSOR FOR HUMAN PRESENCE DETECTION AND ASSOCIATED METHODS - An electronic device may include a communications interface, a user prompting device, a biometric sensor, and a controller. The controller may perform biometric spoof detection with the biometric sensor, and receive a request for human presence verification from a remote device via the communications interface. The controller may also prompt the user for a verification action using the sensor based upon receiving the request, and determine that the user has completed the verification action in response to the prompting and based upon the biometric spoof detection. The controller may further send a response to the remote device via the communications interface and based upon determining that the user has completed the verification action. The controller may send a notification to the remote device that there is a biometric sensor. | 08-18-2011 |
20110247066 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING AND AUTHORIZING AN EXTERNAL ENTITY - In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc. | 10-06-2011 |
20110247067 | DISPLAY APPARATUS, AUTHENTICATION METHOD, AND PROGRAM - A display apparatus includes an input section that inputs input information representing an input operation from an operation means contacting a touch screen, a display section that refers to an authentication table correlating the input operation with a display image so as to display the display image on the touch screen, and an authentication processing section that refers to the authentication table so as to determine whether or not a combination of a display image displayed on the touch screen and an input operation represented by the input information input by the input section in a state where the display image is being displayed is correlated in the authentication table, and authenticates an input action by the input operation when the combination is correlated in the authentication table. | 10-06-2011 |
20110265175 | GRAPHICAL USER INTERFACE TESTER - A method including accessing a test case that tests one or more user interfaces associated with another device, wherein the test case is defined in a spreadsheet; interpreting the test case; executing the test case with respect to the one or more user interfaces associated the other device; and outputting a test result. | 10-27-2011 |
20110265176 | System and Method for Creating Conditional Immutable Objects in a Storage Device - A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the storage device, receives a request for the object, determines if the request includes the key, and, if the request has authorization information, permits access to the object. The data handler receives another request for the object, determines if the request includes the key, and, if the request does not have the authorization information, denies access to the object. | 10-27-2011 |
20110265177 | SEARCH RESULT PRESENTATION - A data presentation system for a search engine may use classified or tagged elements in a resulting document to create a search result document that has portions redacted, modified, or changed based on the tags or classifications of elements within the document. The document may be rebuilt from the search engine database at presentation time with one or more elements changed or modified. The permission settings for a user or other factors may be used to determine which elements within the document are permitted to be accessed. | 10-27-2011 |
20110265178 | Method and Device for Authenticating a User With the Aid of Biometric Data - Authentication system comprising an input device comprising a plurality of input elements configured for inputting respectively characters in response to an input of a sequence of at least one character carried out by a user, the input device comprising at least one determination means coupled to at least one input element in order to determine a force exerted on the said at least one input element, the system comprising a recording means for recording a series of at least one force exerted on the said at least one input element, a memory configured for storing a series of at least one reference force, and comparison means configured for comparing the series of at least one exerted force with the series of at least one reference force. | 10-27-2011 |
20110283354 | Multi-Touch Interfaces for User Authentication, Partitioning, and External Device Control - Multi-touch interfaces allow user interaction with multiple points of contact to control external devices such as game consoles, authenticate users, partition the interface for multiple users, and so forth. The multi-touch interface may provide graphical representations that are manipulated by users through multiple points of contact to participate in games running on an external game console. Additionally, user authentication may occur through multiple points of contact with the multi-touch interface where each user has a unique contact pattern that includes points of contact, location of points of contact, rhythm of points of contact, and so forth. The graphical representations may be customized based on the authentication of a user, and the multi-touch surface may be partitioned based on the number of users present. | 11-17-2011 |
20110296521 | METHOD AND TOKEN FOR MANAGING ONE PROCESSING RELATING TO AN APPLICATION SUPPORTED OR TO BE SUPPORTED BY A TOKEN - The invention relates to a method 30 for managing at least one processing relating to an application supported or to be supported by a token. The token comprises means for processing data, means for storing data and means for communicating with outside. | 12-01-2011 |
20110302649 | SYSTEM FOR AND METHOD OF PROVIDING SECURE SIGN-IN ON A TOUCH SCREEN DEVICE - A system for and method of providing secure sign-in on a touch screen device that comprises an electronic device in accordance with exemplary embodiments may include receiving, from a user, password data in a first input format, determining that the password data is associated with a valid user by at least comparing the first input format of the password data to a second input format and comparing the password data to valid character element data, wherein the second input format is derived in accordance with one or more password format rules, and providing the valid user with access to one or more functions of the touch screen device. | 12-08-2011 |
20110314538 | Computing System Providing Normal Security and High Security Services - A computing system and method providing normal security services and high security services are disclosed. The computing system includes hardware resources, a processor core and an access right checker. The hardware resources are grouped into resource security levels. The processor, switching between a normal security and a high security state, assigns a user access right to a request. In comparison with the normal security state, user access right assigned in the high security state further allows the request to use the hardware resources of a higher resource security level. According to the assigned user access right and the resource security levels of required hardware resources of the request, the access right checker determines whether the request has the authority to use the hardware resources, and thereby, the access right checker executes the request or responds the issued request with an exception. | 12-22-2011 |
20110321156 | Privacy Tool - The present invention provides a method and system for hiding private activities on logged on computing devices of all types. Its countermeasures help users inconspicuously block snoops manually or automatically by moving from sub-profiles displaying sensitive data to sub-profiles displaying non-sensitive data, or even no data at all. | 12-29-2011 |
20110321157 | SYSTEM AND METHOD FOR USER AUTHENTICATION - A system and a related method are disclosed for authenticating a user of an electronic system. The system, and related method access (a) data relating to a defined interaction with an input device for a purported authorized user, (b) a probability distribution representation for the defined interaction for an authorized user, and (c) a probability distribution representation for the defined interaction for a wide population, from which it can determine value indicative of whether the purported authorized user is the authorized user. The purported authorized user can be authenticated as the authorized user, if the value satisfies a prescribed threshold. | 12-29-2011 |
20120011586 | BIOMETRIC AUTHENTICATION DEVICE AND BIOMETRIC AUTHENTICATION METHOD - A biometric authentication device performs authentication of a user based on biometric information. In the biometric authentication device, a registry information storage stores pre-registered biometric information as registry information. An acceptance value determiner determines a verification acceptance value used for authentication, based on quality of the registry information with regard to reliability of characterizing an individual. An authentication information acquirer obtains biometric information of a user as authentication information. A similarity calculator compares the authentication information of the user with the registry information and calculates similarity between the authentication information and the registry information. An authenticator identifies whether the user is a registrant corresponding to the registry information, based on the similarity and the verification acceptance value. | 01-12-2012 |
20120017271 | DOMAIN-AUTHENTICATED CONTROL OF PLATFORM RESOURCES - A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers. | 01-19-2012 |
20120017272 | System and Method of Security Function Activation for a Mobile Electronic Device - A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation. | 01-19-2012 |
20120023574 | Graphical Image Authentication And Security System - A method and system for protection of and secure access to a computer system or computer network. The method includes the steps of receiving a first login account identifier, such as a user name from a user in communication with the computer system or network. A determination is made if the user is recognized and enrolled from the first login account from the first login account identifier. If the user is recognized, a grid of randomly generated visual images is displayed including one visual image from an image category which has been preselected by the user upon enrollment. An image category identifier is randomly assigned to each visual image in the grid. An image category identifier, second login account identifier, such as a password, is entered and received. If the login account identifier and the image category is validated, access is permitted to the computer system or network. | 01-26-2012 |
20120030754 | SECURITY MANAGEMENT SYSTEM, MEDICAL DEVICE AND METHOD FOR MANAGING SECURITY - A security management system, comprising: an authentication unit for authenticating an operator of an operating terminal in order to determine whether the operator is permitted to log in or release a lock; a current operator information inquiry unit for inquiring for login status information and current operator information; an authority information inquiry unit for inquiring for authority information regarding the operator and that regarding the current operator; a lock unit for detecting an event, where a predetermined lock condition is satisfied, in the login status to allow the operating terminal to change to a lock status, and for allowing the operating terminal to change to an operable status in response to a login instruction or an instruction for a release; and a lock control unit for transmitting the instruction for a release to the lock unit when a predetermined condition is satisfied. | 02-02-2012 |
20120030755 | INFORMATION PROCESSING APPARATUS AND SECURITY PROTECTION METHOD - According to one embodiment, an information processing apparatus includes an input module to input a password, a biological authentication device including a storage unit for storing biological information and identification information, and an authentication control module which sets and holds identification information to be stored in the storage unit of the biological authentication device, and permits a password input using the input module to be substituted by authentication using the biological authentication device when the identification information held by itself and the identification information stored in the storage unit of the biological authentication device match. The authentication control module includes a setting module to perform a setting for the identification information stored in the storage unit of the biological identification device and held by itself, on both conditions of authentication establishment with a registered password entry using the input module and authentication establishment using the biological authentication device. | 02-02-2012 |
20120036574 | REMOTE ACCESS ARCHITECTURE ENABLING A CLIENT TO PERFORM AN OPERATION - Enabling a client computer to perform an operation is disclosed. Login information is received from a client computer. The login information is confirmed by querying a trusted agent on the client computer. | 02-09-2012 |
20120042376 | Host Device and Method for Securely Booting the Host Device with Operating System Code Loaded From a Storage Device - A host device and method for securely booting the host device with operating system code loaded from a storage device are provided. In one embodiment, a host device is in communication with a storage device having a private memory area storing boot loader code and a public memory area storing operating system code. The host device instructs the storage device to initiate a boot mode and receives the boot loader code from the storage device. The host device executes the boot loader code which performs a security check and executes the operating system code loaded from the storage device only if the security check is successful. | 02-16-2012 |
20120042377 | PORTABLE DEVICE WITH PASSWORD VERIFICATION FUNCTION AND SYSTEM HAVING THEREOF - A portable device with password verification function includes several input units, a storage unit and a processing unit. The processing unit is electrically connected with the input units and the storage unit. Each of the input units is different from others. Password information is stored in the storage unit. The processing unit includes a receiving module and a password verification module. The receiving module receives several input signals from the input units respectively. The password verification module verifies if the input signals match the password information. | 02-16-2012 |
20120042378 | Login system for a graphical user interface - A user sets a design and uses that to get access to a resource. The design can include lines, and distances of lines, directions and locations. The design can require a user to select a color and can include colors and amounts by which the different entered parts need to overlap. | 02-16-2012 |
20120042379 | SYSTEM AND METHOD FOR DETECTING GENUINE COPIES OF PRE-RECORDED DIGITAL MEDIA - To authenticate a digital medium for a given title, an authentication server selects a number of challenges corresponding to the title from an authentication database, clears an error counter and sends the challenges sequentially to an authentication application in a media reader in which the digital medium is inserted. Upon reception of a response, it is verified if the answer is correct. If this is the case, then the next challenge is sent; otherwise, it is first verified if a correct answer was mandatory and if so, it is deduced that the digital medium is not genuine. If an incorrect may be accepted, then the error counter is incremented and the next challenge is sent. When there are no more challenges to send, it is verified if the error counter is above an acceptable limit. If so, the digital medium is deemed as not genuine. The invention may be used to allow an owner of a digital medium to access further information or content. | 02-16-2012 |
20120060214 | Behavioral Stochastic Authentication (BSA) - Methods and systems for authenticating a user and a consumer electronic device (CED) to a financial services provider (FSP) for purposes of communications initiated from the device and needing security, such as purchases and financial transactions, are provided. The FSP may compile information about a user's behavior from various sources, both public and private, including the CED. The information may be of a stochastic nature, being gathered by sampling user data and behavior at chosen times. The information may include indicators of user behavior—such as the user using the device to check various accounts and web-pages—and data from the device—such as GPS location. Based on the compiled stochastic information, and using a sliding scale, a throttling mechanism, acceptance variation, and pinging information, the FSP can compare current information from the device with what is known about the user and the device to provide a more accurate and reliable authentication process. | 03-08-2012 |
20120060215 | MOBILE TERMINAL AND METHOD FOR PROTECTING ITS SYSTEM DATA - A mobile terminal and a method for protecting system data of the mobile terminal, wherein the critical system data of the mobile terminal is stored into the singlechip with 128-bits ID code, and the method of the public password encryption of the mobile terminal is applied such that the user has to pass the password authentication when the user accesses the data stored in the singlechip, thus protecting important system data of the mobile terminal, thereby protecting the legal right of the mobile terminal manufacturer, avoiding the counterfeit mobile terminal stealing the related technique of the mobile terminal, and prompting the normal development of the mobile terminal market at the same time. | 03-08-2012 |
20120072981 | IMAGE PROCESSING APPARATUS, CONTROLLING METHOD OF IMAGE PROCESSING APPARATUS, AND COMPUTER PROGRAM - In a case where a plurality of users are made correspondent to one IC card, user changeover is performed without a logout process. When the IC card is passed over a card reader while a user is logging in, it is judged whether or not the passed card is the IC card used in a login process of the user who is logging in. If NO, a logout process of the user who is logging in is performed, and a user login process using the newly passed IC card is performed. On the other hand, if YES, it is further judged whether or not the plurality of users are made correspondent to the passed IC card. If YES, selection of the user who intends to newly log in is accepted. | 03-22-2012 |
20120090022 | VIRTUAL REMOVABLE DISK DEVICE FOR REMOVABLE STORAGE MEDIA - A method and apparatus for interfacing a host computer with a hard drive cartridge is disclosed in one embodiment. The virtual device interface is divided between a kernel component in a driver stack of the kernel space and a user component configured to run in user space. The kernel component passes data commands from the operating system to a cartridge dock while separating other commands that are passed to the user component. The user component authenticates the kernel component and/or the hard drive cartridge. Use of the removable hard drive cartridge is also authorized by the user component. | 04-12-2012 |
20120090023 | SECURE AREA FOR APPS - An invention for providing privacy and restricted access to functions available on a computing device. According to one embodiment, an area accessible to a user interface on a computing device is provided. A request from a user of the device is accepted, the request for associating with the area one or more functions available on the device. The one or more functions are then associated with the area, and the one or more functions are made invisible. Another request from the user is accepted, the other request for gaining access to the area. Authentication against the user is requested. Access to the one or more functions is granted if the authentication is successful, and access to the one or more functions is not granted if the authentication is not successful. | 04-12-2012 |
20120096544 | INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM - There are provided an information processing apparatus which provides a user credential sharing service on a user credential sharing condition intended by a vendor that creates an application, and a control method for the information processing apparatus. To accomplish this, the information processing apparatus generates sharing settings which defines a sharing condition for each item of a user credential among applications according to a manifest file acquired from each application. Upon receiving a request of a user credential from one of the applications, the information processing apparatus provides the user credential to the requesting application according to the generated sharing settings. | 04-19-2012 |
20120096545 | METHOD FOR RESTRICTING THE USE OF AN APPLICATION PROGRAM, SYSTEM FOR AUTHENTICATING THE USER OF A MEASURING APPARATUS, AUTHENTICATION SERVER, CLIENT APPARATUS AND STORAGE MEDIUM - A user authentication system is provided with a client apparatus and an authentication server. An application program used for processing the measurement results of the measuring apparatus is installed on the client apparatus. Databases for storing use authority information of the application program are provided on the authentication server. A user inputs authentication information when operating the client apparatus and the application program is started. The client apparatus sends the authentication information to the authentication server, and an authentication process is performed by the authentication server. When authentication is successful, the use authority information of this user is sent from the authentication server to the client apparatus, and the client apparatus sets the application use restrictions according to the use authority information. | 04-19-2012 |
20120110662 | User Indentification with Capacitive Touchscreen - Disclosed herein are various embodiments of means and methods for verifying or authorizing one or more verified or authorized users to operate or use an electronic device containing a capacitive or other type of touchscreen or touch panel. Images are acquired from the touchscreen or touch panel and processed to determine first characteristics corresponding to fingers, hands or hand portions placed thereon. If the first characteristics match stored second characteristics with a sufficient degree of similarity, the user is identified as an authorized or verified user and then permitted to operate or use the electronic device. | 05-03-2012 |
20120110663 | APPARATUS AND METHOD FOR INPUTTING USER PASSWORD - An apparatus for inputting a user password, includes an interface receiving a command. Further, the apparatus for inputting the user password includes a control unit setting a target based on the command from the interface, receiving and storing a password character, and determining that authentication is successes only when the set target and the password character are positioned at a same coordinate on a skin image. Furthermore, the apparatus for inputting the user password includes a display unit connected to the interface to display the skin image of the interface that is transmitted from the control unit. | 05-03-2012 |
20120117643 | SYSTEM AND METHOD FOR LOCKING AND UNLOCKING ACCESS TO AN ELECTRONIC DEVICE - The disclosure relates to a system and method for unlocking and unlocking access to a device. The system comprises: a graphical user interface (GUI) module providing instructions to a microprocessor operating on the electronic device and an access management module providing instructions to the microprocessor. The GUI module provides instructions to generate on a display of the electronic device an interface for entry and modification of a tap pattern used to change an access state of the electronic device; and process inputs from an input device through the interface that select described levels of movement and described locations for expected tap signals for the tap pattern. The access management module provides instructions to receive signals from a monitoring circuit in the electronic device that processes a tap signal received from an accelerometer in the electronic device; and determine whether the tap signal completes a match for the tap pattern. | 05-10-2012 |
20120124663 | STORAGE DEVICE ACCESS AUTHENTICATION UPON RESUMING FROM A STANDBY MODE OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to a storage device. The storage device may include a mechanism that monitors for receipt of cached authentication data from a host computing device upon resuming operation from a standby mode of the host computing device. The storage device may further include a mechanism that unlocks the storage device in response to receipt of the cached authentication data from the host computing device. In addition, the storage device may include a mechanism that monitors for receipt of re-authentication data and a mechanism that locks the storage device when a predetermined period of time has passed since resuming operation from the standby mode without receipt of the re-authentication data. Related computing devices, methods, and machine-readable storage media are also disclosed. | 05-17-2012 |
20120131666 | Virtual Appliance Pre-Boot Authentication - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated. | 05-24-2012 |
20120144477 | PROCESSOR AND SEMICONDUCTOR DEVICE - According to embodiments, a CPU includes an address decoder configured to control input of data from a JTAG I/F and output of data to the JTAG I/F, an authentication unit configured to perform predetermined authentication processing using an entered password and a predetermined key and, if the authentication is successful, output a predetermined authentication signal, and a selector configured to control output of data to be outputted to JTAG I/F according to presence or absence of the predetermined authentication signal. | 06-07-2012 |
20120144478 | IMAGE PROCESSING APPARATUS, PROCESSING FLOW CONTROL METHOD, IMAGE FORMING SYSTEM, AND STORAGE MEDIUM - An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired processing flow. The image processing apparatus including an authentication unit adapted to execute user authentication, and an execution unit adapted to execute processing on image data with a plurality of processes as a sequential processing flow while cooperating a plurality of different functions with one another. Setting data personalized for a user authenticated by the authentication unit is obtained, and the plurality of processes is registered as a sequential processing flow. The processing flow is executed with a part of the processing flow replaced by processing personalized for the user set in the setting data, upon executing the registered processing flow. | 06-07-2012 |
20120151574 | SOFTWARE ACTIVATION USING DIGITAL LICENSES - Systems and methods are provided for activation of software that uses digital licenses. In some embodiments, a software vendor may securely deliver at least one digital proof-of-purchase to an OEM (e.g., to avoid piracy of software licenses). The OEM may install an associated software copy on a computer system, and store the at least one digital proof-of-purchase on it. The OEM may communicate the proof(s)-of-purchase stored on the computer system and its system identifier to the software vendor. A user of the computer system may attempt to activate the OEM pre-installed software by sending an activation request to a software vendor, who may verify whether or not the digital proof-of-purchase and system identifier in the activation request match those previously reported by the OEM, and may either grant or deny the activation request. | 06-14-2012 |
20120151575 | APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL - Provided is an apparatus and method for certificating security in a portable terminal, which can enhance security in the portable terminal by multiple security certifications. An apparatus for certificating security in a portable terminal includes a security certificating unit for performing a plurality of security certification processes through a plurality of security operations performed in the portable terminal, and a control unit for performing a relevant function after completion of the security certification processes through the security operations. | 06-14-2012 |
20120151576 | METHOD AND SYSTEM FOR CREATING AND ACCESSING A SECURE STORAGE AREA IN A NON-VOLATILE MEMORY CARD - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition. | 06-14-2012 |
20120159613 | MULTI-LAYER MULTI-POINT OR RANDOMIZED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response a first point relative to the base image reference point being aligned with a second point relative to the overlay image reference point. | 06-21-2012 |
20120159614 | SIMPLE ALGEBRAIC AND MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. The modified overlay image comprises a plurality of numbers. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, in sequence, with two or more numbers from the overlay image that equal a pre-selected algebraic result when one or more algebraic operator is apply to the numbers. | 06-21-2012 |
20120159615 | MULTI-LAYER MULTI-POINT OR PATHWAY-BASED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after moving through at least one other pre-selected reference point. | 06-21-2012 |
20120159616 | PRESSURE SENSITIVE MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with a computer readable medium and a computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. Positive authentication is indicated in response to alignment of a base image reference point and an overlay image reference point and an indication of a correct level of pressure applied to a pressure sensitive input device. | 06-21-2012 |
20120159617 | HEADSET, METHOD FOR CONTROLLING USAGE OF HEADSET, AND TERMINAL - The present invention provides a headset, a method for controlling usage of the headset and a terminal. The headset includes a memory configured to store an authentication password; and a usage control unit configured to send, after a connection is established between the headset and a terminal, a request of inputting authentication password to the terminal when the headset is in a protected state, receive an authentication password inputted from the terminal, authenticate the received authentication password using the stored authentication password, and control an execution of a predetermined function of the headset based on an authentication result. The present invention protects the headset by limiting the usage right of the headset, so as to reduce the probability of headset loss. | 06-21-2012 |
20120159618 | IMAGE PROCESSING APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE STORAGE MEDIUM FOR COMPUTER PROGRAM - An image processing apparatus performs specific processing on images read out of a document having pages as follows. Each of the pages is a member assigned to at least any one of groups. The apparatus determines a second security level of each group based on a first security level of each page of the corresponding group; before the specific processing on the N-th group, determines whether or not password entry is necessary based on the second security level of the N-th group and any of the second security levels of the first group through the (N−1)-th group; and performs the specific processing on the N-th group if it is determined that password entry is unnecessary for the N-th group, or, alternatively, if it is determined that password entry is necessary for the N-th group and if a password is appropriately entered. | 06-21-2012 |
20120167202 | APPARATUS AND METHOD FOR UNLOCKING A USER EQUIPMENT - An apparatus and method for unlocking a user equipment. The apparatus may include a first input unit, a second input unit, a controller, and a memory. The first input unit may be configured to set up a first password and to receive a first input. The second input unit may be configured to set up a second password and to receive a second input. The controller may be configured to compare the first input with the first password, compare the second input with the second password, and initiate an unlock operation of the user equipment based on a result of the comparisons. The memory may be configured to store at least the first password and the second password. | 06-28-2012 |
20120167203 | MANAGEMENT SYSTEM OF TEST DEVICE AND MANAGEMENT METHOD THEREOF - Assigning identifiers to a plurality of test devices to manage the test devices, and displaying the assigned identifiers on the test devices to distinguish the test devices. | 06-28-2012 |
20120174212 | CONNECTED ACCOUNT PROVIDER FOR MULTIPLE PERSONAL COMPUTERS - A connected account provider system allows a user of multiple electronic devices to set up a user account on one device with the device's settings saved in the cloud for application across different devices. A user can obtain secure access to the saved settings using a second (or subsequent) device and can select settings from the initial device to be synchronized to the second device. The system employs client account provider (CAP) software that can be obtained from an independent software provider and is installed on different devices of a user. The CAP client software creates an architecture on a user's device with a CAP client software layer conceptually separate from the device's operating system software. The CAP client software provides extension points for facilitating connection between connected user devices' operating systems and a cloud services layer typically provided by the CAP client software vendor. | 07-05-2012 |
20120174213 | USER IDENTIFICATION WITH BIOKINEMATIC INPUT - Systems and methods for user identification based on biokinematic input are disclosed herein. The system may include a multi-touch sensitive display including a sensor configured to receive biokinematic input including data representing detected positions of digit touches made by digits of a user, in each of a series of successive time intervals during a defined identification gesture. The system may further include a user identification module executed by a processor of the computing device. The user identification module may be configured to receive the biokinematic input from the sensor, and to compare relative positions of the digit touches and/or relative rates of change in said positions of the digit touches to a stored user template of verified biokinematic data for the user. If a match is determined, an indication that the user has been successfully identified may be displayed. | 07-05-2012 |
20120174214 | ENHANCING BIOMETRIC SECURITY OF A SYSTEM - In one embodiment, a method includes receiving an ordered sequence of biometric inputs from a user via a biometric sensor, determining if each of the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user, and if so, enabling the user to access the processing system, otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed. | 07-05-2012 |
20120174215 | CLIENT-SIDE CAPTCHA CEREMONY FOR USER VERIFICATION - A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system, the facility presents a CAPTCHA challenge requesting verification that the user wants the action performed on the computer system. Upon receiving a response, the facility compares the received response to an expected correct response. If the received response is the correct response, the facility authorizes the action to be performed. | 07-05-2012 |
20120192268 | PASSWORD AUTHENTICATION METHOD - A password authentication method applied to an input recognition device with a touch sensitive screen, the password authentication method comprises defining and displaying at least one image according to the movement of an object touching on a touch sensitive screen, detecting a final position of the at least one image, and judging whether the at least one image and the final position thereof match a predetermined password or not; and if so entering an unlocking mode. | 07-26-2012 |
20120198547 | ENHANCED ORGANIZATION AND AUTOMATIC NAVIGATION OF DISPLAY SCREENS FACILITATING AUTOMATION CONTROL - The disclosed subject matter comprises an enhanced screen organizer component (ESOC) that can efficiently control organization and presentation of desired screens, which relate to an industrial control system, to a user. At design time, a designer employs the ESOC to select and organize one or more screens for a project relating to a control system, create and organize screen folders that can contain desired folders or screens in a hierarchical fashion, select a home screen or favorite screens, respectively, for the operator, role or group, wherein a home screen can be a screen a user views when authenticated into a terminal or the screen the user can be returned to in response to selection of a home control. During run time, the user can access desired screens, and use context menus to select a home screen, favorite screens, or other screens, in accordance with user access rights. | 08-02-2012 |
20120198548 | BLANK SMART CARD DEVICE ISSUANCE SYSTEM - A smart card issuance system and method are disclosed. In a first aspect a method and system for issuing a smart card device (SC) is disclosed. The method and system comprise providing an initialization phase of the SC by a manufacturer and providing an authentication phase of the SC by the manufacturer. The method and system also include deploying the SC, providing a first time authentication phase for a specific customer by the issuer (IS) after the SC is deployed and starting a first phase of the registration process of the SC for the specific customer by the issuer. The method and system further include providing another authentication phase of the SC by IS after the first time authentication; and providing of an authentication of the IS by the SC. When both the SC and IS are mutually authenticated, the IS and the specific customer are allowed to complete the registration process. In a second aspect, a data transmission process and system for a smart card device (SC) of an issuer (IS) is disclosed. The process and system comprises performing a login of the SC by a user and performing a mutual authentication of the SC and the IS. The process and system further includes establishing a session key after mutual authentication is established. The session key is used to encrypt and decrypt data for transmission between the IS and the SC. | 08-02-2012 |
20120204257 | DETECTING FRAUD USING TOUCHSCREEN INTERACTION BEHAVIOR - A processor can receive data indicative of interactions between a user and a touchscreen-equipped electronic device. The processor can compare a behavior pattern in the received data and a behavior pattern in previously stored data contained within a user profile for a human. The processor can generate a score indicative of a likelihood that the behavior pattern in the received data matches the behavior pattern in the previously stored data. Responsive to the generated score being below a threshold, the processor can generate an indication of a possible fraudulent action due to the user having a high likelihood of not being the human. | 08-09-2012 |
20120204258 | PASSWORD INPUT METHOD BASED ON TOUCH SCREEN - Disclosed is a password input method based on a touch screen, including the steps of displaying at least one background scene, generating trace data from a user's touch on the touch screen while the background scene is being displayed, comparing the trace data to password trace data preliminarily stored, and successfully terminating a password admission process if the trace data is identical to the password trace data. In entering a password by a user, even without preparing an additional input unit such as a keypad or keyboard and other similar fixed pictures (by software), this method enables a user to freely select and set a background scene in various types as well as variously forming a touch operation with his own password for admission, providing both security and input convenience of password keys. | 08-09-2012 |
20120204259 | BIOMETRIC AUTHENTICATION APPARATUS - The present invention provides a biometric authentication apparatus capable of evaluating during operation with a scenario the same as during scenario evaluation. A layered structure is employed, with a BSP, a framework including an input-output section and a DB, and an application. The BSP includes a device control section that controls the device, a registration code generating section that generates a registered code from biometric data acquired by the device and stores the registered code in the DB, a matching code generating section that generates a matching code from the biometric data acquired by the device, and a one-to-one matching section that matches the matching code against a registered code read from the DB. The framework includes a registration section that performs registration processing by sending instructions to the device control section and the registration code generating section, and a matching section that performs matching processing by sending instructions to the device control section, the matching code generating section and the one-to-one matching section. | 08-09-2012 |
20120233690 | User-Defined Enablement Protocol - A user interface method is disclosed. For a particular interface, such as a touch input device, the method involves defining an enablement protocol for a function and recording and retaining the enablement protocol of said function, such that a user enables the function by substantially reproducing the enablement protocol in the absence of spatial or temporal indication of at least a portion of the enablement protocol. | 09-13-2012 |
20120240223 | PROCESS AND APPARATUS FOR AUTOMATICALLY IDENTIFYING USER OF CONSUMER ELECTRONICS - A user of a device may be uniquely identified using a metric that is contingent upon the user using the device for its intended purpose without the user having to perform a separate step, function, or operation for the express purpose of identifying the user. Context sensitive content may be provided to or from the device based on the user's patterns of use of the device without requiring the user's personal information. The context sensitive content depends on the user's identity. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. This abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 09-20-2012 |
20120254987 | Pairing and authentication process between a host device and a limited input wireless device - Disclosed is an apparatus and method to perform a pairing process with a limited input wireless device. A host device includes a transceiver and a processor. The processor may be configured to execute instructions to: receive from the transceiver a pairing process request from the limited input wireless device, wherein the pairing process request includes a private code based upon a physical user action implemented with the limited input wireless device; and implement a pairing process to validate the limited input wireless device for a particular host device function associated with the private code. | 10-04-2012 |
20120254988 | Providing greater access to one or more items in response to verifying device transfer - A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 10-04-2012 |
20120254989 | Providing greater access to one or more items in response to verifying device transfer - A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 10-04-2012 |
20120254990 | AUTHENTICATION OF AN END USER - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device. | 10-04-2012 |
20120266235 | Method for reconfiguring a peripheral device using a magnetic swipe card - A magnetic-stripe card, with an associated card-reader, provides the apparatus supporting a method to change the configuration of a printer, scanner, or, other peripheral device in a stand alone environment or in a networked environment. A network may be defined as “two or more devices communicating”. The method comprises programming the card with selected configuration data, such as character-font selection, serial baud-rate, or, in the case of a scanner, document-rotate, auto-stamp, scan-resolution, duplex-scan ON/OFF, and other parameters. The card may be swiped at a slot in the peripheral device directly, or through a portable reader, or, even from a reader permanently connected within a LAN. Data on the card alerts the device to be reconfigured of its intent by way of resident utility software on the device, and, within the host, if present. When the transaction is accepted, the data is transmitted to the selected device to rewrite selected configuration parameters. Another very useful feature of this method would be the operator's ability, with his or her own personal magstripe card to “customize” the device to his or her preferences, even to disable the device to other operators. The magnetic swipe-card's limited data space is well suited to the small amount of data required for configuration changes, since many of the configuration parameters are only 1 or 2 bits wide. | 10-18-2012 |
20120266236 | PASSWORD INPUT METHOD USING VISUAL OBJECT - A method and apparatus is provided for switching from a regular desktop screen to a password input screen for a user to input a password. An apparatus may comprise a first screen display as the password input screen, a second screen display as the regular desktop screen, and a switching system. The switching system may be configured to switch a screen item position between the first screen display and the second screen display. The switching system may receive a user selection of a sequence of screen items as a password input and may switch operation of the apparatus between the first screen display to the second screen display. | 10-18-2012 |
20120266237 | DEVICE AND METHOD FOR AUTHORIZATION MANAGEMENT - A device may be authorized via a method, which includes: displaying several numbered folder objects while the device is in an unauthorized state, each of which is displayed with a corresponding serial number and represents a folder containing several files stored in the device; executing a predefined operation toward one of the folder objects; detecting the serial numbers corresponding to the operated folder object; comparing the detected serial numbers and a predetermined password; and maintaining the device in the unauthorized state, if the detected serial numbers do not correspond to the password. | 10-18-2012 |
20120266238 | Computer Including at Least One Connector for a Replaceable Storage Medium, and Method for Starting and Operating a Computer Via a Replaceable Storage Medium - A method starts and operates a computer with an operating system held on a replaceable storage medium. The method includes: checking the authenticity of the replaceable storage medium and/or checking a user's authority for executing the operating system held on the replaceable storage medium. The operating system held on the replaceable storage medium is executed if the replaceable storage medium is authentic and/or the user is authorized to use the operating system. Checking the authenticity of the replaceable storage medium and the user's use authority ensures the integrity of the operating system. Thereby, modifications to the operating system and to the computer are made more difficult. The invention also relates to a computer and a replaceable storage medium which are suitable for carrying out the method. | 10-18-2012 |
20120272313 | CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE - Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality. | 10-25-2012 |
20120278883 | Method and System for Protecting a Computing System - The system relates to a method for protecting a computer system application. In one aspect of the method, a wrapper program is installed on a computer system and the computer system application is embedded within the wrapper program. In another aspect, the wrapper program verifies with a user prior to allowing the computer system application to be invoked. | 11-01-2012 |
20120284789 | MOBILE DEVICE AND CONTROL METHOD THEREOF - This specification relates to a mobile terminal capable of executing a lock state of restricting a touch input and a control method thereof. The control method for the mobile terminal, which displays a lock screen in the lock state of restricting an input of a control command for an application, includes displaying an execution screen of an application on the lock screen, and controlling the lock screen based upon a touch input detected in the lock state. | 11-08-2012 |
20120291120 | TOUCHSCREEN PASSWORD ENTRY - A method of user authentication on a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and movement of either the modified base image or modified overlay image is responsive to receiving an input starting outside a display area of a touchscreen. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image. | 11-15-2012 |
20120291121 | Unlocking Method, Computer Readable Storage Medium for Storing Thereof and Handheld Electrical Device Applying Thereof - An unlocking method for a handheld electrical device with a normal mode and a limited mode is disclosed. The handheld electrical device in the normal mode is able to display all contents of an application installed on the handheld electrical device. The handheld electrical device in the limited mode is able to display only part of the contents of the application. The unlocking method includes the following steps: at least one unlocking input without a user account is obtained from an input unit of the handheld electrical device when the handheld electrical device is under a locked status. The unlocking input is compared with first preset data and second preset data to generate a comparison result. The locked status of the handheld electrical device is released according to the comparison result. | 11-15-2012 |
20120291122 | Multi Dimensional CAPTCHA System and Method - A method of providing a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), the method comprising the steps of: forming a stereoscopic image including a first and second series of intermingled similar objects, with the first series of objects having a readily distinguishable stereoscopic depth from the second series of objects. | 11-15-2012 |
20120291123 | METHOD AND ELECTRONIC DEVICE FOR INPUTTING PASSWORDS - A method for inputting passwords is provided. The method includes steps of: displaying a password inputting interface on a screen, wherein the password inputting interface displays a plurality of first objects and a plurality of second objects. The first objects each have different first identification features, such that a user can distinguish the different first objects through the first identification features, and the second objects are at different locations on the screen; receiving at least one of the first objects, followed by the moving of the received at least one first objects to at least one of the second objects, wherein the user operates the movement of the received at least one first objects; and determining if the operation is correct according to moving of the at least one first objects to the at least one second objects. | 11-15-2012 |
20120304284 | PICTURE GESTURE AUTHENTICATION - In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen | 11-29-2012 |
20120311699 | System and Method for Providing Access to an Information Handling System - An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a second electrocardiogram measurement in response to a specific combination of keys of a keyboard being pressed for a specific period of time, wherein each key in the specific key combination includes an electrocardiogram sensor on a top surface of the key, to authorize a user and log the user onto the information handling system when the second electrocardiogram measurement matches the first electrocardiogram measurement, and otherwise: to deny access to the information handling system; to increase a counter; to determine whether the counter has exceeded a threshold; and to request that an input window is displayed when the counter has exceeded the threshold. | 12-06-2012 |
20120311700 | INFORMATION PROCESSING APPARATUS AND AUTHENTICATION INFORMATION MIGRATION METHOD - An information processing apparatus of the present invention converts user authentication information based on a second one-way function into a second converted value if authentication with a first converted value obtained by converting the user authentication information based on the first one-way function is successful. | 12-06-2012 |
20120317639 | BIOMETRIC DATA SYSTEM - A biometric data system includes a biometric feature capture device, a front-end data display interface, a cloud operation system, databases, an identity code generation module, an identity code check module, and a result feedback module. The unique biometric features captured by the biometric feature capture device can be converted into a set of unique and unrepeated identity code through the information technique of the cloud operation system. The identity code serves to label a user's identity, whereby the identity code can be compared with the biometric features of the user to find whether the identity code matches the biometric features and verify the identity of the user. | 12-13-2012 |
20120317640 | VARIABLE LENGTH, MULTIDIMENSIONAL AUTHENTICATION KEYS - Provided are techniques for determining access to a secure system. A portion of an input sequence is received. A security factor of the received portion of the input sequence is determined by calculating: P(is)*P(gu), where P(is) is a probability of the input sequence being a valid password, and where P(gu) is a probability of a gesture pertaining to a user based on historical data collected from the user. It is determined whether the security factor has reached a predetermined level. In response to determining that the security factor has reached the predetermined level, access to the secure system is allowed before the entire input sequence is received. | 12-13-2012 |
20120324570 | INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an information processor includes a display module and an operation module. The display module displays a plurality of display objects each at a predetermined display position. The display objects are selected in advance by a user from a plurality of objects and includes authentication objects. The operation module is used for operation to select the authentication objects in a predetermined order upon user authentication. | 12-20-2012 |
20120324571 | INFORMATION INPUT DISPLAY DEVICE AND CONTROL PROGRAM THEREOF - An information input display device, having an input section for inputting information and a display section for displaying the information, which enables an access to protected information after being authenticated by an authentication processing executed after starting up of the information input display device, the information input display device including: an authentication processor which executes the authentication processing based on authentication information inputted by the input section; and an input display controller which, after the starting up of the information input display device and before being authenticated by the authentication processing, accepts inputting of prescribed information different from the authentication information through a screen displayed on the display section, and allows the display section to display the prescribed information on the screen. | 12-20-2012 |
20120331548 | Display Dynamic Contents on Locked Screens - In one embodiment, receiving a first action from a user of a computing device, wherein the first action causes the computing device to power up while a screen of the computing device is locked; obtaining a plurality of dynamic information items relevant to the user of the computing device; and displaying at least one of the plurality of dynamic information items on the locked screen of the computing device. | 12-27-2012 |
20120331549 | SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS - A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be programmed to display a first plurality of pictures and configure the user interface to allow the user to select a first picture corresponding to the user from the first plurality of pictures to provide a first authentication step and allow the user to select a second picture from a second plurality of pictures providing a second authentication step. The system can log the user into the corresponding user account if the second picture selected from the second authentication step corresponds to the first picture selected from the first authentication step. A system and method for logging multiple users into corresponding user accounts is also disclosed. | 12-27-2012 |
20130007874 | SYSTEM AND METHOD FOR AUTHENTICATING A USER - According to an embodiment, a system is provided comprising a memory and a processor. The memory may be operable to store a master image associated with a user account. The master image may comprise an image of a physical, non-living object. The processor may be coupled to the memory and may be operable to receive a request to perform a transaction associated with the user account. The processor may be further operable to receive an image that is scanned in real-time in conjunction with the request to perform the transaction. The processor may be further operable to compare the scanned image with the master image associated with the user account and to perform the transaction if the scanned image is substantially similar to the master image. | 01-03-2013 |
20130007875 | Interactive CAPTCHA - The present disclosure involves a method. The method includes receiving a request from a user. The method includes constructing, by a computer processor, a media object that contains a plurality of media components. The method includes transmitting the media object to the user. The method includes prompting the user to perform a task involving at least a subset of the media components, the task including at least one of the following: selecting each of the media components in the subset according to a predefined sequence; and modifying at least one of the media components in the subset with respect to at least one of its following properties: location, size, appearance, and orientation. The method includes obtaining a description of an action performed by the user in response to the prompting. The method includes deciding whether or not to grant the request based on the obtaining. | 01-03-2013 |
20130007876 | SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device. | 01-03-2013 |
20130014251 | SUBSTRATE PROCESSING APPARATUS - An operating section including an operation screen and amounting section, comprises a data authentication unit configured to collate authentication data when a device is inserted into the mounting section, which is the device into which the authentication data such as at least user ID and user password is integrated, and completes log-in when the authentication data is registered, and a display control unit is configured to perform changeover of a display state of at least a part of the operation screen. | 01-10-2013 |
20130019305 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO EMBEDDED NONVOLATILE MEMORIESAANM Berenbaum; AlanAACI New YorkAAST NYAACO USAAGP Berenbaum; Alan New York NY USAANM Wahler; RichardAACI St. JamesAAST NYAACO USAAGP Wahler; Richard St. James NY US - A system to control access to a nonvolatile memory. The system includes an embedded controller, and a nonvolatile memory including a password. The embedded controller and the nonvolatile memory may be in communication with one another. The system further includes a lock register receiving and storing the password from the nonvolatile memory, and a key register receiving a key from the embedded controller and holding the key for one machine cycle. Further, the system includes a comparator connected between the lock register and the key register. The comparator compares the password received from the lock register and the key received from the key register. Output from the comparator is provided to an access filter connected between the embedded controller and the nonvolatile memory. Based on the comparator output, the access filter may grant or block access to the nonvolatile memory. | 01-17-2013 |
20130024932 | ENHANCED SECURITY FOR BLUETOOTH-ENABLED DEVICES - In one embodiment, a method includes determining a location of a device relative to a reference, and identifying a first password from a plurality of passwords for use to unlock the device based on the location of the device relative to the reference. The plurality of passwords includes at least one complex password and at least one simple password. The method also includes prompting for input arranged to unlock the device, obtaining the input, and determining when the input matches the first password. When it is determined that the input matches the first password, the device is unlocked. | 01-24-2013 |
20130031623 | MULTI-FACTOR AUTHENTICATION USING DIGITAL IMAGES OF BARCODES - Methods, systems, and computer-readable media for implementing a multi-factor authentication scheme utilizing barcode images in computing devices, such as standard mobile devices and smartphones having no native hardware support for reading barcodes other than standard digital camera componentry for capturing digital images of real-world phenomena. A mobile device may be configured by software to require a user, as a first authentication factor, to present a barcode, such as a Quick Response (QR) Code for image scanning using digital camera componentry built into the mobile device. The device analyzes the digital image of the barcode to decode the barcode into its encoded character data. If the device recognizes the character data as valid, then, as a second authentication factor, the device prompts the user to enter a valid password associated with the barcode. If the user-entered barcode is also valid, then the device may grant the user access. | 01-31-2013 |
20130036461 | IMAGE-BASED AUTHENTICATION - Techniques for authenticating a user of a computing device (e.g., handheld, desktop, laptop) are provided. In order to grant access to any of the services provided by the computing device, the computing device displays, to the user, one or more images that are stored on the computing device. The user is required to accurately identify one or more objects depicted in the one or more images in order to gain access to the computing device. The computing device is not required to be connected to any network at the time of authentication. Authentication data that is associated with object(s) in each displayed image may have been established previously by another computing device and then provided to the computing device. | 02-07-2013 |
20130036462 | Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device - Techniques for improving security on a device are disclosed. In an aspect, a multi-factor password comprising a plurality of factors may be used to improve security. Each factor may correspond to a different type of information that may be used for authentication and/or other purposes. For example, the plurality of factors may include an alpha-numeric string, a fingerprint of a user, a voice clip, a picture, a video, etc. The device may authenticate the user based on the multi-factor password. In another aspect, a dynamic password that varies with at least one parameter (e.g., time, location, etc.) may be used to improve security. The dynamic password may have a plurality of values for a plurality of scenarios defined by at least one parameter. The device may authenticate a user in a given scenario based on a value of the dynamic password applicable for that scenario. | 02-07-2013 |
20130055382 | Managing Access to Storage Media - Embodiments of the invention relate to password management of one or more data storage devices. A set of passwords are employed to manage access to the storage devices, with authentication of both passwords enabling access to the subject storage device(s) for read and/or write operation privileges. The first password is known by the user and is used as an initial input string. The second password is not known by the user and is authenticated with the subject storage device(s) through BIOS and without input from the user. | 02-28-2013 |
20130061318 | USER-DEFINED MULTIPLE INPUT MODE AUTHENTICATION - A user can define two or more input modes with respective input values to establish an authentication protocol to unlock a computer or govern other computer behavior. As an example, the user may first establish a particular voice recognition pattern followed by a particular image recognition and subsequent logons can be accomplished only by speaking the voice recognition pattern into the device and then by presenting the commanded image, such as an image of the use's face, to the device. | 03-07-2013 |
20130061319 | INFORMATION PROCESSING APPARATUS, AND USER AUTHENTICATION METHOD FOR INFORMATION PROCESSING APPARATUS - An information processing apparatus to execute an application includes first and second authentication units, first and second storage units, a request unit, and an application execution unit. The first authentication unit authenticates a user of the information processing apparatus. The first storage unit stores first certification information relating to the authentication of a user. The request unit requests a second authentication unit to perform authentication required to execute the application using the first certification information when the application is executed based on an instruction from the user authenticated by the first authentication unit. The application execution unit executes the application when the authentication performed by the second authentication unit based on the request by the request unit has succeeded. The second storage unit stores second certification information relating to the second authentication unit authentication required to execute the application after associating the second certification information with the first certification information. | 03-07-2013 |
20130067566 | DEVICE TO PERFORM AUTHENTICATION ACCORDING TO SURROUNDING INFORMATION AND METHOD FOR PERFORMING AUTHENTICATION - A device to authenticate a user includes a user interface unit to receive a password input; a surrounding information detecting unit to detect surrounding information of the device; and an authentication unit to authenticate the password input and to determine whether the surrounding information matches preset surrounding information. A method for performing authentication includes receiving an authentication input for authenticating a user; determining whether an authentication condition is satisfied, based on surrounding information of a device; and authenticating the authentication input. | 03-14-2013 |
20130067567 | CHIP INTEGRATED PROTECTION MEANS - The invention relates to a chip for processing a content, comprising at least a microprocessor. Said chip includes an integrated non-volatile programmable memory for storing protection data and protected data, said protection data being intended to be used for authorizing/denying access to said protected data by said microprocessor under execution of a program. The invention allows to protect program and data dedicated to a chip-integrated conditional-access system and to protect features as external connections and downloaded data directly on the chip. | 03-14-2013 |
20130086673 | TECHNIQUES FOR SECURELY UNLOCKING A TOUCH SCREEN USER DEVICE - Techniques are provided for detecting a sequence of contact or interaction instances initiated by a user on a surface of an interface unit of a user device. Each contact instance comprises one or more points of contact between the user and the surface of the interface unit, while each interaction instance comprises one or more points of activation with respect to the surface of the interface unit. The sequence of contact instances or interaction instances initiated by the user is then compared to stored information to determine whether the sequence of contact instances or interaction instances matches the stored information. If the sequence of contact instances or interaction instances matches the stored information, access is granted to the user device or to a device or system associated with the user device. | 04-04-2013 |
20130086674 | Multi-frame depth image information identification - Embodiments of the present invention relate to systems, methods, and computer storage media for identifying, authenticating, and authorizing a user to a device. A dynamic image, such as a video captured by a depth camera, is received. The dynamic image provides data from which geometric information of a portion of a user may be identified as well as motion information of a portion of the user may be identified. Consequently, a geometric attribute is identified from the geometric information. A motion attribute may also be identified from the motion information. The geometric attribute is compared to one or more geometric attributes associated with authorized users. Additionally, the motion attribute may be compared to one or more motion attributes associated with the authorized users. A determination may be made that the user is an authorized user. As such the user is authorized to utilize functions of the device. | 04-04-2013 |
20130097698 | System and Method for Transaction Security Enhancement - The present disclosure involves a system that includes a computer memory storage component configured to store computer programming instructions and a computer processor component operatively coupled to the computer memory storage component. The computer processor component is configured to run a secure operating system and a non-secure operating system in parallel. The secure and non-secure operating systems are isolated from each other. The computer processor component is configured to execute code to perform the following operations: receiving an authentication request from an application that is run by the non-secure operating system, wherein the authentication request contains credentials of the application; communicating with a secure applet that is run by the secure operating system, and wherein the communicating includes transferring the credentials of the application to the secure applet; and authenticating and vetting the application based on the credentials of the application. | 04-18-2013 |
20130104227 | ADVANCED AUTHENTICATION TECHNOLOGY FOR COMPUTING DEVICES - Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern. | 04-25-2013 |
20130111580 | METHOD FOR PROVIDING COMPUTER-BASED AUTHENTICATION UTILIZING GESTURE BIOMETRICS | 05-02-2013 |
20130111581 | COMBINED PASSCODE AND ACTIVITY LAUNCH MODIFIER | 05-02-2013 |
20130111582 | SECURITY ACCESS METHOD FOR AUTOMOTIVE ELECTRONIC CONTROL UNITS | 05-02-2013 |
20130125232 | IMPLEMENTING ENGINEERING UNIT CONVERSIONS ASSOCIATED WITH CONTROL DEVICES - The disclosed subject matter comprises a converter component that can efficiently manage conversion of data associated with a control system from one engineering unit (EU) type to another EU type, and/or conversion of the data from one language to another language, based at least in part on the user. The converter component can identify a user, or can receive a conversion selection(s) from the user, and can automatically select a specified subset of EU conversions and/or language conversions to employ in relation to the user, convert the data associated with the control system in accordance with the subset, and present the converted data to the user via the interface. The converter component can present a pre-populated table of EU conversions associated with the subset, and can allow a user to add or modify an EU conversion. | 05-16-2013 |
20130125233 | FLEXIBLE SECURITY CONTROL ENVIRONMENT - An automation control system is provided with an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. Upon power on or initialization of the interface device or when a previously logged in user is logged off, the interface device logs in a guest account associated with a user role having a defined set of access rights and provides access to monitor, control, or monitor and control the processes based upon the set of access rights. | 05-16-2013 |
20130139248 | METHOD OF AUTHENTICATING PASSWORD AND PORTABLE DEVICE THEREOF - A method of authenticating a password and a portable device thereof are provided. The method includes: displaying an input keyboard on which a plurality of objects are arranged; changing an object arranged on the input keyboard according to a manipulation of a user; and if an object pattern arranged in a designated position of the input keyboard corresponds to a preset password pattern, authenticating the user. Therefore, it is difficult to use artifacts on the display screen to trace a password after entry, and thus security is improved. As a result, a protection of personal information of a user is strengthened. | 05-30-2013 |
20130139249 | IMAGE PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM FOR CARRYING OUT LOGIN PROCESSING - An image processing apparatus transmits, after reception of a login notification of an authenticated user, the login notification to an identified application, and then changes displaying of a screen of a display unit to displaying of an initial screen corresponding to the identified application. After the displaying of the display unit has been changed to the displaying of the initial screen, the image processing apparatus transmits the login notification to, among applications belonging to a first group, an application to which the login notification has not been transmitted, and applications belonging to a second group. | 05-30-2013 |
20130139250 | VIRTUAL APPLIANCE PRE-BOOT AUTHENTICATION - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated. | 05-30-2013 |
20130145457 | Protecting Personal Information Upon Sharing a Personal Computing Device - In particular embodiments, a temporary user is able to use another's personal computing device in shared mode for a short period of time while experiencing a personalized user interface. An indication is detected that a personal computing device associated with a primary user is to be shared with a temporary user. Access to local personal information associated with the primary user is disabled if it is stored on the personal computing device. Access to remote personal information of the primary user that is accessible from the personal computing device is disabled. A personalized user interface incorporating personal information associated with the temporary user is presented on the personal computing device for the temporary user. Personal information of the primary user is not accessible by the temporary user, and vice versa. When shared mode is to be terminated, all personal information of the temporary user is deleted. | 06-06-2013 |
20130145458 | ELECTRONIC DEVICE AND METHOD FOR UNLOCKING LOCKED OPERATING SYSTEM - A method for unlocking a locked operating system of an electronic device is provided. The electronic device includes a storage unit and a locking unit, the storage unit is configured for storing a preset password and preset unlocking request information. The method includes steps: receiving a message from a second electronic device; verifying the received message according to the preset unlocking request information; and sending the preset password to the second electronic device if the verification is successful. | 06-06-2013 |
20130152193 | METHOD FOR AUTHENTICATION WITH DYNAMIC AND RANDOM PASSWORDS - An approach is provided for a method for authentication with dynamic and random passwords, which comprises acts of obtaining a code equation initially from a person through an register page of a system, generating a starting code set and a result value, obtaining a password from the person through an authentication page of the system, determining the identity of the result value and the password, and granting the person for the authentication when the password and the result value are the same. The code equation is formed by at least one mathematical equation. The result value is the calculation result of the starting code set and the code equation. The starting code set is a set of number randomly generated by the system. Therefore, the present invention is able to prevent password cracking or recovering from data that has been stored in or transmitted by an apparatus. | 06-13-2013 |
20130160109 | METHOD AND DEVICE - A method and device for user authorization is presented herein. The authorization device may be integrated in a display interface configured to receive an infrared input signal. The device may include a means for converting the infrared signal into an electric signal. The device may further include a processor configured to analyze the electrical signal. The processor may further be configured to provide an authorization of a user based on the analysis of the electrical signal. | 06-20-2013 |
20130160110 | Device Locking with Hierarchical Activity Preservation - Techniques are described for device locking with activity preservation at a specified level within a multi-level hierarchy of device states. Such locking enables a user to share a device with another user while specifying a particular level of access to the device, such as access to a particular class of applications, a specific application, or a specific task within an application. Determination of the authorized activity may be based on a currently active application, or on the particular user gesture. The level of functionality made available may be based on the number of times a user gesture is repeated. Gestures may include a selection of a hardware or software control on the device, issuance of a voice command, and the like. | 06-20-2013 |
20130160111 | Device and Method for Use of Real-Time Biometric Data To Control Content and Device Access - A device and method for unobtrusively conducting security access checks via biometric data. The device and method obtains biometric data in response to a request for content and initiates a security clearance process that is substantially unobservable to an individual with clearance to access the requested content. | 06-20-2013 |
20130160112 | CONTROLLER AND METHOD OF STORAGE APPARATUS - According to one embodiment, a controller for controlling a connected storage apparatus includes a storage unit and a control unit. The control unit acquires a password input by a user, judges whether or not the password is consistent with a password previously registered in the storage unit, cancels authentication data that is stored in the storage unit and enables reading and writing toward the storage apparatus of data and allows the formatting toward the storage apparatus in a condition that the password is consistent with the password previously registered in the storage unit, and disables reading and writing toward the storage apparatus of data and formatting toward the storage apparatus in a condition that the password is not consistent with the password previously registered in the storage unit. | 06-20-2013 |
20130160113 | COMPUTING APPARATUS AND METHOD FOR OPERATING APPLICATION - Computing apparatus and method for operating an application are provided. The computing apparatus includes: a communicator which communicates with a paired external device; a storage unit in which applications are installed; a controller which, if one of the applications installed in the storage unit is selected, controls the communicator to request login information corresponding to the selected application from the external device and, if the login information is received from the external device, performs a login by using the login information; and a display unit which displays an operation screen corresponding to the selected application. Therefore, a user further easily and conveniently uses services of applications respectively installed devices. | 06-20-2013 |
20130167225 | GRAPHICAL IMAGE PASSWORD AUTHENTICATION METHOD - A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images, having different background colors, the correct image and background color which correspond to the user's computer account. In one advantageous form, in addition to selecting the correct image, the user must first enter a username and password. In an alte rnative form, if a user is seeking access to a computer network by using a preapproved access point or computer having an approved IP address, a user is allowed to gain access to the computer network without being prompted to select a correct image. | 06-27-2013 |
20130167226 | Handheld Mobile Device with USB Hard Drive and Optional Biometric Scanner, and Systems Including the Same - Mobile handheld communication devices such as cellular and/or smart phones are equipped with a detachable USB drive, and optionally, a biometric scanner and/or an electronic release mechanism and/or circuitry. The communication device has a housing, a central processing unit (CPU) within the housing, a memory controller within the housing and coupled to the CPU, and a universal serial bus (USB) hard drive that electrically communicates with the memory controller. The USB hard drive has an outer surface or casing that is integrated and/or integratable with the housing. The USB device may include a USB interface, a hard drive that communicates through the USB interface, and a biometric sensor. The biometric sensor establishes or authorizes electronic communication between the hard drive and the USB interface when biometric data obtained with the biometric sensor matches data stored in the hard drive. | 06-27-2013 |
20130167227 | WORKING MACHINE, DATA COMMUNCATION SYSTEM FOR WORKING MACHINE, OPERATION SYSTEM FOR WORKING MACHINE, AND SETTING CHANGE SYSTEM FOR WORKING MACHINE - A working machine is provided with a control device that can make wireless communication with a mobile terminal storing a mobile-use ID code and stores a working machine-use ID code, wherein the control device is provided with: ID code checking means adapted to check the mobile-use ID code obtained by ID code obtaining means and the working machine-use ID code with each other; data communication means adapted, in the case where as a result of the checking by the checking means, matching between the ID codes is established, to allow data communication between the mobile terminal and the control device, and in the case where the matching is not established, not to allow the data communication; and ID code registration means adapted to register the working machine-use ID code in the mobile terminal as the mobile-use ID code. | 06-27-2013 |
20130167228 | SECURE DATA IN REMOVABLE STORAGE DEVICES VIA ENCRYPTION TOKEN(S) - Systems, methods, and devices that secure data on removable storage devices are presented. A token component can interface with a communication port on a host device. One or more removable storage devices can interface with one or more other communication ports on the host device. The token component includes a security component that, when interfaced with the host device, is employed to automatically and simultaneously enable access, encrypt data being stored in, and decrypt data being retrieved from the removable storage devices. When the token component is not interfaced with the host device, the removable storage devices are secured so that they cannot be accessed and data stored thereon cannot be retrieved and decrypted. A user optionally can utilize a password, which can be entered when the token component is interfaced with the host device, to facilitate controlling access to the removable storage devices and data encryption/decryption. | 06-27-2013 |
20130174251 | METHODS AND SYSTEMS FOR SERVICE DELIVERY - A system for providing a service comprising: a service provisioning control means adapted for identifying a user, and for providing services to said user; the system further comprising: a location information retrieval means adapted for receiving location information of user; and for identifying a local service delivery system; an available service pack information retrieval means adapted for retrieving available service pack information corresponding to local service delivery system, the available service pack information comprising information about the set of possible services which can be delivered to user by local service delivery system; and wherein service provisioning control means is adapted for selecting a subset of services of available service pack information corresponding, based on at least a set of priority rules; and for providing at least one of subset of services to the user; and associated methods and devices. | 07-04-2013 |
20130179966 | PASSWORD AUTHENTICATION CIRCUIT AND METHOD - A password authentication circuit includes a timer that measures first and second periods of a password authentication period, a control circuit that, in a first period, disables writing of a password received into a password register, in a predetermined period within a second period enables writing of a password received into the password register and outside the predetermined period within the second period disables writing of a password received into the password register; a password comparison unit that compares a password in the password register and a password expected value to perform authentication of the password; and a first period generation unit that controls variably the first period, a password last written into the password register in the predetermined period of the second period being made a target for authentication. | 07-11-2013 |
20130185790 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 07-18-2013 |
20130191909 | Industrial Automation System and Method for Safeguarding the System - An industrial automation system comprising a digital fingerprint that is allocated to a unit requesting access to the automation system and which is based on one or more parameters of a communication between the unit and a fingerprint-determining component of the automation system, wherein the industrial automation system additional comprises the fingerprint-determining component which, during the operation of the automation system, grants the requesting unit access to the automation system and compares the determined fingerprint of the requesting unit with a stored fingerprint. | 07-25-2013 |
20130191910 | Device, Method, and Graphical User Interface for Accessing an Application in a Locked Device - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to entry of a correct passcode in the passcode entry interface, the device enters an unlocked state. | 07-25-2013 |
20130191911 | Device, Method, and Graphical User Interface for Accessing an Application in a Locked Device - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to entry of a correct passcode in the passcode entry interface, the device enters an unlocked state. | 07-25-2013 |
20130198835 | METHOD OF USING AN ACCOUNT AGENT TO ACCESS SUPERUSER ACCOUNT SHELL OF A COMPUTER DEVICE - A method of using an account agent to access a superuser account shell of a computer device is disclosed. The method includes receiving an authentication request; verifying whether an identity authentication is passed; when the identity authentication is passed, establishing a secure channel between the account agent and a normal user account shell; and allowing controlling the superuser account shell of the computer device through the normal user account shell. | 08-01-2013 |
20130198836 | Facial Recognition Streamlined Login - A system and method are disclosed for providing login credentials to a computer system using a biometric indicator. The system includes an image comparison module, a user interface, and an access control module. The image comparison module is configured to compare an image of a user, requesting login access to a client device, with images in a database to determine whether the image matches an image in the database. The user interface is configured to receive input from the image comparison module and to prompt the user for login credentials based on the input received from the comparison module. The access control module is configured to grant or deny login access to the user based on the user input that is entered in response to the prompting. | 08-01-2013 |
20130198837 | UNLOCKING SCHEMES - An end device may include a camera configured to capture an image of an object, a touch screen configured to receive a touch input and a processor configured to determine to unlock the end device based, at least in part, on the image of the object and the touch input. | 08-01-2013 |
20130205387 | Method and Apparatus to Authenticate a User to a Mobile Device Using Mnemonic Based Digital Signatures - A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action. | 08-08-2013 |
20130219490 | BIOMETRIC-RICH GESTURES FOR AUTHENTICATION ON MULTI-TOUCH DEVICES - The problem of obtaining a multi-touch input sequence for use in user authentication is solved by determining, at a plurality of time instances, a mapping from an unordered set of at least four touch points to a an ordered set of at least four fingertips, wherein for at least one of the plurality of time instances, the mapping from the unordered set of at least four touch points to the ordered set of at least four fingertips is subject to a constraint that the ordered set of at least four touch points defines a simple polygon. | 08-22-2013 |
20130227677 | PASSWORD AUTHENTICATION - A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and the network connection status of the computing system is determined. If the computing system is offline, the user password and the OTP are stored in memory and the user is granted a first level of access to the computing system. Upon detecting that the network connection status of the computing system has changed to online, the user password and the OTP are provided to an authentication server for authentication. If the authentication of the user password and the OTP is successful, the user is granted a second level of access to the computing system, the second level of access being higher than the first level of access. | 08-29-2013 |
20130227678 | METHOD AND SYSTEM FOR AUTHENTICATING USER OF A MOBILE DEVICE VIA HYBRID BIOMETICS INFORMATION - A system and method is provided that authenticates a user using hybrid biometrics information, such as a user's image information, a user's voice information, etc. The user authentication method includes: acquiring a number of biometrics information; generating a number of authentication information corresponding to the acquired biometrics information; and performing an integral user authentication based on the by generated authentication information. | 08-29-2013 |
20130232570 | PORTABLE TERMINAL AND GRIPPING-FEATURE LEARNING METHOD - A portable terminal includes a former-template storage that stores an old authentication template used for authentication in a portable terminal used in the past, as a former template; a sensor-position storage that stores the positions of sensors in the portable terminal currently being used; a sensor-position correcting section that acquires the former template and the positions of the sensors and applies interpolation to the former template according to the positions of the sensors to generate an interpolated template; a gripping-feature sample acquisition section that acquires a gripping feature sample from a sensor array; a template comparison section that compares the interpolated template with the acquired gripping feature sample and calculates an inter-vector distance therebetween; and a template storage that stores the interpolated template as an authentication template when the inter-vector distance between the interpolated template and the acquired gripping feature sample is equal to or shorter than a predetermined value. | 09-05-2013 |
20130239205 | METHOD AND APPARATUS FOR IDENTIFYING AND ASSOCIATING DEVICES USING VISUAL RECOGNITION - In one embodiment, a method includes identifying a request for access to a first system and obtaining a visual image including at least a first piece of information associated with the request. The visual image is associated with a first device and obtained using a second device. The method also includes determining if the at least first piece of information indicates that the access to the first system is to be granted, wherein determining if the at least first piece of information indicates that the access to the first system is to be granted includes implementing a visual recognition algorithm to process the at least first piece of information. Finally, the access to the first system is granted if it is determined that the at least first piece of information indicates that the access to the first system is to be granted. | 09-12-2013 |
20130239206 | AUTHENTICATION USING PHYSICAL INTERACTION CHARACTERISTICS - User physical interaction characteristics information or the way a user physically interacts with a device is analyzed to aid in authenticating a user of a device. User physical interaction characteristics information such as swipe speed, finger area, finger conductivity, finger angle, device angle, movement patterns, acceleration, etc., provide signatures that are distinctive for particular individuals and possibly unique if measured to a sufficiently high level of precision. In some examples, a device measures finger positions, finger pad sizes, moisture level, acceleration, displacement, and changes in finger pad size for a particular user and compares the measurements to physical interaction characteristics measured during subsequent usage of the device to verify that a user is an authorized user. | 09-12-2013 |
20130239207 | INFORMATION RECORDING SYSTEM AND RECORDING MEDIUM - An information recording system includes a recording medium and an information recording device. The information recording device has a group password manager for saving a group password used for a predetermined group and an identification ID of the group password; a password setter for registering the group password in a password register of the recording medium and registering the identification ID in a password related information storage; a password selector for reading the identification ID from the password related information storage of the recording medium and selecting a group password corresponding to the identification ID from at least one group password stored in the group password manager according to the identification ID; and a limitation cancel requester for inputting the password selected by the password selector in the password comparator of the recording medium. | 09-12-2013 |
20130239208 | ENCRYPTION AND AUTHENTICATION SYSTEMS AND METHODS - Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secure delay processing operations, each operation generating a delayed output value from an initial value. The passphrase is verified upon completion of the sequence of secure delay processing operations. Further, initial values of respective secure delay processing operations are based on respective passphrase elements and, for each secure delay processing operation after a first secure delay processing operation, a delayed output value from at least one other secure delay processing operations. | 09-12-2013 |
20130247174 | AUTHENTICATION SYSTEM, PROCESSOR, AND COMPUTER-READABLE RECORDING MEDIUM STORING THEREIN PROGRAM - An authentication system including: an authenticator that collates an object that is to be authenticated to determine whether the object is valid and sets, when the object is determined to be valid, an authentication state for the object; a detector that continuously detects, after the setting by the authenticator, the presence of the object; and an authentication canceller that cancels, when the detector detects the absence of the object, the authentication state set for the object. This configuration makes it possible to avoid an unauthorized use of the authentication system. | 09-19-2013 |
20130247175 | FACIAL FEATURE DETECTION - An example method includes capturing, by a camera of a computing device, an image including at least a face of a user, calculating a face template of the face of the user in the image, and analyzing the face template to determine whether the face includes at least one of a removable facial feature that decreases a level of distinctiveness between two faces and a non-removable facial feature that decreases a level of distinctiveness between two faces. When the face includes the removable facial feature, the method further includes outputting a notification for the user to remove the removable facial feature. When the face includes the non-removable facial feature, the method further includes adjusting a first similarity score threshold to a second similarity score threshold. | 09-19-2013 |
20130254875 | System and Method for Risk Assessment of Login Transactions Through Password Analysis - A system and method is provided for determining a risk associated with a login transaction. A password received during the login attempt and determination is made regarding whether the received password is derived form user information. A risk is determined based on a determination that the received password is derived from the user information. | 09-26-2013 |
20130254876 | ELECTRONIC DEVICE AND SWITCHING METHOD USING THE SAME - In a switching method of an electronic device, the electronic device receives a message sent from an earphone that is in electronic connection with the electronic device, the message comprising an input password, if the input password is equal to a password to switch an application layer into a host mode, the electronic device switches the application layer into the host mode to access private information of the application layer. | 09-26-2013 |
20130263251 | Device, Method, and Graphical User Interface for Integrating Recognition of Handwriting Gestures with a Screen Reader - While an electronic device with a display and a touch-sensitive surface is in a screen reader accessibility mode, the device displays an application launcher screen including a plurality of application icons. A respective application icon corresponds to a respective application stored in the device. The device detects a sequence of one or more gestures on the touch-sensitive surface that correspond to one or more characters. A respective gesture that corresponds to a respective character is a single finger gesture that moves across the touch-sensitive surface along a respective path that corresponds to the respective character. The device determines whether the detected sequence of one or more gestures corresponds to a respective application icon of the plurality of application icons, and, in response to determining that the detected sequence of one or more gestures corresponds to the respective application icon, performs a predefined operation associated with the respective application icon. | 10-03-2013 |
20130263252 | BUTTON DEPRESS WAKEUP AND WAKEUP STRATEGY - Disclosed is a biometric authentication system. The system comprises a biometric image sensor in an operative position with respect to a mechanical switch on a host electronic device and configured to sense biometric characteristics of a biometric object while the biometric object is operating the mechanical switch, the operating of the mechanical switch providing at least one of input and control to the host electronic device; and wake on event logic cooperating with at least one of the biometric image sensor and the host electronic device and configured to at least delay any response by the biometric image sensor or the host electronic device that increases power consumption by either the biometric image sensor or the host electronic device, beyond that needed for the performance, by at least one of the biometric image sensor and the host electronic device, of a bona fides analysis of an object being sensed while operating the mechanical switch, until a positive completion of the bona fides analysis determines that the object being sensed is an object desired to be sensed to perform a user authentication. | 10-03-2013 |
20130263253 | SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO MEDIA CONTENT BY DETECTING ONE OR MORE USER FINGERPRINTS - A system includes a media content processing subsystem and user input device having a plurality of control surfaces each configured to cause the input device to transmit at least one command to the media content processing subsystem. The input device is configured to acquire an image of a fingerprint of a finger touching the control surface and cause the processing subsystem to execute the command in accordance with a user profile that corresponds to the acquired fingerprint image. | 10-03-2013 |
20130263254 | DEVICES AND METHODS FOR UNLOCKING A LOCK MODE - Methods and devices for unlocking a lock mode are provided. The method includes receiving handwriting when receiving a request for unlocking a screen, providing a handwriting detection window, reading coordinate information of at least one or more strokes handwritten in the handwriting detection window, deriving first character information from the read coordinate information, and determining if the first character information are consistent with preset second character information, and if so, unlocking the screen; otherwise, keeping the screen locked. | 10-03-2013 |
20130269026 | RESTRICTED ACCESS MEMORY DEVICE PROVIDING SHORT RANGE COMMUNICATION-BASED SECURITY FEATURES AND RELATED METHODS - A memory device may include a memory, a host interface connector, a short range communication transceiver, and a processor coupled with the memory and the short range communication transceiver. The processor may be capable of storing data in the memory, and reading the data from the memory to the host device via the host interface connector based upon at least one of receiving first authentication data including a password, via the host interface connector, from a memory access application installed on the host device, or receiving second authentication data via the short range communication transceiver without use of the memory access application. | 10-10-2013 |
20130276100 | METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD - Provided is a method and apparatus for authenticating a password, wherein the method includes: generating at least one input grid cell into which a password is input from among a plurality of grid cells realized on a screen of a user terminal; and authenticating the password when the password is identical to a number of identification grid cells included in an authentication range predetermined based on the at least one input grid cell, wherein the identification grid cells are set to authenticate the password from among the plurality of grid cells. Accordingly, password information may be prevented from being exposed to a third person observer since a variable password is input whenever a user tries password authentication in a terminal. | 10-17-2013 |
20130276101 | METHOD OF, AND A SYSTEM FOR ENABLING A SECURE PASSWORD ENTRY USING A NON-SECURE DEVICE - A system and method provide for adjusting a random number. A random number can be computed and displayed by a first device, and adjusted in response to user input from a second device. In response to user input correctly adjusting the displayed random number to match a password, the first device generates an output signal. The output signal can effect a financial transaction to occur. The password can correspond to a personal identification number of a banking card. The user input can comprise a series of offsets having values of plus one (+ | 10-17-2013 |
20130276102 | Methods and systems for enabling a secure password entry using a non-secure device - A system and method provide for adjusting a random character or sequence of random characters. A random character or the sequence can be computed and displayed by a first device, and adjusted in response to user input from a second device. In response to user input correctly adjusting the displayed random character or sequence to match a password, the first device generates an output signal that can effect a financial transaction to occur. The password can correspond to a banking card PIN. The user input can comprise a series of offsets having values of plus one (+1), minus one (−1), or some other offset amount. The random sequence can include multiple digits (for example, numbers or letters). The first device can display the adjusted random character and replace digits of the displayed adjusted random sequence with unrelated typographical symbols, such as an asterisk (*). | 10-17-2013 |
20130276103 | Methods and systems for enabling a secure password entry using a non-secure device - A system and method provide for adjusting a random character or sequence of random characters. A random character or the sequence can be computed and displayed by a first device, and adjusted in response to user input from a second device. In response to user input correctly adjusting the displayed random character or sequence to match a password, the first device generates an output signal that can effect a financial transaction to occur. The password can correspond to a banking card PIN. The user input can comprise a series of offsets having values of plus one (+1), minus one (−1), or some other offset amount. The random sequence can include multiple digits (for example, numbers or letters). The first device can display the adjusted random character and replace digits of the displayed adjusted random sequence with unrelated typographical symbols, such as an asterisk (*). | 10-17-2013 |
20130291093 | AUTOMATIC USER SWAP - A computer-implemented method for providing secure access to a computer is disclosed according to one aspect of the subject technology. The method comprises capturing an image with a camera at the computer, extracting facial features from the image, and comparing the extracted facial features with facial features of a user stored on the computer, wherein the computer is currently logged into a user account belonging to the user. The method also comprises, if the extracted facial features match the stored facial features of the user, then staying logged into the user account, and, if the extracted facial features do not match the stored facial features of the user, then automatically logging out of the user account. | 10-31-2013 |
20130291094 | SYSTEMS AND METHODS FOR SECURING CONTROLLERS - A system includes a control system having a plurality of controllers configured to control a process. Each controller of the plurality of controllers further includes a secure repository configured to store a login credential. The control system is configured to authorize a user action by comparing a user credential against the login credential of each of the plurality of controllers. | 10-31-2013 |
20130291095 | SECURITY DEVICE AND DISPLAY METHOD THEREOF - A display method that is used for a security device installed with a camera module and a display module includes A. when the security device captured a preset image by the camera module, the security device displaying an interface for entering a password by the display module, and B. when the password is successfully matched, the security device displaying a predetermined object by the display module. By hiding the interface for entering a password, the invention improves the security capability of the device and meets the requirement of information security at present. | 10-31-2013 |
20130291096 | FRAUD RESISTANT PASSCODE ENTRY SYSTEM - A method for user passcode authentication. The method includes accessing a user information database with predefined user input option parameters and generating a random arrangement of input options from the predefined user input option parameters. The method includes manifesting the random arrangement of input options on an interactive display interface and receiving a selection of the interactive display interface input options. The method also includes comparing the received selection of interactive display interface options to the predefined user input option parameters. | 10-31-2013 |
20130291097 | MOBILE INFORMATION TERMINAL, GRIPPING-FEATURE LEARNING METHOD, AND GRIPPING-FEATURE AUTHENTICATION METHOD - A mobile information terminal includes: a mode acquisition part that acquires a mode of the mobile information terminal; a trigger monitoring part that, when a sampling trigger determined on the mode is generated, outputs a gripping-feature acquisition signal; a gripping-feature sample acquisition part that acquires a gripping-feature acquisition signal and a gripping-feature sample; a switch that switches the mobile information terminal between a learning state and an authentication state; a template learning part that, with the mobile information terminal in the learning state, learns a user authentication template for each mode using the gripping-feature samples; a user authentication part that, with the mobile information terminal in the authentication state, compares the learned user authentication template and the gripping-feature sample for each mode for user authentication; a locking part that locks some or all functions of the mobile information terminal when the user authentication fails. | 10-31-2013 |
20130298224 | ELECTRONIC DEVICE INCLUDING A FINGER SENSOR HAVING A VALID AUTHENTICATION THRESHOLD TIME PERIOD AND RELATED METHODS - An electronic device may include a finger sensor to sense a user's finger. The electronic device may also include a processor coupled to the finger sensor to perform multiple applications, acquire finger-matching biometric data of the user's finger from the finger sensor, and authenticate the user based upon a match between the acquired finger-matching biometric data and finger-enrollment biometric data. The processor may also start a given application, from among the applications thereof, based upon the authentication. The processor may treat the authentication as valid for a threshold time period. | 11-07-2013 |
20130298225 | MOBILE INFORMATION TERMINAL AND GRIPPING-FEATURE LEARNING METHOD - A mobile information terminal includes a mode acquisition section adapted to acquire the mode of the mobile information terminal; a sample filling section adapted to, when the number of gripping feature samples acquired in a mode is insufficient, fill in lacking gripping feature samples with gripping feature samples acquired in another mode; a gripping-feature sample acquisition section adapted to acquire gripping feature samples; a switch adapted to switch the mobile information terminal between a learning state and an authentication state; a template learning section adapted to learn an authentication template in each mode using the gripping feature samples when the mobile information terminal is in the learning state; an authentication section adapted to compare the learned authentication template with gripping feature samples in each mode to perform authentication; and a locking section adapted to lock some or all of functions of the mobile information terminal when the authentication fails. | 11-07-2013 |
20130305351 | MOBILE DEVICE WITH PASSWORD PROTECTED DESKTOP SCREEN - A mobile device includes a user interface that has a plurality of non-password-protected desktop screens and at least one password protected desktop screen. The mobile device includes a touch sensitive display device that accepts gestures used to navigate between the desktop screens. Applications may be installed to password protected desktop screens. | 11-14-2013 |
20130305352 | MOBILE DEVICE WITH DESKTOP SCREEN INDICATORS - A mobile device includes a user interface that has a plurality of non-password-protected desktop screens and at least one password protected desktop screen. The mobile device includes a touch sensitive display device that accepts gestures used to navigate between the desktop screens. Applications may be installed to password protected desktop screens. | 11-14-2013 |
20130305353 | Low Power Driver System and Method for Controlling The Same - A low power driver system for controlling an electric strike of a door is provided. The low power driver system includes an input system configured to detect a user credential, a control system configured to authenticate the user credential and generate a plurality of signals based at least in part on an authentication of the user credential, a driver system configured to generate a plurality of voltage potentials during an unlocking cycle based at least in part on the plurality of signals, wherein each of the plurality of voltage potentials are difference from each other, and a locking device configured to unlock based at least in part on the plurality of voltage potentials. | 11-14-2013 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 11-14-2013 |
20130305355 | DATA SECRECY METHOD AND ELECTRONIC DEVICE USING DATA SECRECY METHOD - A data secrecy system of an electronic device detects whether a screen unlocking interface of the electronic device is activated. The data secrecy system controls the recorder to record a phrase said by a user after the user is invited to speak. And then the data secrecy system extracts characteristics of the recorded phrase. The data secrecy system determines a privilege level for the user to access all or a part of functions of the electronic device according to the characteristics of the phrase, and controls the electronic device to work according to the determined privilege level of the user. | 11-14-2013 |
20130312087 | PERSONAL AUTHENTICATIONS ON COMPUTING DEVICES - A computer device receives a personal authentication statement from a user seeking to access concealed computer objects or applications on the computer device. A parser syntactically parses the personal authentication statement to extract a user-authentication token and a computer objects-authentication token. The computer objects-authentication token can identify one or more concealed computer objects on the computer device. The computer device reveals the one or more concealed computer objects to the user upon authentication of the user and verification that the authenticated user is authorized to access the concealed computer objects. | 11-21-2013 |
20130312088 | ELECTRONIC DEVICE AND METHOD FOR MANAGING ACCOUNTS AND PASSWORDS OF APPLICATION SYSTEMS - In a method for managing accounts and passwords of an application system using an electronic device, the method controls a fingerprint recognizing unit of the electronic device to capture a second fingerprint if a first fingerprint is stored in a storage device of the electronic device, and displays a login interface of the application system on a display screen of the computing device if the second fingerprint is the same with the first fingerprint. The method obtains the account and password of the application system from the storage device if the account and password of the application system is stored in the storage device, and inputs the account and password into two inputting boxes of the login interface of the application system. | 11-21-2013 |
20130312089 | APPARATUS FOR WAKING UP A SYSTEM AND THE COMPUTER SYSTEM USING THE SAME - An apparatus for waking up a computer system is disclosed. The apparatus is electrically coupled to a south bridge, or a Platform Controller Hub (PCH), having a first USB host interface. The apparatus comprises: a second USB host interface; a switch element, for electrically coupling a USB keyboard to either the first USB host interface or the second USB host interface; a control element, electrically coupled to the second USB host interface and the switch element; and a wake-up element, electrically coupled to the control element, wherein when the computer system enters a suspend-to-ram mode, a suspend-to-disk mode or a shutdown mode, the control element controls the switch element to electrically couple the USB keyboard to the second USB host interface; wherein when a user inputs a password, the second USB host interface receives the password and transfers it to the control element, and if the password matches the predetermined password, the control element wakes up the computer system and controls the switch element to electrically couple the USB keyboard to the first USB host interface. | 11-21-2013 |
20130312090 | METHODS AND SYSTEMS OF AUTHENTICATION - A method of authentication is provided that includes capturing palm biometric data from an individual, transmitting the biometric data to an authentication system, and generating an authentication biometric template from the captured biometric data with the authentication system. Moreover, the method includes conducting a plurality of verification matching transactions between the authentication biometric template and enrollment biometric templates stored in the authentication system, and between the authentication biometric template and imposter biometric templates stored in the authentication system. Furthermore, the method includes updating a genuine matching score distribution with at least one genuine matching score, updating an imposter matching score distribution with at least one imposter matching score, and calculating a maximum genuine matching score and a minimum imposter matching score. Additionally, the method includes confirming an identity of the individual when the minimum imposter matching score is greater than the maximum genuine matching score. | 11-21-2013 |
20130318597 | COMPUTER IMPLEMENTED SECURITY METHOD AND SYSTEM - A computer implemented security system ( | 11-28-2013 |
20130318598 | Alternative Unlocking Patterns - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for receiving, by a computing system that is locked, input from a user that provides an unlocking pattern. During entry of the unlocking pattern, a display of the computing system does not provide a visual indication of an action that will be performed upon the user completing the unlocking pattern. The computing system compares the provided unlocking pattern to a plurality of stored unlocking patterns to determine whether the provided unlocking pattern matches any of the stored unlocking patterns. The stored unlocking patterns are associated with respective actions that are performed upon completion of the respective unlocking patterns. The unlocking patterns are associated with a same level of unlocked security access to the computing system. The computing system responds by unlocking the computing system and performing the action that is associated with the matching unlocking pattern. | 11-28-2013 |
20130326613 | DYNAMIC CONTROL OF DEVICE UNLOCKING SECURITY LEVEL - Secure access of an electronic device may be dynamically controlled based on an adaptive algorithm. Secure access may comprise locking or unlocking of the electronic device. The adaptive algorithm may enable adjusting parameters used in determining when access to the electronic device is granted or denied. The parameters may comprise one or more thresholds used when comparing current user related information, such as biometric information, with corresponding prior information. The adaptive algorithm may enable adjusting the parameters based on valuation of information that may be exposed when the electronic device is accessed, probability of unwanted access, and/or acceptable cost of improper denial of access. | 12-05-2013 |
20130326614 | SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURE RESOURCES - A system and method for controlling access to a secure resource in a device are disclosed. In some embodiments, the device may include a processor capable of receiving a first request from a first application of a plurality of applications executable by the processor, where the first request requests access to the secure resource, and the first request identifies the plurality of applications. In response to the first request, the processor is capable of generating a ticket associated with the secure resource and with each of the plurality of applications, and then storing the ticket in a memory. After receiving a second request from a second application requesting access to the secure resource, the processor is capable of granting the second application access to the secure resource, if the ticket associated with the secure resource exists and if the ticket is associated with the second application. | 12-05-2013 |
20130333023 | ELECTRONIC PAPER WITH MODE SWITCH UNIT - Provided is electronic paper that includes an imaging sheet for displaying content, a memory for storing the content, a mode switch unit for manually setting an operation mode of the electronic paper, and a controller for performing at least one operation from a plurality of operations including encryption of the content stored in the memory, deletion of the content stored in the memory, deletion of content displayed on the imaging sheet from a screen, and display of a lock screen that requires input of a password on the imaging sheet, according to an operation mode that is set by a user using the mode switch unit. | 12-12-2013 |
20130333024 | RANDOM VALUE IDENTIFICATION DEVICE, RANDOM VALUE IDENTIFICATION SYSTEM, AND RANDOM VALUE IDENTIFICATION METHOD - It is not possible to identify a suitable random value that can increase the validity of data after adding a random data and causing the concealment of original data values. | 12-12-2013 |
20130340073 | Identification to Access Portable Computing Device - A portable computing device receives an identity card and restricts access to the portable computing device if the identity card is unassociated with the portable computing device. If access to the portable computing device is restricted, the portable computing device receives identification from a second portable computing device and grants access to the portable computing device if the identification is successfully authenticated. | 12-19-2013 |
20130347099 | KEYBOARD AS BIOMETRIC AUTHENTICATION DEVICE - Various embodiments are generally directed to use of a keyboard as a biometric authentication device. In one embodiment, for example, an apparatus comprises a processor circuit executing a sequence of instructions causing the processor circuit to receive a signal indicative of a keypress of at least one key of a keyboard communicatively coupled to the apparatus, and indicative of at least one physical characteristic associated with the keypress; compare the at least one physical characteristic to at least one stored physical characteristic associated with at least one authorized user of the apparatus; and determine if the keypress is associated with at least one authorized user of the apparatus based on the comparison. Other embodiments are described and claimed herein. | 12-26-2013 |
20130347100 | MOBILE INFORMATION TERMINAL, BEHAVIORAL FEATURE LEARNING METHOD, AND BEHAVIORAL FEATURE AUTHENTICATION METHOD - A mobile information terminal that can authenticate an authorized user by using behavioral features acquired when the user makes small movements in a limited movable range. The mobile information terminal includes a gripping feature sensor that acquires gripping features; a behavioral feature sample acquisition section that acquires time-series data of gripping features in a fiddling session as samples of behavioral features; a switch that puts the mobile information terminal into either a learning mode or an authentication mode; a template learning section that learns an authentication template by using the samples of behavioral features when in the learning mode; an authentication section that authenticates the user by comparing the samples of behavioral features with the learned authentication template when in the authentication mode; and an unlock section that unlocks all or some of the functions of the mobile information terminal when the authentication succeeds. | 12-26-2013 |
20130347101 | Terminal Authentication Method and Device - An authentication method includes sensing, pressure information through a touch screen. The pressure information includes a pressing strength value of a pressed contact when a user presses the touch screen. The sensed pressure information is compared with an authentication password by using the sensed pressure information as an authentication password. If the sensed pressure information matches the stored authentication password, it is determined that password authentication succeeds; otherwise, the password authentication fails. | 12-26-2013 |
20130347102 | Method, Apparatus and System for Access Mode Control of a Device - A method, apparatus, and system for accessing at least a portion of a device based upon an access input. An access input is received. The access input includes information for gaining access to one or more functions of the device. A user access mode of the device is changed from a first access mode to a second access mode based upon at least in part on the access input. An application is selected in the device in response to changing from the first access mode to the second access mode. At least a portion of the output of the selected application is provided. | 12-26-2013 |
20140007224 | REAL HUMAN DETECTION AND CONFIRMATION IN PERSONAL CREDENTIAL VERIFICATION | 01-02-2014 |
20140007225 | MULTI-PERSON GESTURAL AUTHENTICATION AND AUTHORIZATION SYSTEM AND METHOD OF OPERATION THEREOF | 01-02-2014 |
20140007226 | ELECTRIC APPARATUS, AUTHENTICATION DEVICE AND AUTHENTICATION METHOD | 01-02-2014 |
20140007227 | MOBILE INFORMATION TERMINAL AND GRIPPING-FEATURE AUTHENTICATION METHOD | 01-02-2014 |
20140013422 | Continuous Multi-factor Authentication - A method and computing device for continuous multi-factor authentication are included in which a plurality of valid authentication credentials may be detected. Also, an authorized user may be detected within a viewing area. Additionally, an unauthorized object may be detected in the viewing area. Furthermore, a display device may be prevented from displaying content. | 01-09-2014 |
20140013423 | SECURITY MODEL FOR NETWORK INFORMATION SERVICE - Systems and methods for providing information security in a network environment are disclosed. The method includes initiating processing, invoked by a user, of at least one of a plurality of objects in a processing unit of a hardware layer, wherein the plurality of objects is hosted for a tenant. The method further includes determining that the processing of the at least one of the plurality of objects by the processing unit is authorized by the tenant based on a security map provided by the tenant and accessible by the processing unit within the hardware layer. The method further includes allowing the processing of the object based on a result of the determining. | 01-09-2014 |
20140013424 | MOBILE TERMINAL AND APPLICATION PROGRAM LOGIN METHOD THEREOF - The present invention discloses a mobile terminal and an application program login method thereof. The method includes acquiring the to-be-authenticated fingerprint information inputted by a user when the user is required to log into an application program; determining whether the to-be-authenticated fingerprint information is the same as a correct fingerprint information which is locally preset and corresponds to the application program; if yes, then acquiring, according to the identifying fingerprint information, a user name and a password corresponding to the application program from a login information file which is locally preset; and logging into the application program according to the user name and the password. By logging into the application program via fingerprint, the present invention not only ensures the security of personal information, but also allows the user to quickly log into the application program, thereby improving user experience. | 01-09-2014 |
20140020087 | SENSORY ASSOCIATION PASSCODE - A device is secured against unauthorized use with a passcode based on a sensory association of a visual item with one or both of a sound clip and a tactile pattern. The sensory association passcode is encoded from one or more frames containing a user-selected combination of the visual item with the sound clip and/or the tactile pattern. The sensory association passcode can be further encoded with a sequence that indicates an order of the one or more frames of the passcode. Users can retrieve a portion of the sensory association passcode to facilitate recall of a forgotten passcode. The user-selected combination of the visual item with the sound clip and/or the tactile pattern facilitates easier recall of a passcode than might be possible with conventional passcode techniques. | 01-16-2014 |
20140020088 | AURAL CUING PATTERN BASED MOBILE DEVICE SECURITY - When visual focus on a mobile device is limited, aural cues can be used to aid in entering a pattern based access code. The mobile device displays a plurality of positions from which an access code for accessing a mobile device can be selected. Indications of a set of positions of the plurality of positions in a sequence are received. The sequence of the set of the positions form an access code. For at least the first of the set of positions, an aural cue associated with the first position is determined, and the aural cue is emitted to indicate the first position based on the aural cue. It is determined whether the access code is correct. Access to the mobile device is allowed if the access code is correct. | 01-16-2014 |
20140020089 | Access Control System using Stimulus Evoked Cognitive Response - The ACSSECR invention is a biometric access control system and methodology that measures cognitive, psychophysiological responses to stimuli to confirm the identity of an individual. As an alternative to “Logging in” with a user ID and password, this cognitive biometric authentication system is used for “Cogging in” to a system with user ID and user-selected “Cogkey”. ACSSECR is designed for strict access control scenarios where significant authentication confidence is required to gain access to controlled information, facilities, systems, vehicles, or devices. The system takes advantage of a behavioral and physiological characteristic of humans that is an unconscious response to a stimulus. The Event Related Potential (ERP) response (specifically the P3 ERP) involuntarily occurs when an individual perceives and reacts to an unexpected, task-relevant event. The task is for the user to recognize their Cogkey which is presented infrequently amidst more frequent non-target stimuli. There is no requirement for extensive enrollment by users, only the recognition of their Cogkey. The basic system does not store biometric data for comparison, but rather measures the user's Cogkey recognition responses in comparison to non-Cogkey stimulus responses. An individual can have multiple personas with different Cog keys. | 01-16-2014 |
20140020090 | BIOMETRIC AUTHENTICATION SYSTEM, BIOMETRIC AUTHENTICATION METHOD, AND RECORDING MEDIUM - A biometric authentication system ( | 01-16-2014 |
20140020091 | LOGIN METHOD BASED ON DIRECTION OF GAZE - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. A plurality of objects is displayed on a display screen. The plurality of objects includes at least objects that make up a plurality of objects of the user's passcode. In response to a trigger signal an image of the user's face is captured while looking at one of the objects on the display screen. A determination of which object is in the direction of the user's gaze is made from the image and whether or not the gaze is on an object which is part of the passcode. A plurality of trigger signals may be generated to capture a plurality of images. | 01-16-2014 |
20140026212 | User Identification with Biokinematic Input - Systems and methods for user identification based on biokinematic input are disclosed herein. The system may include a multi-touch sensitive display including a sensor configured to receive biokinematic input including data representing detected positions of digit touches made by digits of a user, in each of a series of successive time intervals during a defined identification gesture. The system may further include a user identification module executed by a processor of the computing device. The user identification module may be configured to receive the biokinematic input from the sensor, and to compare relative positions of the digit touches and/or relative rates of change in said positions of the digit touches to a stored user template of verified biokinematic data for the user. If a match is determined, an indication that the user has been successfully identified may be displayed. | 01-23-2014 |
20140033300 | SYSTEM AND METHOD FOR VERIFICATION OF USER IDENTIFICATION BASED ON MULTIMEDIA CONTENT ELEMENTS - A method and system for verifying an identity of a user accessing a user device are provided. The method includes receiving a request to verify the user identity accessing the user device; receiving a plurality of multimedia identification signals from the user device; querying a deep-content-classification (DCC) system to find a match between at least one concept structure associated with the user and the plurality of received multimedia identification signals, wherein the concept structure is created during a sign-in procedure; and sending an authentication notification upon determination of a match between the at least one concept structure and the plurality of received multimedia identification signals. | 01-30-2014 |
20140033301 | MOBILE DEVICE AND PUPIL RECOGNITION METHOD - A mobile device comprises a pupil information collecting module and a master control module, such that the pupil information collecting module may be used for collecting pupil characteristic information of a used. The master control module may receive the pupil characteristic information of the user when the user accesses a controlled unit, and may determine, on the basis of the pupil characteristic in formation of the user, if the user is allowed to access the controlled unit. The mobile device may use the pupil characteristic information of the user to perform identity verification. | 01-30-2014 |
20140041019 | ELECTRONIC DEVICE AND METHOD FOR HIDING LOGIN INFORMATION - A method for hiding login information on an electronic device includes determining whether the electronic device generates a login interface for indicating a user to input account information and password; stopping sending display information of the electronic device to an external electronic device when the electronic device generates the login interface for indicating the user to input account information and password; receiving input account information and password; determining whether the user finishes inputting account information and password; sending the display information of the electronic device to the external electronic device when the user finishes inputting account information and password or logs into the electronic device according to the input account information and password. The electronic device is also described. | 02-06-2014 |
20140041020 | ORIENTATION AWARE AUTHENTICATION ON MOBILE PLATFORMS - Systems and methods may provide for receiving an authentication input and determining an authentication orientation of a mobile platform during entry of the authentication input. In addition, a determination may be made as to whether to validate a user based on the authentication input and the authentication orientation of the mobile platform. Platform orientation may also be used to detect malware. | 02-06-2014 |
20140041021 | APPARATUS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR ENTERING SECURE PASSWORDS - Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application. | 02-06-2014 |
20140047537 | ACCESSING CONTACT RECORDS IN A DEVICE WITH MULTIPLE OPERATION PERIMETERS - A method and apparatus for accessing contact records in an electronic device with multiple operation perimeters is provided. When accessing contact records from within one operation perimeter, only contact information accessible from that operation perimeter is retrieved. An option is provided to also access contact records of an alternative operation perimeter. If the alternative operation perimeter has a higher security level than the current operation perimeter, a password or other authorization may be required. The contact records may be accessed, for example, to find information for an outgoing communication, to identify information associated with an incoming communication, or to edit a contact record. | 02-13-2014 |
20140053258 | HANDHELD DEVICE AND METHOD FOR UNLOCKING THE HANDHELD DEVICE - A method for unlocking a handheld device with a touch screen includes accessing a social network using login information, acquiring information of a plurality of friends from the social network. The method further includes creating an unlocking interface on the touch screen according to a second amount of a secondary key based on the plurality of friends and a question based on the first amount of a primary key based on the plurality of friends. An input event of a user on the unlocking interface is detected the handheld device is transitioned from a lock state to an unlock state upon the condition that the input event corresponds to a correct answer. | 02-20-2014 |
20140059673 | System and Method for Disabling Secure Access to an Electronic Device Using Detection of a Unique Motion - A system and method for providing secure authorization to an electronic device by combining two or more security features of authentication processed at substantially the same time where at least one of the factors is a “tolerant” factor. By combining two factors such as facial recognition and a screen gesture, these can be analyzed at substantially the same time except when a unique or individualized motion is detected. | 02-27-2014 |
20140059674 | AUTHENTICATION METHOD AND CODE SETTING METHOD AND AUTHENTICATION SYSTEM FOR ELECTRONIC APPARATUS - The present invention relates to an authentication method for electronic apparatus and authentication system, which comprises the steps of: enabling an electronic apparatus to be moved by a user from a first position to a second position; enabling an inertial sensor embedded in the electronic apparatus to detect and thus construct a three-dimensional continuous trajectory of the electronic apparatus's movement from the first position to the second position in a Cartesian coordination system composed of a first-direction axis, a second-second axis and a third-direction axis; and enabling a processor embedded in the electronic apparatus to perform either a process for registering the three-dimensional continuous trajectory as a standard movement trajectory; or a comparison between the three-dimensional continuous trajectory and a previously registered standard movement trajectory so as to authenticate the correctness of the three-dimensional continuous trajectory and thus authenticate the electronic apparatus. | 02-27-2014 |
20140059675 | BIOMETRIC AUTHENTICATION - A method of authenticating a user includes using at least one computer and connected scanner to obtain biometric measurements of a plurality of biometric parameters of the user. The parameters are stored as templates for comparison, as well as a sequence in which the plurality of biometric parameters are to be scanned in order to perform a valid authentication. Authentication is determined by comparing each biometric parameter submitted with the stored biometric templates, to determine if each biometric parameter matches a stored template. In addition, the sequence with which each matched template was presented is identified, and this sequence is compared with the stored sequence. If a predetermined number of biometric parameters match, and a predetermined number of elements in a sequence match, the user is authenticated. | 02-27-2014 |
20140068755 | MOBILE DEVICE CHILD SHARE - In embodiments of mobile device child share, a mobile device can display a default device lock screen on an integrated display device, and receive an input effective to transition from the default device lock screen to display a child lock screen without receiving a PIN code entered on the default device lock screen. The mobile device can receive a second input effective to transition from the child lock screen to display a child space. The mobile device implements a device share service that activates a child share mode of the mobile device, and restricts functionality of device applications and access to device content based on designated restriction limits. | 03-06-2014 |
20140068756 | SYSTEMS AND METHODS FOR CHALLENGE-RESPONSE ANIMATION AND RANDOMIZATION TESTING - Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise data. A challenge phrase comprising a plurality of characters may be determined, and a computer processor may divide the challenge phrase into at least two character subsets selected from the characters comprising the challenge phrase. Each of the at least two character subsets may include less than all of the characters comprising the challenge phrase. The at least two character subsets may be sent to the client in response to the request; and an answer to the challenge phrase may be received from the client in response to the at least two character subsets. Access to the protected content may be limited based on whether the answer correctly solves the challenge phrase. | 03-06-2014 |
20140068757 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND RECORDING MEDIUM - An authentication device includes an authentication unit configured to determine whether an input password input to a input unit matches a registered password registered in advance in a storage unit, count the number of times it is determined that the input password does not match the registered password, and stops authentication using a password if the number of times a mismatch is determined reaches a specified number, and a management unit configured to create an input error list supporting each of characters, digits, or other elements included in the registered password, on the basis of a history of errors of input to the input unit, and configured to cancel counting in a case where it is determined by the authentication unit that the input password does not match the registered password and a cause of the mismatch lies in an input error included in the input error list. | 03-06-2014 |
20140068758 | Method and System of Simulating a Pulse Generator on a Clinician Programmer - The present disclosure involves a method of simulating a pulse generator on a portable electronic device. A graphical user interface is provided via a touch-sensitive screen of the portable electronic device. The graphical user interface is configured to facilitate interactive user engagements with the portable electronic device. A pulse generator simulator is launched on the portable electronic device in response to a request from the user. The pulse generator simulator provides a virtual pulse generator that duplicates a plurality of functionalities and features of an actual pulse generator. The virtual pulse generator is programmed based on user input received via the graphical user interface. One or more statuses of the virtual pulse generator are then displayed via the graphical user interface. | 03-06-2014 |
20140068759 | Secure Connected Digital Media Platform - An embodiment of the invention provides a system including a secure media device having one or more security keys stored therein. The secure media device is housed in a device that is connected to a television unit and a network. Secure application environments are housed in the device, wherein each secure application environment is operationally isolated from one another. The secure application environments receive and process information sent over the network only if the information includes a security code corresponding to the security key in the secure media device. The security code is obtained from a clearinghouse when the information satisfies predetermined criteria. More specifically, the clearinghouse receives a copy of the security key from a manufacturer of the secure media device and creates the security code based on the security key. | 03-06-2014 |
20140075548 | GESTURE- AND EXPRESSION-BASED AUTHENTICATION - A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in addition, the user can define a second input mode based on face recognition plus IR sensing satisfying a threshold to ensure a live person is being imaged for authentication, and/or face recognition plus a particular facial expression such as a smile and wink. | 03-13-2014 |
20140075549 | SYSTEM AND METHOD FOR PROVIDING GESTURE-BASED USER IDENTIFICATION - A mechanism for allowing a user to prove their identity on touch-based devices employing the use of a touch surface in firmware-controlled environments is discussed. The user may prove his or her identity by entering a series of strokes on the touch-based device to form a word or image. Characteristics of the entered strokes such as stroke order and stroke direction are compared to stored stroke characteristics that were gathered from a drawing of the same word or image during a user enrollment process. If the stroke characteristics comparison is acceptable, the user identity is verified. | 03-13-2014 |
20140075550 | HARDWARE-ENFORCED ACCESS PROTECTION - The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device. | 03-13-2014 |
20140075551 | METHOD AND APPARATUS TO MANAGE USER ACCOUNT OF DEVICE - A method and apparatus to manage a user account. The method includes: setting a plurality of authorization accounts defining usage right regarding functions of the device; mapping at least one of the plurality of authorization accounts to a user authentication account of the device, based on an input of a user; and executing an application installed in the device using a result of the mapping the authorization account and the user authentication account, without stopping running of an operation system of the device. | 03-13-2014 |
20140075552 | AUTHENTICATION USING MULTI-TIER MULTI-CLASS OBJECTS - The invention provides a method and apparatus for authenticating a user in a touchscreen environment. A first tier may be defined having at least one object, and a destination tier may be defined having at least one bin. An authentication-key may be registered, the authentication-key comprising a length defining a number of nodes and a correct sequence of nodes, each node specifying a movement of one object from the first tier to one bin of the destination tier. A user sequence of at least one touchscreen gestures is received, each gesture specifying that one object from the first tier should be moved to one bin of the destination tier. Access is permitted if the at least one touchscreen gestures corresponds to the length, the correct sequence, and the movement of the authentication-key. | 03-13-2014 |
20140082722 | Computer Recovery or Return - A computer return apparatus includes a processor. The apparatus includes a memory connected to the processor. The apparatus includes a display. The apparatus includes a return screen that the processor automatically causes to appear during or after boot-up of the processor on the display, that displays information concerning an owner who owns the computer, concerning user information about who the user is who the computer is assigned to for use, and return information for returning the computer to the owner from data stored in the memory. A method for displaying information to assist with returning a computer to its owner. | 03-20-2014 |
20140090052 | METHOD FOR INPUTTING A CODE USING A PORTABLE DEVICE, AND ASSOCIATED PORTABLE DEVICE - A method and apparatus are provided for entering a code using a portable device. The method includes measuring at least one angle of inclination of the portable device and generating an input code from the measured angle of inclination. | 03-27-2014 |
20140096238 | ELECTRONIC DEVICE, OPERATOR ESTIMATION METHOD AND PROGRAM - An electronic device includes: a touch detection section that is disposed on a side surface of a casing of a main body so as to detect a touch condition when an operator touches the main body; a touch change extraction section that extracts one of a temporal change and a spatial change in the touch based on the detected touch condition; and an estimation section that determines the identity of the operator based on the one of the extracted temporal change and spatial change in the touch. | 04-03-2014 |
20140096239 | SYSTEMS AND METHODS FOR CLIENT SCREENING IN THE FINANCIAL SERVICES INDUSTRY - Systems, methods, and interfaces for screening clients for security compliance with a Customer Identification Program are disclosed. An illustrative system for screening clients can include a client screening engine adapted to filter client account data based on one or more filtering criteria, a database adapted to store client account information and verification status information, and a graphical user interface adapted to selectively display client account information and verification status information for one or more selected clients on a screen. The system can be used to submit identity verification requests to Customer Identification Program vendors for only those clients whose identity have not been verified. | 04-03-2014 |
20140101754 | METHODS AND SYSTEMS FOR ALLOCATING A USB DEVICE TO A TRUSTED VIRTUAL MACHINE OR A NON-TRUSTED VIRTUAL MACHINE - The methods and systems described herein provide for allocating a universal serial bus (USB) device to one of a trusted virtual machine and a non-trusted virtual machine. A control program receives data indicating a USB port on the computing machine received a USB device and identifies at least one attribute of the USB device. The control program selects, based on application of a policy to the identified at least one device attribute, one of a trusted virtual machine and a non-trusted virtual machine executing. The control program grants, to the virtual machine selected by the control program, access to the USB device. | 04-10-2014 |
20140109219 | TRANSITIONING BETWEEN ACCESS STATES OF A COMPUTING DEVICE - Aspects of this disclosure are directed to outputting, for display at a presence-sensitive display, a first set of two or more selectable objects in a first arrangement of locations, the computing device operating in a first instance of a limited access state. At least one of the selectable objects includes an element of a predetermined passcode. The computing device may receive an indication of a first gesture to select one of the selectable objects and an indication of a second gesture to designate the selected object as an element of a candidate passcode. The computing device may transition to an access state based at least in part on a comparison between the candidate passcode and the predetermined passcode. The computing device may transition to a second instance of the limited access state, and may output a second set of two or more selectable objects in a second, different arrangement. | 04-17-2014 |
20140109220 | TRUST RETENTION - A method, system and computer program product for retaining trust. A computer receives a correct password for administrative access. The computer sets a trust to a maximum level. The computer detects at least one period of inactivity. The computer adjusts a trust based on the at least one period of inactivity. The computer receives a request to access an privileged function. The computer, responsive to receiving the request, determines that the trust is below a trust threshold. The computer, responsive to determining that the trust is below the trust threshold, challenges the user to authenticate. The computer receives a authentication attempt. The computer determines whether the authentication attempt is correct. The computer, responsive to a determination that the authentication attempt is correct, grants access to the administrative function. | 04-17-2014 |
20140109221 | USER DEVICE, METHOD OF USING FUNCTION LOCK OF THE SAME AND COMPUTER-READABLE RECORDING MEDIUM - Provided are a user terminal having an enhanced privacy protection function, a method of using a lock function of the user terminal, and a computer-readable recording medium. The user terminal includes a lock function executing unit that receives an execution command from a service server to execute a lock function, a fingerprint input displaying unit that displays a fingerprint input requesting window when an operation command is input, a fingerprint sensor unit that receives fingerprint information, and a lock function releasing unit that releases the lock function when the fingerprint information input through the fingerprint sensor unit is identified with preregistered fingerprint information. | 04-17-2014 |
20140115694 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140115695 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140115696 | Embedded Authentication Systems in an Electronic Device - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile). | 04-24-2014 |
20140115697 | Data Management Method and Apparatus - The present invention relates to communications technologies and discloses a data management method and apparatus, so as to solve a problem of customer churn for an operator caused by existing data management. The technical solutions provided in the embodiments of the present invention include: acquiring an operator identification code of a terminal and a preset terminal identification code, where the terminal identification code is not rewritable and uniquely corresponds to the terminal; performing a hash operation on first data by using a preset hash algorithm to obtain a first hash value; detecting whether a signature is consistent with the first hash value to obtain a detection result; and determining whether the terminal has permission to be used according to the detection result. The embodiments of the present invention can be applied to a mobile terminal such as a mobile phone. | 04-24-2014 |
20140123275 | SYSTEM AND METHOD FOR DISABLING SECURE ACCESS TO AN ELECTRONIC DEVICE USING DETECTION OF A PREDETERMINED DEVICE ORIENTATION - A system and method for providing secure authorization to an electronic device by combining two or more security features of authentication processed at substantially the same time where at least one of the factors is a “tolerant” factor. By combining two factors such as facial recognition and a screen gesture, these can be analyzed at substantially the same time except when a device is oriented in a predetermined position or a unique or individualized motion is detected. | 05-01-2014 |
20140130148 | INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM - An information processing device includes a display that displays an input screen including a plurality of images, an image selecting section that selects at least one image within the input screen in accordance with an input operation from a user, and a controller that controls the information processing device on a basis of the image selected by the image selecting section. | 05-08-2014 |
20140137234 | MOBILE DEVICE AUTHENTICATION THROUGH TOUCH-BASED GESTURES - A method, system, and apparatus of a touch-based authentication of a mobile device through user generated pattern creation are disclosed. In one embodiment, a method of a mobile device includes recognizing a tactile force on a touch screen without a visual aid as an unlocking gesture, storing the unlocking gesture to a memory of the mobile device, associating another tactile force on the touch screen with the unlocking gesture, and transforming the mobile device from an initial state to an unlocked state based on the association between the another tactile force and the unlocking gesture. The method may include transforming the mobile device to operate as a telephonic communication device in the unlocked state. | 05-15-2014 |
20140143858 | PROCESSING ARRANGEMENT AND A METHOD FOR PROCESSING INFORMATION IN A MACHINE-TO-HUMAN COMMUNICATIONS INTERFACE - A processing arrangement in accordance with various embodiments may include: a security element configured to generate a digital image; a display device configured to receive the digital image from the chip card, and to display the digital image; and an input device configured to receive a user input, wherein the user input identifies a part of the digital image, and wherein the input device is further configured to provide the chip card with information indicating which part of the digital image is identified by the user input. | 05-22-2014 |
20140143859 | UNLOCK TOUCH SCREEN USING TOUCH PASSWORD - A method for unlocking a touch screen includes: in response to tapping by a user on a screen, receiving a time sequence of data samples representing the tapping by the user; comparing the time sequence of data samples with a stored data samples to determine if the time sequence of data samples matches the stored data samples; if there is a match, unlocking, the screen; and if there is no match, notifying the user. | 05-22-2014 |
20140143860 | TWO TIER VERIFICATION SYSTEM AND METHOD - A system method and device for multi-tier authentication, the method including obtaining at least one of a series of images of a registered personal item using an image sensor of a portable computing device and verifying that the registered personal item appears in a pre-designated zone within each image of said at least one of a series of images, such that the personal item appearance in the pre-designated zone follows a predetermined pattern. | 05-22-2014 |
20140143861 | COMPUTER WITH SAFEGUARD FUNCTION - A computer includes a storage unit, a communication unit, and a processor. The storage unit stores a password. The communication unit communicates the computer with a portable communication device. The processor includes a starting control module. During the booting up of the computer, when a password received by the communication unit from the portable communication device matches with the password stored in the storage unit, the starting control module controls the computer to start normally. | 05-22-2014 |
20140143862 | MECHANISMS TO SECURE DATA ON HARD RESET OF DEVICE - Mechanisms to secure data on a hard reset of a device are provided. A hard reset request is detected on a handheld device. Before the hard reset is permitted to process an additional security compliance check is made. Assuming, the additional security compliance check is successful and before the hard reset is processed, the data of the handheld device is backed up to a configurable location. | 05-22-2014 |
20140150090 | CHALLENGE-RESPONSE METHODOLOGY FOR SECURING VEHICLE DIAGNOSTIC SERVICES - A method for locally authenticating a vehicle diagnostic tool with a vehicle using a challenge-response authentication scheme includes: receiving a pairing request from the vehicle diagnostic tool; presenting a user with a challenge through at least one of an audio system and an LCD display associated with the vehicle; receiving a response to the challenge from a user; and authenticating the vehicle diagnostic tool if the response from the user is identical to an expected response. | 05-29-2014 |
20140150091 | BIOMETRIC SENSOR FOR HUMAN PRESENCE DETECTION AND ASSOCIATED METHODS - An electronic device may include a communications interface, a user prompting device, a biometric sensor, and a controller. The controller may perform biometric spoof detection with the biometric sensor, and receive a request for human presence verification from a remote device via the communications interface. The controller may also prompt the user for a verification action using the sensor based upon receiving the request, and determine that the user has completed the verification action in response to the prompting and based upon the biometric spoof detection. The controller may further send a response to the remote device via the communications interface and based upon determining that the user has completed the verification action. The controller may send a notification to the remote device that there is a biometric sensor. | 05-29-2014 |
20140157402 | USER ACCESS CONTROL BASED ON HANDHELD DEVICE ORIENTATION - Disclosed is a novel system, computer program product, and method for allowing access to an application on a handheld device. This is also known as logging on or password entry. The method begins with detecting a change in at least one of orientation and position of a handheld device relative to a given plane. At least one of a keyboard, a touch screen, a gesture, and voice recognition engine input is received. Based on a combination of the at least one of orientation and position of the handheld and the user input received matching a previously stored value, unlocking access to an application running on the handheld device. The detecting of the change in orientation or position or both can occur simultaneously with the user input or previous to the user input or after the user input. | 06-05-2014 |
20140157403 | TRANSITIONING BETWEEN ACCESS STATES OF A COMPUTING DEVICE - Aspects of this disclosure are directed to outputting, for display at a presence-sensitive display, a first set of two or more selectable objects in a first arrangement of locations, the computing device operating in a first instance of a limited access state. At least one of the selectable objects includes an element of a predetermined passcode. The computing device may receive an indication of a first gesture to select one of the selectable objects and an indication of a second gesture to designate the selected object as an element of a candidate passcode. The computing device may transition to an access state based at least in part on a comparison between the candidate passcode and the predetermined passcode. The computing device may transition to a second instance of the limited access state, and may output a second set of two or more selectable objects in a second, different arrangement. | 06-05-2014 |
20140165184 | Electro-Biometric Authentication - Electro-biometric data obtained from a user of a processor-based device may be used to authenticate that user. In some cases, no special action may need to be taken to initiate authentication. | 06-12-2014 |
20140165185 | Multi Electro-Biometric User Recognition - A pair of contacts on a processor-based device may be used to collect two different types of human physiological data. That data may then be used to authenticate the user of such a device. | 06-12-2014 |
20140165186 | GEOMETRICAL PATTERN BASED APPLICATION PASSCODE - To authorize an access to an application, a user interface renders a geometrical pattern on receiving a trigger to access the application. The rendered geometrical pattern includes an instance of an arrangement of one or more first nodes and one or more second nodes. The rendered geometrical pattern is associated with an input type to receive a selection of the first nodes and the second nodes. The selection of the first nodes and the second nodes is received as an authorizing key. The authorizing key is matched with an authorizing passcode stored in memory to provide access to the application. | 06-12-2014 |
20140165187 | Method, Apparatus, and Computer-Readable Recording Medium for Authenticating a User - Provided are a method, apparatus, and computer-readable recording medium for authenticating a user. The user authentication method includes obtaining an image including a face and a face movement by driving a camera to extract feature information on a facial image and a movement pattern from the obtained image, and comparing the extracted feature information on the facial image with feature information on a facial image registered in a storage and, when the extracted feature information matches the registered feature information, comparing the extracted movement pattern with a movement pattern registered in the storage and, when the extracted movement pattern matches the registered movement pattern, unlocking a device. | 06-12-2014 |
20140173718 | MICROCOMPUTER, MIDDLEWARE, AND OPERATING METHOD FOR THE SAME - A microcomputer has a processing unit; a plurality of registers; a storage storing hardware initialization data that includes an initial value and a register address in which the initial value is set, the processing unit performing a process including: setting the initial value in a register having the register address based on the hardware initialization data; performing a functional capability limitation releasing processing to determine whether authentication data in an authentication register, which is selected in advance from the plurality of registers, is correct based on an authentication information for releasing limitations on a functional capability of a function, and to put a function corresponding to the authentication information into an executable state when the authentication data is correct; and executing the function which is put into the executable state to realize the functional capability of the executed function. | 06-19-2014 |
20140173719 | INDUSTRIAL MANIPULATING SYSTEM WITH MULTIPLE COMPUTERS AND INDUSTRIAL MANIPULATING METHOD - An industrial manipulating system includes a plurality of computers and an input assembly shared by the computers. A response capability of the computer is interrupted to operation commands. A camera is used to take a photograph of a current operator and determination is made whether the photograph contains a face image of the current operator. The response capability of the identified computer is restored to the operation commands when the photograph contains the face image of the current operator. | 06-19-2014 |
20140181957 | METHODS AND APPARATUS FOR AUTHENTICATING USER LOGIN - Example methods and apparatus for authenticating a user login are disclosed herein. An example method includes displaying an image and dynamically presenting symbols adjacent the image. The example method includes receiving a code, the code formed by an arrangement of one or more of the symbols on the image. The example method includes authenticating a user based on the code. | 06-26-2014 |
20140181958 | SECURE AND CONVENIENT AUTHENTICATION - The claimed subject matter provides an apparatus for facilitating no-look one-handed authentication. The apparatus includes logic to identify whether a user-manipulatable input is in one of a plurality of possible states for a time period, and authenticate a user based at least partially on identification that the user-manipulatable input is in the one of the plurality of possible states for the time period. | 06-26-2014 |
20140181959 | SECURE ELEMENT BIOMETRIC AUTHENTICATION SYSTEM - An input device may be in communication with an application processor, wherein the input device may be configured to receive an input and the application processor may be configured to translate the input to a received template. A secure element may be in communication with the application processor and configured to receive the received template from the application processor. The secure element may include a matcher and an enrolled template database. The matcher may be configured to compare the received template from the application processor with an enrolled template within the enrolled template database and return a match status based on the comparison. | 06-26-2014 |
20140181960 | METHODS AND APPARATUSES FOR CONTROLLING ACCESS TO COMPUTER SYSTEMS AND FOR ANNOTATING MEDIA FILES - Methods and apparatuses for controlling access to computer systems and for annotating media files. One embodiment includes a method including generating a challenge to a user, wherein the challenge includes a verify part and a read part. The methods also includes prompting the user to solve both the verify part of the challenge and the read part of the challenge; receiving input from the user; determining if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge; and identifying the input from the user relative to the read part of the challenge as an answer to the read part of the challenge, if the input from the user relative to the verify part of the challenge corresponds with the known answer for the verify part of the challenge. | 06-26-2014 |
20140181961 | ELECTRONIC DEVICE AND METHOD FOR UNLOCKING ELECTRONIC DEVICE - In a method for unlocking an electronic device, a plurality of icons are preset and an icon is designated to be an unlocking icon for unlocking the electronic device. When the electronic device is locked, the icons are moving on the display device, and the moving icons is highlighted one by one according to a moving direction and a time interval. When a highlighted icon is touched and the highlighted icon is the unlocking icon, the electronic device is unlocked. | 06-26-2014 |
20140181962 | APPLICATION EXECUTING METHOD USING FINGERPRINT RECOGNITION, DEVICE THEREFOR, AND COMPUTER READABLE RECORDING MEDIUM THEREFOR - An application-executing method using fingerprint recognition wherein an application-executing device executes an application using fingerprint recognition, includes recognizing a fingerprint from a fingerprint image obtained through a fingerprint sensor in a locking state of the application-executing device, activating a specific area that is part of a locking state screen of the application-executing device when the fingerprint is recognized, displaying a list of a plurality of applications in the specific area, receiving selection information of at least one application from the list of the plurality of applications, and executing an application according to the selected information. | 06-26-2014 |
20140181963 | ELECTRONIC DEVICE AND FILE PROTECTION METHOD - In a file protection method, when a request for opening a protected file is received, an environment image is captured, and character features in the environment image are extracted. The extracted character features are compared with character features of one or more authorized users that are pre-stored in a storage device, to determine if the environment image contains character features that match with the pre-stored character features of an authorized user. The content of the file is shown on the display device when the environment image contains character features that match with the pre-stored character features of an authorized user, and the file is forbidden to open when the environment image does not contain character features that match with the pre-stored character. | 06-26-2014 |
20140181964 | METHOD FOR MANAGING SECURITY FOR APPLICATIONS AND AN ELECTRONIC DEVICE THEREOF - Security management in an electronic device is provided. An method of the electronic device includes displaying an icon of an application having a first security level in a first region which occupies part of an interface, and displaying an icon of an application having a second security level in a second region which occupies an exclusive part of the first region. | 06-26-2014 |
20140189854 | TECHNIQUES FOR SKIN TONE ACTIVATION - Techniques may be used to authenticate a user to a computing device using their skin tone. A color sample may be received while a computing device remains in a power saving state. A user may be authenticated when the color sample matches a skin tone record. The computing device may be placed in an active state when the user is authenticated. Other embodiments are described and claimed. | 07-03-2014 |
20140189855 | Gestures for Unlocking a Mobile Device - Methods for recognition and interpretation of pinch-in and pinch-out gestures for unlocking a screen of a mobile device, which has been locked to prevent accidental activation of device functionalities while being carried, such as in pocket or purse. | 07-03-2014 |
20140189856 | METHOD AND APPARATUS FOR INPUTTING PASSWORD USING GAME - An apparatus for inputting a password using a game may include a password image display unit to display at least one group password image including at least one password image, in at least one region of a display device, a receiving unit to receive at least one piece of motion information from an external input device, a character image display unit to display, on the display device, a character image that may move based on the at least one piece of motion information, a determination unit to determine which of the at least one group password image the character image contacts, and to determine which of at least one password image included in the contacted group password image is selected when a contact takes place as a result of the determination, and an authentication unit to control a user authentication procedure to be performed based on password information corresponding to the selected password image. | 07-03-2014 |
20140196143 | METHOD AND APPARATUS FOR REAL-TIME VERIFICATION OF LIVE PERSON PRESENCE ON A NETWORK - A method for real-time verification of live person presence at a network location comprises the following steps: receiving a verification request at a network location; generating a real-time security indicia; displaying the real-time security indicia on a display screen at the network location; capturing with a back-facing camera at the network location, a real-time image of the field of view (FOV) in front of the display screen displaying the security indicia; detecting a human face in the FOV image; detecting an eye region of the human face in the FOV image; and detecting a reflected image of the security indicia in the eye region in the FOV image. If the reflected image of the security indicia is not detected in the eye region of the FOV image, the verification attempt is deemed unsuccessful, whereas if the reflected image of the security indicia is detected, the verification attempt is deemed successful. | 07-10-2014 |
20140201831 | METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD OF USER TERMINAL - Provided are method and apparatus for authenticating a password of a user terminal. The method includes: pre-setting, by a user, a password and an identification image for identifying the password; moving a keypad window or an image window realized on a screen of the user terminal according to an action of the user; determining, when a plurality of images included in the image window and a plurality of keys included in the keypad window sequentially overlap with each other, whether a plurality of keys and the identification image corresponding to the password sequentially overlap; and authenticating the password when the plurality of keys and the identification image corresponding to the password sequentially overlap. Accordingly, password information may be protected from a third person observation as the user inputs a pre-set password in an indirect method without having to directly input the pre-set password through an authentication interface. | 07-17-2014 |
20140201832 | METHOD AND APPARATUS FOR AUTHENTICATING PASSWORD OF USER TERMINAL BY USING PASSWORD ICON - Provided are method and apparatus for authenticating a password of a user terminal by using a password icon. The method includes: method of authenticating a password of a user terminal, the method including: pre-setting, by a user, a password icon corresponding to a password and a moving direction of the password icon; sequentially moving the icon according to actions of the user at a screen of the user terminal; when the icon is sequentially moved, determining whether the pre-set password icon and the pre-set moving direction of the password icon are matched; and authenticating the password when the password icon and the moving direction of the password icon is sequentially matched. | 07-17-2014 |
20140201833 | ELECTRONIC DEVICE AND METHOD FOR FAST ACTIVATING APPLICATION AFTER UNLOCKING - A method for fast activating applications of an electronic device having a touch screen displays a predetermined unlocking interface on the touch screen when the electronic device wakes from an idle state. The predetermined unlocking interface includes a plurality of pattern drawing regions. Each pattern drawing region corresponds to a predetermined application of the electronic device. When a pattern drawn by the user within any of the pattern drawing regions is the same as a preset unlocking pattern, the electronic device is unlocked. Then, an application of the electronic device corresponding to one of the pattern drawing regions in which the pattern is drawn is activated. | 07-17-2014 |
20140201834 | COMPUTER APPLICATION SECURITY - A method of providing restricted access to computer application information via a computing device includes: displaying a limited-access icon on a display of the computing device, the limited-access icon including a function indicator and code-entry segments that can be selected by a user of the computing device, each of the code-entry segments including a visual indicator; receiving a selection sequence of user selections of selected ones of the code-entry segments; and performing a limited-access function corresponding to the function indicator in response to the selection sequence corresponding to an authorized sequence. | 07-17-2014 |
20140208417 | SYSTEMS AND METHODS FOR CONTINUOUS BIOMETRIC AUTHENTICATION AND PRESENCE DETECTION OF USER OF AN INFORMATION HANDLING SYSTEM - In accordance with embodiments of the present disclosure, an information handling system may include a user interface and a processor communicatively coupled to the user interface. The user interface may comprise a touch sensor configured to detect biometric fingerprint data of a human interacting within a user-interactive area of the user interface. The processor may be configured to receive biometric fingerprint data from the user interface inputted via the user interface during the human's natural interaction with the user interface. The processor may be further configured to determine if the biometric fingerprint data is that of an authorized user of the information handling system. The processor may also be configured to restrict access to the information handling system in response to determining that the biometric fingerprint data is not that of an authorized user of the information handling system. | 07-24-2014 |
20140208418 | AUTOMATIC PROTECTION OF PARTIAL DOCUMENT CONTENT - Protecting a fragment of a document includes automatically detecting the fragment without user intervention based on the content of the fragment and/or the context of the fragment within a set of documents, selectively encrypting the fragment to prevent unauthorized access, and providing an alternative view of the fragment that prevents viewing and access of content corresponding to the fragment unless a decryption password is provided. Automatically detecting the fragment may include detecting numbers and alphanumeric sequences of sufficient length that do not represent commonly known abbreviations, detecting generic terms, detecting proper names, detecting terms signifying a type of content, detecting mutual location of terms and sensitive content, and/or detecting user defined terms. The generic terms may correspond to password, passcode, credentials, user name, account, ID, login, confidential, and/or sensitive. The proper names may be names of financial organizations and security organizations. | 07-24-2014 |
20140223546 | ACCESS CONTROL SYSTEM AND METHOD WITH GPS LOCATION VALIDATION - An access control system and method with location validation are provided. The method can include receiving a request from an authentication factor, identifying a location module associated with the authentication factor, identifying a location of the location module, and determining whether the location module is within a predetermined distance from the authentication factor or a control system, including an access panel of the control system, that received the request from the authentication factor. When the location module is within the predetermined distance from the authentication factor or the control system that received the request from the authentication factor, the method can include granting the request received from the authentication factor. However, when the location module is not within the predetermined distance from the authentication factor or the control system that received the request from the authentication factor, the method can include denying the request received from the authentication factor. | 08-07-2014 |
20140223547 | ALTERNATE GAME-LIKE MULTI-LEVEL AUTHENTICATION - The disclosed embodiments provide a convenient way for users to access segregated work spaces on mobile devices. A game-like multi-level interactive approach is used to prompt users for input to verify their identity. Multiple identity verification attributes can be collected at each level of interaction. Authentication is achieved when a settable level of user identification confidence is reached. This can potentially reduce the amount of interaction needed as compared to requiring a user to type in a long, cryptic password. | 08-07-2014 |
20140223548 | ADAPTING CONTENT AND MONITORING USER BEHAVIOR BASED ON FACIAL RECOGNITION - The invention is directed to systems, methods and computer program products for adapting content and monitoring user behavior based on facial recognition. An exemplary method comprises: receiving, at a first device, image data from a second device; determining whether the image data substantially matches second image data in a database of image data; in response to determining the image data substantially matches the second image data, determining an account associated with the image data; determining a first set of data associated with the account; and transmitting the first set of data to the second device, wherein the first set of data is used to configure an application being executed on the second device. | 08-07-2014 |
20140223549 | Passwords for Touch-Based Platforms Using Time-Based Finger Taps - A gesture-based method is disclosed for authenticating a user. More specifically, the user of an information handling system is prompted to enter a passcode finger tap sequence input gesture via a touch-sensitive device. The finger tap sequence input gesture is processed to generate a passcode finger tap sequence. The passcode finger tap sequence is then compared to a previously-generated authentication finger tap sequence. If the two finger tap sequences match, then the user is authenticated. | 08-07-2014 |
20140223550 | TWO PHASE PASSWORD INPUT MECHANISM - An apparatus and method for a two phase password input mechanism are provided. The method includes resetting a password entry, displaying a password entry screen, inputting a password element of a plurality of password elements, determining whether the entered password is complete, determining whether the entered password is correct when the entered password is complete, and if the entered password is correct, unlocking the mobile device. The plurality of password elements include at least two elements that cannot be observed from a same viewpoint. | 08-07-2014 |
20140223551 | ELECTRONIC DEVICE AND CONTROL METHOD FOR ELECTRONIC DEVICE - An electronic device includes a base and a cover rotatably attached to the base. An identification unit is located on the cover. The identification unit is used to sense a gesture to rotate the cover relative to the base. The disclosure further offers a control method for the electronic device. | 08-07-2014 |
20140223552 | AUTHENTICATION SYSTEM AND METHOD THEREFOR - An authentication system is disclosed. The system comprises means for receiving an authentication request associated with the transaction wherein the request comprises data identifying a communication device associated with a user authorised to perform the transaction; means for sending a Mobile Application Part, MAP, protocol request message in response to the authentication request; means for receiving, in response to the MAP protocol request, data indicative of whether a communication sent to the communication device will be forwarded to a different communication device. The received data indicative of whether a communication sent to the communication device will be forwarded to a different communication device is used in determining whether to authenticate the transaction. | 08-07-2014 |
20140237588 | METHOD AND SYSTEM FOR MANAGING AND CONTROLLING DIRECT ACCESS OF AN ADMINISTRATOR TO A COMPUTER SYSTEM - A method and computer program product for managing and controlling direct access of an administrator to a computer system. At least one computer program on the computer system receives from the administrator a request for the direct access to the managed computer system directly from the system console and requests a service management system to search open tickets. In response to that the open tickets are found, the at least one computer program requests the administrator to choose at least one ticket from the open tickets and grants the administrator the direct access to the computer system in response to determining that the at least one ticket is valid. | 08-21-2014 |
20140237589 | Personalization Data of an Active Application - A device to detect biometric information of a user, identify the user based on the biometric information, identify an active application of the device and identify metadata of the active application associated with the user, and modify personalization data of the active application with the metadata associated with the user. | 08-21-2014 |
20140245431 | GUI-Based Authentication for a Computing System - Machines, systems and methods for providing an authentication challenge are provided. The method comprises analyzing data stored in a computing system equipped with a graphical user interface (GUI), wherein the data stored is related to identity and relationships among items that have a profile; and based on the analysis, issuing a challenge to authenticate access to one or more content or services available by way of the computing system, in response to a user interaction with the computing system, wherein the response to the challenge is known to a user who has personal knowledge of the identity and relationships among the items with a profile, and wherein the user successfully authenticates against the challenge by interacting with visual presentations of the items by placing the items in an order that indicates a correct relationship between at least two or more of the items. | 08-28-2014 |
20140245432 | ELECTRONIC DEVICE AND UNLOCKING METHOD THEREOF - An electronic device includes a touch screen. When the electronic device wakes up and works in a locked state, a notification interface including a predetermined unlocking area is displayed on the touch screen. A user pattern formed by at least two fingers of a user located within the predetermined unlocking area is detected. The electronic device is unlocked if the user pattern matches a predetermined unlocking pattern. | 08-28-2014 |
20140245433 | PASSWORD AUTHENTICATION - A method and apparatus for password authentication. The password authentication method, includes: generating a group of sequential candidate characters according to a user's operations to a keyboard, at least one key on the keyboard being associated with at least two characters, wherein the user's single operation of any one key results in characters associated with that key being selected as candidate characters with the same ranking; and authenticating whether a character string formed by the sequential candidate characters matches the password of the user. The password authentication apparatus for accomplishing the same. | 08-28-2014 |
20140245434 | INPUT DEVICE FOR INPUTTING PASSWORD OR THE LIKE AND MOBILE TELEPHONE HAVING THE INPUT DEVICE - A contact sensor capable of inputting a character by tracing a character with user's finger is arranged in a region of a ten-key unit of a mobile telephone. When registering a password to release a key lock, a user traces a shape of a line, a character, a number, or other symbol on the contact sensor with his/her finger so that the shape is inputted and stored in a memory, thereby completing registration of a password. When releasing the key lock, the user traces the registered shape on the contact sensor with his/her finger so that the key lock is released. The input is easy. Even if the password input operation is observed by a third person, the password will not be easily known to the third person. | 08-28-2014 |
20140250523 | Continuous Authentication, and Methods, Systems, and Software Therefor - Controlling a registered-user session of a registered user on a device using first and second authentication processes and a handoff from the first process to the second process. In one embodiment, the first authentication process is a stronger process performed at the outset of a session, and the second authentication process is a weaker process iteratively performed during the session. The stronger authentication process may require cooperation from the user, while the weaker authentication process is preferably one that requires little or no user cooperation. In other embodiments, a strong authentication process may be iteratively performed during the session. | 09-04-2014 |
20140259153 | SECURE DATA ACCESS IN HYBRID DISK DRIVE - Data are accessed securely in a data storage device that includes a non-volatile solid-state storage device integrated with a magnetic storage device. An identical copy of drive security data, such as an encrypted version of a drive access password, is stored in both the non-volatile solid-state storage device and in the magnetic storage device. In response to receiving a command from a host device that results in access to the magnetic storage device, access is granted to the magnetic storage device if the copy of drive security data stored in the non-volatile solid-state storage device matches the copy of drive security data stored in the magnetic storage device. Furthermore, encrypted drive-unique identification data associated with the drive may be stored in both the non-volatile solid-state storage device and the magnetic storage device, and access is granted if both copies of the encrypted drive-unique identification data match. | 09-11-2014 |
20140259154 | DISPLAYING AN ICON BASED UPON USER INPUT - Disclosed is an apparatus, system, and method for a computing device to display an icon based upon user input. The computing device may receive user input and generate an icon based upon a checksum function of the user input. The computing device may display the icon to a user on a display device. | 09-11-2014 |
20140259155 | PROCESS AUTHENTICATION METHOD AND ELECTRONIC DEVICE IMPLEMENTING THE SAME - A method and a device for authenticating a process in a computing device allowing an application loaded into a memory to operate as a process are provided. The method includes receiving a message requesting authentication of the process, acquiring unique information of the process from an operating system of the process in response to the message requesting authentication of the process, comparing the acquired unique information with unique information previously stored in a memory, and determining that the authentication of the process has succeeded, when the acquired unique information coincides with the unique information previously stored. | 09-11-2014 |
20140283012 | METHOD OF LOCKING AN APPLICATION ON A COMPUTING DEVICE - A computer-implemented method entails steps of receiving user input signifying that an application on a computing device is to be locked and, in response to the user input, locking a user within the application to thereby permit the user to utilize functionalities of the application without exiting from the application or switching to another application on the computing device. | 09-18-2014 |
20140283013 | METHOD AND APPARATUS FOR UNLOCKING A FEATURE USER PORTABLE WIRELESS ELECTRONIC COMMUNICATION DEVICE FEATURE UNLOCK - Embodiments provide a method and apparatus for unlocking a feature of a user portable wireless electronic communication device. The user portable wireless electronic communication device can include a camera configured to capture a characteristic of a waving hand of a user across the user portable wireless electronic communication device. The user portable wireless electronic communication device can include a controller coupled to the camera. The controller can determine whether the user is authorized to access a locked feature of the user portable wireless electronic communication device based on the captured characteristic. The controller can unlock the locked feature if the user is authorized to access the feature. | 09-18-2014 |
20140283014 | User identity detection and authentication using usage patterns and facial recognition factors - In a mobile communication device having segregated workspaces respectively associated with a plurality of users, methods and systems are provided for confirming an authorized user in an appropriate account including a corresponding one of the segregated workspaces. Start-up processing of the device includes taking a picture of an authorized image of the authorized user with the device camera. Current activities of the device by the user are monitored relative to a predetermined set of device activities and usage rules. Certain activities are indicative of a change in user of the device from the authorized user. Upon detection of such a change, the current image of the current user of the device is acquired with the device camera. The current image is compared with the authorized image and if the comparison fails to detect a match, the current user is prompted to initiate a log-in process. | 09-18-2014 |
20140283015 | GRAVITY-BASED ACCESS CONTROL - Apparatus and methods are provided for gravity-based access control. An apparatus may be secured with a gravity-based password that reflects a pattern of manipulation or movement of the apparatus. As the apparatus is moved or reoriented, data produced by a sensor (e.g., an accelerometer, a gyroscope, a position sensor) is assembled to form the password. Elements of the password may identify surfaces of the apparatus as it is flipped or placed in different orientations, or may represent the received sensor data (e.g., acceleration force of gravity, displacement). The sensor data may be multi-dimensional. A target or model password is received and saved, and a user must recreate or re-enter the same pattern in order to unlock the device or otherwise make it available for use. | 09-18-2014 |
20140283016 | Security Device, Methods, and Systems for Continuous Authentication - Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails. | 09-18-2014 |
20140283017 | COMMUNICATING VIA A BODY-AREA NETWORK - In a first example of “Body-Area Networking” (“BAN”), a user wishing to access his electronic device ingests a small pill carrying a transmitter. The transmitter's signal carries an identification code that traverses the user's BAN and is read by the device. If the device recognizes that identification code as authenticate, then the device grants the user the desired access. In another example, the user again swallows a transmitter. When the user shakes hands with another person, the signal originating at the ingested transmitter is carried across the BAN of the first user, travels across the handshake to the BAN of the second user, then traverses the second user's BAN to her device. In a third example, a media player transmits audio information across the BAN to a headset worn by the user. The headset receives the signal, demodulates it, and renders the audio to the user. | 09-18-2014 |
20140283018 | MECHANISMS FOR LOCKING COMPUTING DEVICES - Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated. | 09-18-2014 |
20140283019 | INFORMATION TERMINAL - In an information terminal including a touch panel defining a plurality of touch points for security data entry by selecting and designating the touch points forming a prescribed graphic security pattern, the first touch point is confirmed only when a pointing member has continued to remain within a prescribed region surrounding the touch point for more than a first prescribed time period while the remaining touch points can be confirmed on a less rigorous condition so that the first touch point can be confirmed only when the user intentionally designates the first touch point, and an inadvertent confirmation of an unintended touch point as the first touch point can be effectively avoided. | 09-18-2014 |
20140283020 | System For Binding An Accessory To A Smartphone Or Tablet PC Application - This disclosure relates to software applications particularly for smart phone which are used to control or access hardware, particularly headsets. The software is available at no cost to anyone, but to control its use, it is coded so that only buyers of designated hardware can use it. | 09-18-2014 |
20140283021 | User Identification System for Parental and Security Controls - A user identification system is provided for better parental and security controls on devices that require a user touch them for proper use. The user identification system comprises a base unit, a mobile unit, and the human body that provides signal transmission through capacitive coupling. A signal is sent from the base unit when it is contacted by a user, and the mobile unit sends a response signal containing the user identification. One embodiment of the mobile unit is a data transfer medium (i.e. “smartphone”). Embodiments of the base unit include a media device remote control and a computer input device. | 09-18-2014 |
20140283022 | METHODS AND SYSEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 09-18-2014 |
20140289842 | SYSTEM AND METHOD FOR USER ENROLLMENT IN A SECURE BIOMETRIC VERIFICATION SYSTEM - A computer-implemented method and system for verifying the identity of a user in an identity authentication and biometric verification system which includes collecting information from the user regarding the user's identity, which is then electronically authenticated. Upon authentication, personal information regarding the verified identity of the user is retrieved from a source database which is used to verify the identity of the user, via user interaction. Upon successful verification and authentication, biometric data regarding the user is electronically collected. | 09-25-2014 |
20140289843 | METHOD OF UNLOCKING ELECTRONIC DEVICE BY DISPLAYING UNLOCKING OBJECTS AT RANDOMIZED/USER-DEFINED LOCATIONS AND RELATED COMPUTER READABLE MEDIUM THEREOF - A method of unlocking an electronic device having a touch-sensitive display includes at least the following steps: controlling the touch-sensitive display to have unlocking objects displayed at different locations for different time points; and when at least one contact is detected on the touch-sensitive display, determining whether to unlock the electronic device by referring to a contact status on the touch-sensitive display. Besides, a computer readable medium storing a program code is also provided, where the program code causes a processor to perform following steps when executed by the processor: controlling the touch-sensitive display to have unlocking objects displayed at different locations for different time points; and when at least one contact is detected on the touch-sensitive display, determining whether to unlock an electronic device by referring to a contact status on the touch-sensitive display. | 09-25-2014 |
20140298449 | OCR-BASED SINGLE SIGN-ON - According to one aspect of the present disclosure, a method and technique for OCR-based single sign-on in a computing environment is disclosed. The method includes: responsive to launching of an application login interface, capturing an image of the login interface; determining a location of a cursor on the login interface from the image; determining whether the location of the cursor corresponds to a credential input field of the login interface; and responsive to determining that the location of the cursor corresponds to the credential input field of the login interface, automatically sending a keystroke to the login interface to insert at least one character to the login interface. | 10-02-2014 |
20140298450 | LEVERAGING BIOMETRICS FOR AUTHENTICATION AND TOUCH DIFFERENTIATION - Biometric authentication and touch differentiation embodiments are described which use a handheld mobile computing device having a signal injection site that injects a signal into a user's hand for a prescribed period of time, and at least one signal sensing site each of which captures a signal emanating from a finger of either of the user's hands that is touching the signal sensing site during at least the period of time the signal is injected. The captured signal or signals are analyzed to determine whether they match, to a prescribed degree, a pre-established signal model that is indicative of a signal or signals expected to be captured. The signal matching determination can be employed to authenticate a user, or identify which finger of a user's hand is touching the computing device. | 10-02-2014 |
20140298451 | Projection Type Image Display Device - A projection type image display device provided with an unauthorized use preventing system includes a button unit or a remote controller for operating the display device, a condition memory for storing information indicating at least one use condition in an authorized use of the display device, a password memory for storing a password for releasing a restriction on the use of the display device, a detector for detecting a used condition of the display device at a power on timing, and a processor for imposing restrictions on the use of the display device when the use condition detected by the detector does not match the at least one use condition indicated by the information stored in the condition memory and for relieving the restriction based upon input of the password. | 10-02-2014 |
20140304808 | Device-Specific Authentication Credentials - Methods and systems for providing device-specific authentication are described. One example method includes generating device-specific credentials, associating the device-specific credentials with a device, authenticating the device based on the device-specific credentials, and after authenticating the device, authenticating a user of the device based on user-specific credentials associated with the user and different than the device-specific credentials. | 10-09-2014 |
20140304809 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While a respective function of the device is in a locked state, the device displays a graphical element on the display, the graphical element indicating a first direction of finger movement that enables unlocking of the respective function. While displaying the graphical element, the device detects an input that includes movement of a finger in the first direction over the fingerprint sensor and determines whether the input meets unlock criteria based at least in part on fingerprint information of the finger detected by the fingerprint sensor during the input. In accordance with a determination that the input meets the unlock criteria, the device unlocks the respective function; and in accordance with a determination that the input does not meet the unlock criteria, the device maintains the respective function in the locked state. | 10-09-2014 |
20140310801 | Method and Apparatus for Performing Authentication - A method comprising determining at least one three dimensional representation of at least one object proximate to an apparatus, and performing authentication based, at least in part, on the three dimensional representation is disclosed. | 10-16-2014 |
20140310802 | Electronic Apparatus and Control Method - An electronic apparatus includes a main body, a sensor, an input unit and an authentication unit. The sensor detects a tilt of the main body. The input unit accepts entry of a password from a user. The authentication unit executes user authentication based on the tilt detected by the sensor and the password entered in the input unit. In a control method in an electronic apparatus including a main body, a sensor detecting a tilt of the main body, and an input unit accepting entry of a password from a user, the control method includes: detecting a tilt of the main body; and executing user authentication based on the detected tilt and the entered password. | 10-16-2014 |
20140310803 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM - To prevent improper authentication, a authentication device includes a visual-line detecting unit configured to detect a visual line direction of a user, an authentication-permission visual-line direction setting unit configured to set an authentication permission visual-line direction, a biometric deciding unit configured to execute authentication by deciding whether a detected visual line direction is an authentication permission visual-line direction, and a display control unit configured to cause a display unit to display an image showing a type of a visual line direction in setting an authentication permission visual-line direction and configured to cause the display unit not to display the image in executing authentication. | 10-16-2014 |
20140310804 | FINGERPRINT BASED SMARTPHONE USER VERIFICATION - A touch screen, now incorporated in most smart phones, presents an effective and transparent method to incorporate continuous active user verification schemes. The projected capacitive grid structure can be used to capture enough information to verify that a valid user currently has possession of the mobile device, even while the user is not consciously engaged in an active verification interface. Further processing, such as habitual gesture recognition, can augment the process. | 10-16-2014 |
20140310805 | Gesture-to-Password Translation - Systems and methods related to advanced user experiences and interactions with devices are disclosed, specifically, for translating gesture inputs to text manipulation actions to facilitate password input on mobile devices. In one embodiment, a device detects the presence of a password input field on a user interface; receives user inputs from means such as a touchscreen; recognizes gestures based on the user inputs; determines text manipulation actions associated with recognized gestures; and applies the determined text manipulation actions to the contents of the password input field for each recognized gesture. | 10-16-2014 |
20140317722 | GRIP FORCE SENSOR ARRAY FOR ONE-HANDED AND MULTIMODAL INTERACTION ON HANDHELD DEVICES AND METHODS - Aspects of the disclosure relate to a handheld device equipped with arrays of force sensors located along both sides of the device that can provide a novel user interface for operating the device. The sensors can be configured to recognize various grip patterns, gestures, and biometric information of a user operating the device. Using the arrays of force sensors in addition to a touchscreen, a new paradigm for operating a handheld device is provided. | 10-23-2014 |
20140317723 | IMAGE PATTERN UNLOCKING TECHNIQUES FOR TOUCH SENSITIVE DEVICES - Techniques are disclosed for providing an image pattern unlock mode in electronic touch sensitive devices. The image pattern unlock mode can display an unlock screen to the user, prompting the user to arrange or create or otherwise select a specific image pattern in order to unlock the device. The customizable image pattern may include any uniquely identifiable unlocking pattern including a combination of images, or even a single image selected from an image group. The unlocking mechanism may include images gathered from the user's photo collection and/or one or more online profiles, and the unlock pattern could be a selection of such images. In other embodiments, a combination of color and images can also be used, such as matching colors to images. When the user has arranged the proper image pattern, the device unlocks and may be used. If the correct image pattern is not arranged, the device remains locked. | 10-23-2014 |
20140317724 | COLOR PATTERN UNLOCKING TECHNIQUES FOR TOUCH SENSITIVE DEVICES - Techniques are disclosed for providing a color pattern unlock mode in electronic touch sensitive devices. The color pattern unlock mode can display an unlock screen to the user, prompting the user to arrange or create a specific color pattern in order to unlock the device. The customizable color pattern may include any uniquely identifiable unlocking pattern including a combination of colors. Example color patterns include a combination of colors arranged in a certain order, a combination of colors combined with a password, a combination of colors combined with one or more words written out in one or more colors, or a combination of colors each matched with a specific image. When the user has arranged the proper color pattern, the device unlocks and may be used. If the correct color pattern is not arranged, the device remains locked. | 10-23-2014 |
20140317725 | IMAGE DATA TRANSMISSION SYSTEM, PROCESS AND PROGRAM, IMAGE DATA OUTPUT DEVICE AND IMAGE DISPLAY DEVICE - When a connection is established between a server and projectors through, a communication command is issued according to UDP-based broadcasting to retrieve connectable projectors through. Thereafter, the projector to be connected is selected and is assigned an IP address to establish the connection. In this manner, a user can easily obtain a connection environment capable of intercommunication between the server and the projector. A TCP/IP communication command is used to input or output image data, ensuring reliable transmission. Since the authentication can be provided using a keyword projected during the connection establishment, it is possible to prevent an unauthorized access to the projector by an outsider. | 10-23-2014 |
20140317726 | DEVICE, SYSTEM, AND METHOD OF DETECTING USER IDENTITY BASED ON INTER-PAGE AND INTRA-PAGE NAVIGATION PATTERNS - Systems, devices, and methods for detecting identity of a user of an electronic device, and for determining whether or not an electronic device is being used by a fraudulent user; as well as for detecting identity of a user based on inter-page and intra-page navigation patterns. A method includes: during a first session of a user, who utilizes a pointing device and a keyboard for interacting with a computerized service, monitoring pointing device dynamics and gestures and keystrokes of the user; analyzing the monitored pointing device dynamics and gestures and keystrokes, in relation to (a) state and context of the computerized service, and (b) user interface elements displayed by the computerized service; generating a user-specific biometric trait indicating a user-specific service usage pattern, which includes at least one of: a user-specific inter-application usage pattern, and a user-specific intra-application usage pattern. | 10-23-2014 |
20140317727 | EXTENSIBLE DEPLOYMENT SYSTEM - An extensible deployment system is disclosed that provides for flexible deployment and centralized management of a scalable communication system. The scalable communication system may be segmented into multiple groups of services, e.g. multiple solutions, that may be deployed across one or more servers. The groups of services may each access separate databases in a single database instance that may allow for the groups of services to be deployed and upgraded independently. A management interface may be provided that allows for centralized management, and deployment, of all of the groups of services, irrespective of the independent upgrade paths of the groups of services. The management interface may include a local authentication system and may also be interoperable with one or more external authentication systems, such that users may use login credentials of an external authentication system to access the management interface. | 10-23-2014 |
20140325641 | METHOD AND APPARATUS FOR FACE RECOGNITION - An apparatus for a face recognition, includes an ID assigning unit configured to assign one ID to a user when registering the user so that the ID is mapped to the user; and a sub-ID assigning unit configured to respectively assign sub-IDs to face images of the user which are different from each other so that the sub-IDS are respectively mapped to the face images when the face images are registered. Further, the apparatus includes a mapping table creation unit configured to create a mapping table in which pairs of the ID and the respective sub-IDs are mapped; and an authentication unit configured to search the mapping table to authenticate the user to provide an authentication result, upon receipt of a request of a user authentication. | 10-30-2014 |
20140325642 | STORAGE DEVICE READER HAVING SECURITY FUNCTION AND SECURITY METHOD USING THEREOF - Disclosed is a storage device reader for interfacing a storage device and a user terminal, which includes a storage unit and a control unit. The data storage unit stores reader recognition information uniquely assigned to the storage device reader. The control unit retrieves reader recognition information stored in the storage device, determines whether or not the retrieved reader recognition information matches reader recognition information stored in the data storage unit, and transferring a file list stored in the storage device to the user terminal if the retrieved reader recognition information matches the stored reader recognition information. | 10-30-2014 |
20140331315 | EYE MOVEMENT BASED KNOWLEDGE DEMONSTRATION - Embodiments of methods, apparatuses, and storage mediums associated with eye movement based knowledge demonstration, having a particular application to authentication, are disclosed. In embodiments, a computing device may determine whether a received input of a pattern of eye movements is consistent with an expected pattern of eye movements of a user when the user attempts to visually locate a piece of information embedded in a display. In embodiments, the expected pattern of eye movements may include patterns related to fixations and/or other statistical patterns, however, may not be limited to such patterns. In applications, determining consistency or correlation with the expected pattern of eye movements may identify the user by simultaneously verifying at least factors of authentication—that of biometric criteria related to a user's pattern of eye movements and a password or other information known to the user. | 11-06-2014 |
20140337969 | PORTABLE COMPUTER AND OPERATING METHOD THEREOF - A portable computer and an operating method thereof are provided. The portable computer comprises an input device, a power button, a non-volatile memory, a central processing unit (CPU), an embedded controller (EC), and a chipset. The input device inputs a user password, and the non-volatile memory stores a default password. The EC, in a soft off status, determines whether the power button protection item is enabled. The EC locks the power button if the power button protection item is enabled. The EC determines whether the user password is the same as the default password. The EC unlocks the power button if the user password is the same as the default password. The chipset is coupled to the non-volatile memory, the CPU and the EC. | 11-13-2014 |
20140337970 | IMAGE PROCESSING APPARATUS THAT PERFORMS USER AUTHENTICATION, AUTHENTICATION METHOD THEREFOR, AND STORAGE MEDIUM - An image processing apparatus capable of an authentication technique which enables appropriate user authentication on an application-by-application basic without requiring users to perform time-consuming operations. A storage unit stores authentication method setting information in which authentication methods for respective ones of a plurality of applications are set. An authentication method determination unit determines an authentication method for use in authentication to be performed before a selected application is executed, based on the authentication method setting information. An authentication unit performs the authentication using the authentication method determined by the authentication method determination unit. The authentication methods include at least a first authentication method that does not require input of authentication information and a second authentication method that requires input of the authentication information. | 11-13-2014 |
20140344921 | Apparatus and Method for Enabling Fingerprint-Based Secure Access to a User-Authenticated Operational State of an Information Handling System - A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state. | 11-20-2014 |
20140344922 | MULTI-PROFILE MOBILE DEVICE INTERFACE FOR SAME USER - A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user, each of the environments having the same persona, the device having: a computer processor coupled to a memory, wherein the computer processor is programmed to coordinate interaction between the device user and the pair of environments presented on the user interface by: configuring the user interface to present the personal environment for facilitating interaction between the device user and personal applications associated with the personal environment, the personal environment having an assigned user name of said persona and a personal password, the personal environment presented using a set of unique personal environment user interface design elements for distinguishing the personal environment from the work environment via the user interface; and responding to a switch environment command generated by a switch mechanism invoked by the device user via the user interface to replace the personal environment with the work environment on the user interface. | 11-20-2014 |
20140344923 | UNLOCKING METHOD AND DEVICE, PASSWORD SETTING METHOD AND DEVICE - The present disclosure discloses an unlocking method and device, a password setting method and device, relating to the technical field of computers. The unlocking method comprises the following steps of: displaying at least one password ring after a screen is activated; receiving, within a password selection region, a character generated from a slide operation to the password ring; and determining whether the received character is the same as a corresponding character in a preset password, and unlocking the screen if the received character is the same as the corresponding character in the preset password. In the present disclosure, introducing a password ring with characters to unlock a screen avoids the security problem that a trace remains on a screen in the case of a slide operation only, and also makes the use convenient for a user to reduce incorrect operations in inputting a password. | 11-20-2014 |
20140351926 | ATHENTICATION OF DEVICE USERS BY GAZE - A method includes obtaining a gaze feature of a user of a device, wherein the device has already been unlocked using a second feature, the gaze feature being based on images of a pupil relative to a display screen of the device, comparing the obtained gaze feature to known gaze features of an authorized user of the device, and determining whether or not the user is authorized to use the device based on the comparison. | 11-27-2014 |
20140351927 | ACCESS CONTROL FOR WIRELESS DOCKING - In one example, a method includes receiving, by a wireless docking center (WDC) and from a wireless dockee (WD), a request to access one or more peripheral functions (PFs) associated with the WDC, and receiving, by the WDC and from the WD, one or more authentication credentials. In this example, the method also includes determining, by the WDC, whether or not the one or more authentication credentials received from the WD grant access to the one or more PFs to which the WD requests access. In this example, the method also includes permitting, by the WDC, the WD to access a first PF of the one or more PFs to which the WD requests access in response to determining that the one or more authentication credentials grant access to the first PF. | 11-27-2014 |
20140351928 | SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker. | 11-27-2014 |
20140359756 | MULTI-LAYERED SENSING WITH MULTIPLE RESOLUTIONS - A display component ( | 12-04-2014 |
20140359757 | USER AUTHENTICATION BIOMETRICS IN MOBILE DEVICES - An authentication process may involve presenting an image on a display device, such as an icon associated with an application, indicating an area for a user to touch. At least partial fingerprint data may be obtained during one or more finger taps or touches in the area. Based on a comparison of the partial fingerprint data and master fingerprint data of the rightful user, a control system may determine whether to invoke a function. Invoking the function may involve authorizing a commercial transaction or unlocking the display device. In some implementations, determining whether to invoke the function may be based on a level of security. | 12-04-2014 |
20140359758 | PORTABLE STORAGE DEVICE USING FINGERPRINT RECOGNITION, AND CONTROL METHOD THEREOF - Disclosed is a portable storage device including a fingerprint sensor, a fingerprint data processing unit, a data repository, a data processing unit and the like. The fingerprint data processing unit outputs a fingerprint matching signal when fingerprint information received from the fingerprint sensor matches authentication fingerprint information of the fingerprint data repository. If the fingerprint matching signal is received from the fingerprint data processing unit, the data processing unit retrieves a data requested by the user terminal from the data repository, converts the retrieved data into a read-only data and transmits the read-only data to the user terminal. | 12-04-2014 |
20140366127 | TOUCHSCREEN SECURITY USER INPUT INTERFACE - A touchscreen security interface for guiding a user in entering a “pattern-based password” (for example, a password based on one or more gestures of a fingertip or stylus). The touchscreen security interface can alternatively be displayed at multiple angular orientations which can make the password entry process more secure with respect to phenomena like grease attacks and shoulder surfing. The touchscreen security device may take the form of a rotatable keypad, rotatable between four different angular orientations occurring at 90 degree angular intervals. | 12-11-2014 |
20140366128 | ADAPTIVE AUTHENTICATION SYSTEMS AND METHODS - An embodiment includes a method executed by at least one processor comprising: determining a first environmental factor for a mobile communications device; determining a first security authentication level based on the determined first environmental factor; and allowing access to a first module of the mobile communications device based on the first security authentication level. Other embodiments are described herein. | 12-11-2014 |
20140366129 | ELECTRIC DEVICE, ANOTHER ELECTRIC DEVICE, METHOD OF CONTROLLING ELECTRIC DEVICE AND COMPUTER-READABLE MEDIUM FOR CONTROLLING ELECTRIC DEVICE - An electric device includes an imaging module, a detector and an output module. The imaging module takes an image which is output from another electric device. The detector detects a code designation from data of the image taken by the imaging module. The output module generates another code designation which is different from the code designation which is output from said another electric device, and outputs said another code designation to said another electric device, when the detector detects the code designation which is output from said another electric device. | 12-11-2014 |
20140366130 | ELECTRONIC DEVICE - An electronic device includes an inertial force sensor, a memory unit, and a control unit connected to the inertial force sensor and the memory unit. The control unit includes a characteristic-waveform processor and an authenticator. The characteristic-waveform processor is operable to generate a characteristic waveform based on output waveforms output from the inertial force sensor in response to operations performed by a first user, and to record the characteristic waveform in the memory unit. The authenticator is operable to generate a reference waveform based on one or more output waveforms output from the inertial force sensor in response to respective ones of one or more operations performed by a second user, and to determine whether or not the first user and the second user are identical to each other by comparing the reference waveform with the characteristic waveform. This electronic device performs accurate authentication with a simple structure. | 12-11-2014 |
20140373132 | GESTURE-BASED AUTHENTICATION WITHOUT RETAINED CREDENTIALING GESTURES - This document describes techniques and apparatuses enabling gesture-based authentication without retained credentialing gestures. The techniques are capable of determining an identifier for a credentialing gesture where the identifier can be reproduced on receiving a similar authentication gesture at a later time. The identifier for the credentialing gesture can be encrypted, sent to a secure authentication entity, and then, when an authentication gesture is received, an identifier for the authentication gesture can also be determined, encrypted, and sent to the secure authentication entity. If the secure authentication entity determines that the encrypted identifiers match, the user is authenticated. | 12-18-2014 |
20140373133 | Method and System to Capture and Find Information and Relationships - A method and system to improve the computer in light of the global information network with numerous computer devices services, and apps, so that a user can capture and find information with high security and usability. The method improves capturing information and the user intentions, while minimizing the work that needs to be done by the user to obtain a benefit from the computer system. The invention includes the following methods for the computer: to simplify account creation for new users; to identify them progressively by requesting just the information necessary to provide a service; to authenticate an identity without a priori preparation of security questions and by requesting a user an effort proportional to the value of the service; and to capture the user intentions of permission of information by progressively and interactively asking who can and must not find it. | 12-18-2014 |
20140380464 | ELECTRONIC DEVICE FOR DISPLAYING LOCK SCREEN AND METHOD OF CONTROLLING THE SAME - A method of controlling an electronic device providing a lock screen is provided. The method includes providing the lock screen; detecting and analyzing an event for outputting at least one output event, which is received in the lock screen, so as to determine the output event to be output based on the analysis result; determining at least one module for providing the output event corresponding to the analysis result so as to provide an output instruction to output the output event to the at least one determined module; and outputting the output event by the at least one determined module. | 12-25-2014 |
20140380465 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While access to one or more resources of the device is restricted, the device displays an irregular arrangement of shapes on the touch-sensitive display. The device receives input based on the displayed irregular arrangement of the shapes. In accordance with a determination that the input meets input pattern criteria, the device provides access to the one or more restricted resources. In accordance with a determination that the input does not meet the input pattern criteria, the devices forgoes providing access to the one or more restricted resources of the device. | 12-25-2014 |
20150026795 | METHOD AND SYSTEM FOR EXTENDING THE SIGN-IN PROCESS FOR ACCESSING COMPUTER SYSTEMS - A system and a method for extending the sign-in process for accessing computer system is provided. The system and method allows construction of notices which contains prerequisite conditions to be fulfilled by the user along with the credentials for accessing the computer system. The system and the method further allow updation of the data provided by the user in data storage. | 01-22-2015 |
20150026796 | Event-Based Security Challenges - Concepts and technologies are disclosed herein for event-based security challenges. A computer can execute a security application. The computer can receive a request for authentication information associated with a user device. The computer can access event data corresponding to the user device. The computer can generate, based upon the event data, a challenge question and a response to the challenge question. The computer can provide data indicating the challenge question and the response to a requestor associated with the request. | 01-22-2015 |
20150026797 | ELECTRONIC DEVICE AND AUTHENTICATION SYSTEM THEREIN AND METHOD - An authentication system and method thereof capture an image of a user and extract biometric features of the user from the image to determine whether a stored biometric feature matches with the extracted biometric features. If there is a match, an interactive information is generated to invite the user to perform actions shown or specified or described by the interactive information. The user will be authenticated if an action of the user matches the required action in a timely fashion. An electronic device using the same is also provided. | 01-22-2015 |
20150026798 | ELECTRONIC DEVICE AND METHOD FOR IDENTIFYING A REMOTE DEVICE - An identity is identified by an electronic device. The electronic device receives a connection request from a remote device and controls a remote device to capture an image using the remote device. The electronic device accepts the connection request and authorizes the remote device to access the electronic device upon the condition that the captured image matches a predetermined image stored in the electronic device. | 01-22-2015 |
20150033328 | INFORMATION TERMINAL AND EXECUTION CONTROL METHOD - A portable terminal includes a touch panel including a press detection mechanism capable of accepting a press operation on an operating surface, a detection unit to detect a first operation being an operation of sliding a contact object over the operating surface of the touch panel during a period from contact to release of the contact object to/from the operating surface and a second operation being the press operation performed during the first operation through the press detection mechanism, a storage unit to store an authentication pattern composed of the first operation and the second operation, and an execution controller to control whether to execute a function of the information terminal based on a result of verification between an input pattern composed of the first operation and the second operation detected by the detection unit and the authentication pattern. | 01-29-2015 |
20150033329 | PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT - A method of controlling access to an electronic device is disclosed. The method comprises: generating a modified first image from a first image, wherein the first image and the modified first image include a first image reference point; generating a modified second image from a second image, wherein the second image and the modified second image include a second image reference point; displaying a three dimensional representation of the modified first image overlaid by the modified second image; authenticating access to the electronic device in response to substantial alignment of the first image reference point in the modified first image with the second image reference point in the modified second image. | 01-29-2015 |
20150040212 | LOCKING APPARATUS WITH ENHANCED SECURITY USING IRIS IMAGE - The present invention relates to a locking apparatus with enhanced security using an iris image, wherein, if a terminal including a short-range wireless communication means and camera accesses the locking apparatus, the locking apparatus: transmits, a token comprising at least one of identification number and/or random number of the locking apparatus from a token generator mounted on the locking apparatus, to the terminal; requests an iris image be photographed and transmitted within a preset time period; generates an iris template from the iris image photographed by a camera fixed on the user terminal; encrypts and transmits the generated iris template and the token from the terminal to the locking apparatus using short-range wireless communication; and performs at least one of access permission (lock release), access denial (a maintenance of a locked state), a request for re-photographing, and an emergency alarm by decrypting the received encrypted iris template and token using a decoder mounted on the locking apparatus, and comparing the similarity thereof with an iris template registered and stored in a database in advance. | 02-05-2015 |
20150040213 | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR INTEGRATING RECOGNITION OF HANDWRITING GESTURES WITH A SCREEN READER - While an electronic device with a display and a touch-sensitive surface is in a screen reader accessibility mode, the device displays an application launcher screen including a plurality of application icons. A respective application icon corresponds to a respective application stored in the device. The device detects a sequence of one or more gestures on the touch-sensitive surface that correspond to one or more characters. A respective gesture that corresponds to a respective character is a single finger gesture that moves across the touch-sensitive surface along a respective path that corresponds to the respective character. The device determines whether the detected sequence of one or more gestures corresponds to a respective application icon of the plurality of application icons, and, in response to determining that the detected sequence of one or more gestures corresponds to the respective application icon, performs a predefined operation associated with the respective application icon. | 02-05-2015 |
20150040214 | Method for Starting Application Program and Terminal Device Having Touchscreen - A method for starting an application program on a terminal device that has a touchscreen can be used to start at least one application program during unlocking. The method includes displaying, in a first sensing area, an application program to be displayed; and in a case that the first trigger signal is detected in the first sensing area and a second trigger signal is detected in a second sensing area, unlocking the touchscreen and starting an application program triggered by the first trigger signal. | 02-05-2015 |
20150047017 | MOBILE DEVICE AND METHOD OF CONTROLLING THEREFOR - The present specification relates to a mobile device and a method of controlling therefor, and more particularly, to a mobile device providing a user interface of a different security level according to a fingerprint verification and a touch input trajectory and a method of controlling therefor. | 02-12-2015 |
20150047018 | IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An image processing apparatus includes an imaging unit, an authenticating unit, and a controller. The imaging unit acquires a face image of a user. The authenticating unit performs a first authentication process based on the face image and a second authentication process based on information other than the face image. The controller suspends the first authentication process based on the face image while maintaining the imaging unit in an activated state when the authenticating unit performs the second authentication process. | 02-12-2015 |
20150047019 | INFORMATION PROCESSING METHOD AND ELECTRONIC DEVICE - The present disclosure provides an information processing method and an electronic device. The method comprises: determining, when a first application starts, whether first authentication data obtained by the electronic device at time T1 satisfies a predetermined condition, so as to obtain a first determination result, where the time T1 is prior to the starting of the first application; presenting an application interface for the first application by using a first display strategy, if the first determination result indicates that the first authentication data obtained by the electronic device at time T1 satisfies the predetermined condition; and presenting an application interface for the first application by using a second display strategy different from the first display strategy, if the first determination result indicates that the first authentication data obtained by the electronic device at time T1 does not satisfy the predetermined condition. | 02-12-2015 |
20150047020 | IMAGE DISPLAY APPARATUS AND OPERATING METHOD THEREOF - An image display apparatus and an operating method thereof are provided. The operating method of the image display apparatus includes receiving a request of entering into a personal screen mode from a first control device, receiving an input of user authentication information, when the received input of user authentication information coincides with user authentication information corresponding to a first personal screen, displaying the first personal screen, and granting, to the first control device, a control of the first personal screen that is displayed. | 02-12-2015 |
20150047021 | Systems and Methods for Providing Real Time Access Monitoring of a Removable Media Device - In various embodiments, a method comprises detecting a removable media device coupled to a digital device, authenticating a password to access the removable media device, injecting redirection code into the digital device, intercepting, with the redirection code, a request for data, determining to allow the request for data based on a security policy, and providing the data based on the determination. The method may further comprise selecting the security policy from a plurality of security policies based, at least in part, on the password and/or filtering the content of the requested data. Filtering the content may comprise scanning the data for malware. Filtering the content may also comprise scanning the data for confidential information. | 02-12-2015 |
20150047022 | PC PROTECTION BY MEANS OF BIOS/(U)EFI EXPANSIONS - A method is provided for controlling access to the BIOS/(U)EFI or for controlling sub-functions of the BIOS of a self-service machine. The password of the BIOS is calculated via a deterministic algorithm incorporating code-generating information that changes over time. The method includes displaying code-generating information that changes over time on a screen of the self-service machine during access to the BIOS of the self-service machine. The method proceeds by inputting the code-generating information in a program on a second computer that also has the deterministic algorithm for calculating the password for the BIOS, and calculating and displaying the password on the second computer. The method then includes inputting the password on the self-service machine and checking the password by the deterministic algorithm to allow access to the BIOS if the password is correct. | 02-12-2015 |
20150047023 | FIELD REVISIONS FOR A PERSONAL SECURITY DEVICE - Atomically modifying a personal security device includes presenting the personal security device to a reader/writer coupled to an access module, the access module determining if the personal security device includes a factory security mechanism, and, if the personal security device includes a factory security mechanism, using the reader/writer and the access module to replace the factory security mechanism with another security mechanism. The access module may authenticate the personal security device in connection with replacing the factory security mechanism. Authenticating the personal security device may grant access to a user through a door controlled by the access module. Replacing the factory security mechanism may include replacing an application on the personal security device. An ISO/IEC 7816-13 application management request command may be used to replace the application. | 02-12-2015 |
20150047024 | SURVEILLANCE CAMERA RENTING SERVICE - The disclosure is related to a surveillance camera renting service. A service server may provide the surveillance camera renting service through receiving an image having an authentication pattern, captured by and transmitted from a surveillance camera and transmitting a video stream, produced by and transmitted from the surveillance camera, to user equipment authenticated based on the authentication pattern included in the received image. | 02-12-2015 |
20150047025 | METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO RESOURCES AND PRIVILEGES PER PROCESS - To control privileges and access to resources on a per-process basis, an administrator creates a rule that may be applied to modify a token of a process. The rule may include an application-criterion set and changes to be made to the groups and/or privileges of the token. The rule may be set as a policy within a group policy object (GPO), where a GPO is associated with one or more groups of computers or users. When a GPO containing a rule is applied to a computer, a driver installed on the computer may access the rule(s) anytime a logged-on user executes a process. If the executed process satisfies the criterion set of a rule, the changes contained within the rule are made to the process token, and the user has expanded and/or contracted access and/or privileges for only that process. | 02-12-2015 |
20150052602 | Electronic Apparatus and Password Input Method of Electronic Apparatus - An electronic apparatus includes a display module, a touch panel, a password input receiving module and a password display module. The touch panel is provided overlaying on the display module. The password input receiving module receives a password input through the touch panel. The password display module moves and displays keys while inputting a password on a password entry screen on which a group of the keys for identifying a password to be input is displayed. | 02-19-2015 |
20150058973 | MECHANISM FOR ASSOCIATING ANALOG INPUT DEVICE GESTURE WITH PASSWORD FOR ACCOUNT ACCESS - A method for associating an analog input device gesture with an account for account access includes creating a user identifier for an account, creating a password for the account, generating the analog input device gesture, and associating the analog input device gesture with the account. | 02-26-2015 |
20150058974 | BUS CONNECTION PROGRAM AND APPARATUS - A bus connection apparatus according to an embodiment includes a bus connection unit configured to connect an internal application unit and a common bus. The bus connection unit receives, from an external application unit via the common bus, a request message which designates a service name and a destination. The bus connection unit specifies element names from a file based on the service name in the request message. The bus connection unit processes the request message by calling and executing respective element programs based on the element names. The bus connection unit extracts data from the request message processed by a first processing unit, and sends the data to an internal application unit corresponding to the service name or destination in the request message. | 02-26-2015 |
20150067823 | MOTION-BASED CREDENTIALS USING MAGNIFIED MOTION - Systems and methods are provided which allow for motion-based authentication of a user using magnified motion. Very small or imperceptible motions of a user may be captured and magnified to determine characteristics of the motions that may be used as a motion-based credential for user authentication. The motions, which may be very small and imperceptible to an observer, may be difficult for potential attackers to observe and copy, but may be useful when magnified. | 03-05-2015 |
20150067824 | WEARABLE USER DEVICE AUTHENTICATION SYSTEM - Systems and methods for authenticating a user include a wearable user device receiving a first request to access a secure system. A plurality of authentication elements are then displayed on a display device to a user eye in a first authentication orientation about a perimeter of an authentication element input area. A user hand located opposite the display device from the user eye is then detected selecting a sequence of the plurality of authentication elements. For each selected authentication element in the sequence, the wearable user device moves the selected authentication element based on a detected movement of the user hand and records the selected authentication element as a portion of an authentication input in response to the user hand moving the selected authentication element to the authentication element input area. The user is authenticated for the secure system if the authentication input matches stored user authentication information. | 03-05-2015 |
20150067825 | VISUAL AUTHENTICATION TO A COMPUTING DEVICE - For visually authenticating to a computing device, a method is disclosed that includes receiving an authentication request at a computing device, displaying a dynamic visual signal in response to the authentication request, wherein the visual signal suggests an authentication token. The method also includes receiving the authentication token in response to displaying the dynamic visual signal, and determining if the authentication token satisfies authentication requirements at the computing device. | 03-05-2015 |
20150067826 | RECORDING MEDIUM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD - An electronic device includes a touch panel, a time information obtaining section, and an authentication section. The time information obtaining section obtains time information for user authentication. The authentication section executes user authentication based on the time information obtained by the time information obtaining section. The time information obtaining section changes the time information according to a user's touch duration on the touch panel and changes an amount of change in time that the time information indicates according to a user's manner of touching the touch panel. | 03-05-2015 |
20150067827 | APPARATUS AND METHOD FOR SETTING A USER-DEFINED PATTERN FOR AN APPLICATION - Provided is a terminal with a fingerprint reader and method of operating the same. The terminal includes a fingerprint reader to scan and read a fingerprint of a user and a user verification module. The user verification module calculates a matching value between the fingerprint read by the fingerprint reader and a previously registered fingerprint of the user, and identifies the matching value and a security level of a requested application to determine whether to execute the requested application. The security level is variable; for example, the security level may vary according to a type of application or may be arbitrarily set by the user. | 03-05-2015 |
20150067828 | INDUSTRIAL AUTOMATION AND CONTROL DEVICE USER ACCESS - Solutions are disclosed for simplified user access to IEDs in industrial or utility operating environments such as those compatible with IEC 62351-8, having an LHMI with a restricted IED key set. A central Access Enabler assigns a short and temporary session secret to a previously authenticated user, and forwards the session secret to an IED for subsequent local user validation by the IED. A user session at the IED is remotely initiated by the Access Enabler, with the IED screen being instantaneously locked by the session secret. | 03-05-2015 |
20150067829 | Electronic Device and Method for Unlocking Screen of Electronic Device - An electronic device and a method for unlocking a screen of the electronic device are provided. The electronic device includes a screen and a storage unit. The method includes detecting, in a locked state, intent of a user to unlock the screen, extracting multiple pieces of contact information from the storage unit of the electronic device when it is detected that the user intends to unlock the screen, where each piece of the extracted contact information includes a first attribute value and a second attribute value, displaying, on the screen, first attribute values and second attribute values that are of the extracted contact information, detecting an action of matching the contact attribute values by the user, and unlocking the screen when it is detected that the user correctly matches a first attribute value and a second attribute value that are of the contact information, and otherwise maintaining the locked state. | 03-05-2015 |
20150074796 | User Verification for Changing a Setting of an Electronic Device - An electronic device can include a processing device operatively connected to a biometric sensing device. The processing device can be adapted to compare one or more captured biometric images with respective reference biometric images and change one or more settings of the electronic device or one or more settings of an application on the electronic device only when each captured biometric image matches a respective reference biometric image. | 03-12-2015 |
20150074797 | WEARABLE DEVICE PERFORMING USER AUTHENTICATION USING BIO-SIGNALS AND AUTHENTICATION METHOD OF THE SAME - A wearable device includes a first sensor configured to detect a first biosignal generated in response to a gesture performed by a user, and a second sensor configured to detect a second biosignal of the user. The device further includes a memory configured to store, with respect to at least one user, information of the first biosignal and the second biosignal, and a processor configured to initiate user authentication based on a result of determining whether the detected first biosignal corresponds to the stored information, and authenticate the user by comparing the detected second biosignal to the stored information. | 03-12-2015 |
20150074798 | Electronic Device and Method for Unlocking Screen of Electronic Device - An electronic device and a method for unlocking a screen of the electronic device are provided. The electronic device includes a screen and a storage unit. The method includes detecting, in a screen-locked state, intent of a user to unlock the screen; if it is detected that the user intends to unlock the screen, extracting contact information from the storage unit of the electronic device, where the extracted contact information includes a first attribute value and a second attribute value; displaying the first attribute value of the extracted contact information on the screen and prompting the user to input a second attribute value; and detecting an input of the user, and comparing the input of the user with the second attribute value; if the input of the user is the same as the second attribute value, unlocking the screen; and otherwise, maintaining the screen-locked state. | 03-12-2015 |
20150074799 | LOCKING AND UNLOCKING OF AN ELECTRONIC DEVICE USING A SLOPED LOCK TRACK - Securing an electronic device and associated information is facilitated. A security component facilitates display and operation of a lock track comprising a locked portion having a positive slope and an unlocked portion, including a chasm, that is adjacent to a high point of the positive-sloped unlocked portion of the lock track. A lock facilitator component (LFC) can be moved along the track between a low point of the locked portion and the unlocked portion. The LFC can be moved in response to received input, and if the input is not sufficient to move the LFC from the locked region to the unlocked region, the LFC can be moved back down the positive-sloped lock track to the low point. The security component can control information to be displayed in an overlay display region in accordance with security level(s) of the device or application. | 03-12-2015 |
20150082423 | INFORMATION PROCESSING SYSTEM, TERMINAL, AND AUTHENTICATION METHOD - An information processing system establishes connection between an information storage apparatus and an application installed in a terminal including a storage device for storing authentication information. The information processing system includes a setting information acquisition unit configured to acquire setting information from the information storage apparatus when the terminal receives an execution request to execute the application, the setting information indicating whether to prompt input of the authentication information. The information processing system also includes an authentication process unit configured to display a screen for inputting the authentication information on a display device of the terminal when the setting information acquired by the setting information acquisition unit calls for prompting input of the authentication information, and determine executability of the application when the authentication information that is input via the screen displayed on the display device matches the authentication information that is stored in the storage device. | 03-19-2015 |
20150089634 | PASSWORD ENTRY FOR DOUBLE SIDED MULTI-TOUCH DISPLAY - Password definition and recognition in programmable devices with back-to-back transparent, touchscreens includes defining first and second contact patterns on respective first and second ones of the touchscreens as patterns of touchscreen contact inputs generated from contact of respective contact elements on the touchscreens contemporaneously, wherein the touchscreens enable a viewer to see through the touchscreens. A composite password pattern is defined by mapping location of the first pattern on the first screen relative to the location of the second pattern on the second screen. Recognizing a successful entry of the composite password pattern requires an entry of the first pattern on one of first and second, back-to-back touchscreens contemporaneously with an entry of the second pattern on another of the first and second touchscreens in an alignment that is compliant with the composite password mapping | 03-26-2015 |
20150089635 | SYSTEM FOR CORRELATION OF INDEPENDENT AUTHENTICATION MECHANISMS - Described are devices, methods and non-transitory computer readable media for implementing an enhanced multi-factor authentication system. The system uses three user identifiers, and after a first user identifier is verified, the system receives a second user identifier from the user. As the second user identifier is being received, the system automatically detects a third user identifier and verifies simultaneously the second and third user identifiers. The second and third user identifiers are correlated with each other, and the correlation of these two identifiers (e.g., in addition to the identifiers themselves) is also verified. | 03-26-2015 |
20150089636 | AUTHENTICATED RELEASE OF DATA TOWARDS A DEVICE DRIVER - A method and an electronic device for authenticating release of data towards a device driver. the device comprises a main display area, a memory module and a processor module, the processor module is for executing a display function manager that manages access to an extra display area defined outside of the main display area, storing into the memory module authentication credentials identifying software applications, executing on the processor module, that are authorized for the display function manager and receiving a request, from one of the software applications executing on the processor module, for sending data towards the display function manager. the request comprises requesting credentials from the one software application. the processor is also for verifying the requesting credentials in relation to the extra display area against the stored authentication credentials and, when the requesting credentials are verified, authorizing the release of the data towards the device driver. | 03-26-2015 |
20150096013 | COMPUTER KEYBOARD WITH SECURE AUTHENTICATION FEATURES - A keyboard is disclosed. The keyboard may comprise a biometric sensor configured for authenticating a user; a docking station configured for receiving a security device; and a processor configured for facilitating communication between the biometric sensor and the security device docked in the docking station with a computing device coupled to the keyboard. | 04-02-2015 |
20150101040 | ELECTRONIC APPARATUS, COMPUTER READABLE MEDIUM AND METHOD FOR RELEASING SECURITY - An electronic apparatus includes a display, a touch panel, a controller, an input module, a generator and a display controller. The controller deactivates security of the electronic apparatus when a password is inputted. The input module makes a user input the password by one character. The generator generates a key group including a first character in the password and a character other than the first character. The display controller displays a software key for displaying a character group in the key group as an input target on the display on a password input screen for inputting the password. | 04-09-2015 |
20150101041 | METHOD AND APPARATUS FOR USER AUTHENTICATION - A method for authentication is provided comprising: displaying, by an electronic device, a first screen including first objects, each first object being associated with a respective value; detecting a first gesture performed on a first set of the first objects; identifying a first operation based on the first gesture; performing, by the electronic device, the first operation using the respective values of the first objects in the first set as operands to obtain a first result; computing an input string based on the first result; detecting whether the input string matches a predefined password; and authorizing access to the electronic device in response to the input string matching the predefined password. | 04-09-2015 |
20150106919 | OPERATION METHOD FOR ELECTRONIC APPARATUS - An operation method for an electronic apparatus is provided. The method includes: providing a setting function interface to be displayed on a display unit; detecting a motion trajectory operated on the display unit by a user using an input unit; performing an association setting to associate the motion trajectory with an operation function; making an original executing manner for executing the operation function unenforceable; and executing the corresponding operation function accordingly when an operation matching the motion trajectory is detected. | 04-16-2015 |
20150113634 | BIOMETRIC VERIFICATION - A method of verifying an input biometric identifier against a reference biometric identifier is disclosed in this specification. The method comprises evaluating the input biometric identifier relative to a group (the ‘cohort’) to improve verification accuracy. Up to three matching scores are used to determine a verification probability for the input biometric identifier. The three matching scores measure the similarity of the input biometric identifier to the biometric identifiers of the cohort, the similarity of the reference biometric identifier to the biometric identifiers of the cohort and the similarity of the input biometric identifier to the reference biometric identifier. | 04-23-2015 |
20150113635 | APPARATUS AND METHOD FOR CONFIGURING PASSWORD AND FOR RELEASING LOCK - Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels. | 04-23-2015 |
20150113636 | Managed Biometric Identity - A computing system such as a game console maintains and updates a biometric profile of a user. In one aspect, biometric data of the user is continuously obtained from a sensor such as an infrared and visible light camera, and used to update the biometric profile using a machine learning process. In another aspect, a user is prompted to confirm his or her identify when multiple users are detected at the same time and/or when the user is detected with a confidence level which is below a threshold. A real-time image of the user being identified can be displayed on a user interface with user images associated with one or more accounts. In another aspect, the biometric profile is managed by a shell on the computing system, where the shell makes the biometric profile available to any of a number of applications on the computing system. | 04-23-2015 |
20150121510 | METHOD, DEVICE AND SYSTEM FOR ENTERING DATA - The invention relates to a method for entering data, data to be entered comprising at least one digit. A first device comprises at least one touch sensitive interface. The touch sensitive interface is sensitive to at least one touch. According to the invention, at least one digit being associated with no touch or a count of at least one touch, the method comprises the following steps. The first device detects, in a predetermined time period, a count of at least one touch that is or is not present at once or several times. The first or a second device determines the digit associated with no detected touch or a detected count of at least one touch, the second device being connected to the first device. The invention also relates to corresponding device and system. | 04-30-2015 |
20150121511 | SYSTEM AND METHOD FOR ELECTRONIC STAMPING - A system and method for electronic stamping are disclosed. Personal fingerprint pre-stored is used to verify the fingerprint information collected, the document data and the fingerprint information is signed with a private key to get a first signature result, the user's public key and the pre-stored fingerprint information is then signed with a private key of a stamp producer to get a second signature result, the first signature result, the collected fingerprint information and the second signature result are combined to form electronic fingerprint stamp data. | 04-30-2015 |
20150121512 | AUTHENTICATION APPARATUS AND METHODS - A method of and an apparatus for verifying authenticity of a target authentication device comprising a reference pattern having a characteristic frequency and a security pattern, the security pattern comprises an embedded security device that is coded with phase modulation information. The method comprises extracting frequency domain data from an image of the target authentication device to facilitate verification of authenticity of the target authentication device. The method provides a very effective end expedient mechanism for verifying authenticity of a moiré or moiré like authentication device to combat counterfeiting. | 04-30-2015 |
20150121513 | METHOD OF GENERATING AUTHENTICATION PATTERNS AND AUTHENTICATING SYSTEM EMPLOYING THE SAME - An authenticating system includes an authenticating device, a background display device, a sensing device, and an authentication pattern checking device. The authenticating device displays a first display pattern on a transparent display panel including a transmissivity pattern. The transmissivity pattern includes a plurality of regions with different transmissivities. The background display device displays a second display pattern on a display panel to overlap the transparent display panel. The sensing device generates a sensing pattern by sensing an authentication pattern generated based on the transmissivity pattern, the first display pattern, and the second display pattern. The authentication pattern checking device performs authentication by checking whether the sensing pattern is consistent with an authentication reference pattern. | 04-30-2015 |
20150121514 | METHOD FOR PERFORMING AUTHENTICATION USING BIOMETRICS INFORMATION AND PORTABLE ELECTRONIC DEVICE SUPPORTING THE SAME - A method for performing authentication in a portable electronic device is provided. The method includes identifying whether a peripheral electronic device is located within a certain distance from the portable electronic device, receiving biometrics information from the peripheral electronic device when the peripheral electronic device is located within the certain distance from the portable electronic device, identifying whether the biometrics information received from the peripheral electronic device is identical to biometrics information stored in the portable electronic device, and releasing security set to the portable electronic device when the biometrics information received from the peripheral electronic device is identical to the biometrics information stored in the portable electronic device. | 04-30-2015 |
20150121515 | Limiting User Operations - An information processing device having a lock function for restricting user operations and a mechanism executed by this information processing device are provided in which the information processing device includes: an input unit for receiving a first password and a specified location from a user; a mode setting unit for switching to a restricted mode restricting at least some of the functions of the information processing device in response to receiving the first password and location; and a releasing unit for releasing the restricted mode on condition that the information processing device has reached the specified location. | 04-30-2015 |
20150121516 | AUTHENTICATING INPUT IN TRUSTED EXECUTION MODE - Disclosed herein are a method and electronic device for enhancing security authentication. An execution mode may be changed from a non-trusted execution mode to a trusted execution mode. At least one input may be authenticated while in the non-trusted execution mode. | 04-30-2015 |
20150128255 | DIRECTIONAL TOUCH UNLOCKING FOR ELECTRONIC DEVICES - A system and machine-implemented method for matching input gestures on a touch interface to a security pattern to allow user access to an electronic device or account. The security pattern may correspond to a combination of linear and non-linear input gestures relating to directional changes of the input gestures. A determination of the security pattern may be based on the end motion and speed of each input gesture. | 05-07-2015 |
20150128256 | AUTHENTICATION MANAGEMENT SYSTEM, AUTHENTICATION MANAGEMENT APPARATUS, AUTHENTICATION METHOD, AND STORAGE MEDIUM - An authentication management system for managing use of a processing apparatus includes an authentication management apparatus including a position storing unit to store position information of the processing apparatus; a receiving unit to receive user information that identifies a portable terminal to be used for authenticating when a user requests the processing apparatus via a requester to perform a target process; a determination unit to determine whether distance between the portable terminal and the processing apparatus satisfies a proximity determination condition between the portable terminal and the processing apparatus, the distance being obtained based on position information of the portable terminal received from the portable terminal, and the position information of the processing apparatus; and an authentication unit to conduct authentication processing based on user information received from the requester, and the user information received from the portable terminal when the distance satisfies the proximity determination condition. | 05-07-2015 |
20150128257 | METHOD FOR UNLOCKING TERMINAL DEVICE AND TERMINAL DEVICE - An embodiment of the present invention discloses a method for unlocking a terminal device, where a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface are set on the terminal device. The method includes: acquiring information that triggers displaying of an unlocking interface; displaying the second unlocking interface when the information is acquired and if a status of the terminal device meets a preset condition; receiving information that is input by a user on the second unlocking interface; and determining whether the input information matches the second unlocking password, and if a result of the determining is yes, unlocking the terminal device; where complexity of the second unlocking password is lower than complexity of the first unlocking password. Correspondingly, an embodiment of the present invention further discloses a terminal device. Thus, user experience can be enhanced when robustness of password protection is ensured. | 05-07-2015 |
20150135308 | CORRELATED DISPLAY OF BIOMETRIC IDENTITY, FEEDBACK AND USER INTERACTION STATE - Aspects of the subject disclosure are directed towards providing feedback to users of multi-user system that has biometric recognition capabilities, so that a user knows whether the system has correctly associated the user with his or her identity. The feedback may include a display of a current camera view, along with visible identity information that is associated with each user in the view. The feedback may include per-user icons (e.g., tiles, thumbnail images and so on) by which a user visually confirms that he or she is correctly recognized. Any misrecognition may be detected via the feedback and corrected. Feedback may convey other information, such as the current interaction state/capabilities of a user. | 05-14-2015 |
20150135309 | METHOD AND SYSTEM OF USER AUTHENTICATION WITH EYE-TRACKING DATA - In one exemplary embodiment, a computer-implemented method includes the step of providing an image to a user. The image is provided with a computer display. An eye-tracking data is obtained from the user when the user views the image. The eye-tracking data is obtained with an eye-tracking system. A user attribute is determined based on the eye-tracking data. The user is enabled to access a digital resource when the user attribute is associated with a permission to access the digital resource. The user attribute can be a personhood state. The digital resource can be a web page document. An instruction can be provided to the user regarding a pattern of viewing the image. The pattern of viewing the image can include instructing the user to gaze on a specified sequence of image elements. | 05-14-2015 |
20150143510 | SYSTEMS AND METHODS FOR NOTIFYING A USER OF A USER ENTRY THAT MATCHES SECURITY INFORMATION AND FOR HIDING DISPLAY OF A USER ENTRY THAT MATCHES SECURITY INFORMATION - Systems and methods for notifying a user of a user entry that matches security information and for hiding display of a user entry that matches security information are disclosed. According to an aspect, a method includes receiving user text input. The method also includes determining whether the user text input matches a predetermined portion of security information. Further, the method includes presenting notification of the match via a user interface in response to determining that the user text input matches the predetermined portion of the security information. | 05-21-2015 |
20150143511 | SYSTEM AND METHOD FOR HIGH SECURITY BIOMETRIC ACCESS CONTROL - System and method for high security biometric access control, according to the invention, enable high security access control to single instance or network resources, using biometric data, smart card technology and public key infrastructure or other symmetric/asymmetric encryption/decryption methodology. | 05-21-2015 |
20150143512 | IRIS KEY, SYSTEM AND METHOD OF UNLOCKING ELECTRONIC DEVICE USING THE IRIS KEY - In a method of unlocking an electronic device using an iris key, the iris key transmits an iris signal of a current user to the electronic device. The electronic device reads one or more pre-stored iris signal templates, and compares the received iris signal with the one or more iris signal templates. When the received iris signal matches with one of the one or more iris signal templates, the electronic device can be unlocked. | 05-21-2015 |
20150143513 | PROJECTOR AND CONTROL METHOD FOR PROJECTOR - A projector can be connected in cascade to another projector. Either a first mode for the projector to operate as a leading projector in the cascade connection or a second mode for the projector to operate as a second or subsequent projector in the cascade connection is set. The projector is made available for use based on success of authentication by an authentication unit or on reception of use permission information of the projector by a receiving unit. | 05-21-2015 |
20150150120 | SYSTEM AND METHOD FOR UNLOCKING TOUCH SCREEN AND TOUCH INPUT ELECTRONIC DEVICE THEREOF - A touch input electronic device, an unlocking system and method are provided. An unlocking interface is displayed on a touch screen of the touch input electronic device. The interface can include a slidable unlocking icon and a number of icons. Each icon displays a content item. Each time when a user slides the unlocking icon to one of the icon, the content item in the icon is determined, and an arrangement of the icons is changed. After the user input is finished, an unlock password is determined according to an input sequence of the content items. The touch screen is unlocked when the unlock password matches a per-stored password. | 05-28-2015 |
20150150121 | CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE - Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality. | 05-28-2015 |
20150294095 | SECURE MANAGEMENT OF A SMART CARD - A smart card comprises: a processing circuit; a memory that contains a protected object; an activity detector that receives a signal that describes a planned activity of a person who is in physical possession of the smart card; and an activity analyzer that evaluates features of the planned activity. In response to the activity analyzer determining that a predefined risk associated with the planned activity exceeds a predetermined value, the activity analyzer: issues an instruction to the person who is in physical possession of the smart card to provide a biomarker to a biosensor that is physically contained within the smart card; and receives, from the biosensor, real-time biometric data for the person who is in physical possession of the smart card. | 10-15-2015 |
20150294098 | INFORMATION PROCESSING DEVICE - An information processing device includes: an input receiving section receiving an input; a display control section changing a display screen to a first screen when the input receiving section has not received any input for a predetermined time; a registered user information retaining section retaining biological information of a plurality of users registered in the information processing device; a biological information obtaining portion obtaining biological information; and a biometric authenticating portion determining whether a user whose biological information is obtained by the biological information obtaining portion is a registered user by comparing the obtained biological information with the biological information of the plurality of users retained in the registered user information retaining section. When the biometric authenticating portion determines that the user whose biological information is obtained is a registered user, the display control section changes the first screen to a second screen. | 10-15-2015 |
20150294100 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR COMPARING IMAGES - A method of verifying, by a processing system, whether a user of a device corresponds to a previously authenticated user. The processing system has access to a first image and a second image. The first image is an image of an identity document comprising an image of the previously authenticated user. The second image is an image captured by the device. The method comprises: comparing said first image to said second image, whereby to determine whether they are images of the same user; and, in the event that it is determined that the first and second images are images of the same user: designating one of the first and second images as a higher quality image; and, storing said designated image as a validated image of the previously authenticated user. | 10-15-2015 |
20150294103 | Method and Password Verifying Device for Verifying an Input Password, and Computer System including the Password Verifying Device - In a method for verifying an input password, a password verifying device coupled between a electronic device and an input device is configured to: in response to a password input request from the electronic device, generating image data associated with a virtual keyboard and transmitting the image data to the electronic device; in response to password data from the electronic device, composing an input password according to the password data; and in response to a password confirm request from the input device, comparing the input password and a preset password stored therein. | 10-15-2015 |
20150294104 | METHOD AND SYSTEM FOR DEVICE AUTHENTICATION - Various aspects of a system and a method for device authentication are disclosed herein. The method includes generating one or more vibrations in an electronic device in response to receiving a first user input. In response to the received first user input, a plurality of user interface (UI) objects are displayed. Each of the displayed plurality of UI objects is associated with a corresponding pre-configured number of vibrations. In response to the displayed plurality of UI objects, a second user input is received that enables selection of one or more of the displayed plurality of UI objects. An access to the electronic device is authenticated when the pre-configured number of vibrations associated with the received second user input matches the generated one or more vibrations. | 10-15-2015 |
20150302189 | EFFICIENT MODIFICATION AND CREATION OF AUTHORIZATION SETTINGS FOR USER ACCOUNTS - For efficient authorization settings in a computing environment, user access permissions are created or modified by mapping, granting, and/or limiting access to resources by resource type, and using checkboxes for controlling user access for individual resources and for mapping one of a multiplicity of icons to control a type of user access and control over the individual resources. | 10-22-2015 |
20150310196 | DEVICE, METHOD, AND SYSTEM OF DETECTING REMOTE ACCESS USERS AND DIFFERENTIATING AMONG USERS - Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, detecting a possible cyber-attacker, detecting a remote access user, and detecting an automated script or malware. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elements. The monitored interactions are used for detecting an attacker that utilizes a remote access channel; for detecting a malicious automatic script, as well as malicious code injection; to identify a particular hardware assembly; to perform user segmentation or user characterization; to enable a visual login process with implicit two-factor authentication; to enable stochastic cryptography; and to detect that multiple users are utilizing the same subscription account. | 10-29-2015 |
20150310197 | METHOD OF PROCESSING INPUT AND ELECTRONIC DEVICE THEREOF - A method of operating an electronic device is provided. The method includes detecting a knock on a predetermined area of the electronic device, analyzing a pattern of the detected knock, and performing a function associated with the analyzed pattern. | 10-29-2015 |
20150310198 | Methods of Creating a Corpus of Spoken CAPTCHA Challenges - Methods of creating a corpus of spoken CAPTCHA challenges are disclosed. The methods involve training a computing system with samples of human voices and computer synthesized voices articulating a set of reference challenge items, scoring the reference challenge items based on differences in articulation between human and machine articulation of each challenge item, and selecting suitable challenge items from among the reference challenge items based on the score. | 10-29-2015 |
20150310200 | ANTI-SNOOPING PASSWORD INPUT METHOD AND APPARATUS - An anti-snooping password input method and apparatus. The method includes a mobile terminal determining password elements in a password to be inputted and generating a password pattern using the password elements, the password pattern including all the password elements in the password to be inputted; the mobile terminal displaying the password pattern in a password selection interface; the mobile terminal receiving an instruction that a user slides the password elements in the password pattern sequentially in the password selection interface, and determining a password currently inputted by the user using the instruction; and the mobile terminal verifying whether the password currently inputted by the user corresponds to the password to be inputted. | 10-29-2015 |
20150317465 | METHODS AND SYSTEMS FOR ENABLING MEDIA GUIDANCE APPLICATION OPERATIONS BASED ON BIOMETRIC DATA - Methods and systems are disclosed herein for encouraging particular behavior or performing particular actions based on biometric data of a user. Specifically, by granting and restricting access to media and other user devices based on whether or not a user is conforming to a biometric state, a media guidance application may encourage a user to maintain or achieve the desired biometric state. | 11-05-2015 |
20150317468 | CONFIGURABLE PERSONAL DIGITAL IDENTITY DEVICE WITH AUTHENTICATION USING IMAGE RECEIVED OVER RADIO LINK - A personal digital ID device provides a digital identifier to a service for a predetermined duration in response to user interaction. The user interaction may include a button press. The personal digital ID device may be in the form of a bracelet, a key fob, or other form factor. The service may be provided by a mobile device, in the cloud, or elsewhere. | 11-05-2015 |
20150317469 | DYNAMIC INTERACTIVE IDENTITY AUTHENTICATION METHOD AND SYSTEM - An identity authentication system includes a storage unit, a display character set generation unit, a display unit and a password authentication unit. An identity authentication method includes the following steps: generating the dynamic display character sets; inputting a dynamic input code; and comparing the dynamic input code with the user password. This invention can improve the security of identity authentication and is convenient to use. | 11-05-2015 |
20150317470 | METHOD AND SYSTEM FOR CONTROLLING ACCESS TO APPLICATIONS ON MOBILE TERMINAL - Various embodiments provide methods and systems for controlling an access to applications on a mobile terminal. In an exemplary method, an opened application can be scanned and an application identification can be obtained. The application identification can be compared with a pre-stored target application identification. When the application identification is compared to be consistent with the pre-stored target application identification, an unlock interface can be displayed. An unlock command can be obtained to run the application on the mobile terminal. An exemplary system for controlling an access to an application on a mobile terminal can include a scanning module, a comparing module, a displaying module, and an executing module. | 11-05-2015 |
20150324560 | Abbreviated Authentication of an Electronic Device's User - A method authenticates a user of an electronic device located in and affiliated with a retail environment. The method includes prohibiting certain operations from being performed on the electronic device in a locked state. The method also includes, responsive to a user authenticating himself or herself through an authentication process, allowing those certain operations to be performed on the electronic device in an unlocked state. The method further entails configuring an extent to which the authentication process required for authentication at any given time is abbreviated. The method performs this configuring depending on whether operations performed on the electronic device at or within a defined interval before the given time are included in a defined list of operations. This defined list includes operations performed in the course of business associated with the retail environment. | 11-12-2015 |
20150324564 | DYNAMIC ACTIVATION OF USER PROFILES BASED ON BIOMETRIC IDENTIFICATION - A method, an apparatus, and a computer program product for biometric identification are provided. The apparatus may be a user device. The apparatus may detect biometric information for a predetermined period of time. The predetermined period of time may be set by a hysteresis timer. The apparatus may compare the detected biometric information with stored biometric information associated with a stored user profile of a plurality of user profiles. The apparatus may then determine whether to display the stored user profile based on the comparison after the predetermined period of time has elapsed. | 11-12-2015 |
20150324565 | DISPLAY DEVICE AND METHOD FOR CONTROLLING THE SAME - A display device and a method for controlling the same are disclosed. The display device comprises an input unit configured to receive a command for generating an event and a fingerprint; a control unit configured to generate the event in accordance with the command and process the generated event; and a display unit configured to display a user menu, wherein the input unit includes a touch recognition layer for recognizing a touch input and a fingerprint recognition layer for recognizing a fingerprint, the touch recognition layer and the fingerprint recognition layer being formed in a single body with the display unit and receiving a command for generating an event of a temporary unlock fingerprint setting mode and a first fingerprint different from a registered fingerprint, the control unit implements the temporary unlock fingerprint setting mode in accordance with the command for generating the input event, sets the input first fingerprint to a temporary unlock fingerprint, and unlocks the display device if the temporary unlock fingerprint is input thereto, and the temporary unlock fingerprint is released in accordance with a predetermined condition. | 11-12-2015 |
20150324566 | Authentication Device and Authentication Method - An authentication device that authenticates an individual by using features of a biological object includes an input device | 11-12-2015 |
20150324568 | SYSTEMS AND METHODS FOR USING EYE SIGNALS WITH SECURE MOBILE COMMUNICATIONS - Apparatus, systems, and methods are provided for secure mobile communications (SMC) by an individual using biometric signals and identification in real time. The apparatus includes a wearable computing device where identification of the user is based on iris recognition, and/or other physiological and anatomical measures. Biometric identity measures can be combined with other security-based information such as passwords, date/time stamps, and device identification. Identity verification can be embedded within information that is transmitted from the device and/or to determine appropriate security measures. SMC addresses security issues associated with the transmission of eye-signal control and biometric identification data using secure interfaces with network devices within a system of systems (SoS) software architecture. | 11-12-2015 |
20150324627 | PORTABLE DEVICE INCLUDING A FINGERPRINT SCANNER AND METHOD OF CONTROLLING THEREFOR - A portable device including a display unit, a control button and a controller. The display unit displays an execution screen of an application of the portable device. The control button receives a control input including at least one of a fingerprint input corresponding to a security authentication for the application and a push input corresponding to a cancel function. The controller displays a security authentication screen of the application, for which the fingerprint input is needed, receives a first control input including a first fingerprint input and a first push input when the security authentication screen of the application is displayed, and recognizes the first fingerprint input of the first control input by activating a fingerprint recognition function when the first fingerprint input is detected for more than a first threshold time and the first push input of the first control input is not detected. | 11-12-2015 |
20150332031 | SERVICES ASSOCIATED WITH WEARABLE ELECTRONIC DEVICE - A wearable computing device includes a device body, a band coupled to the device body, and one or more sensors. The device body includes one or more processors, a memory, and a touch-sensitive display. The processors are operable to authenticate, using the one or more sensors, a user of the device, and communicate with one or more target devices in response to successful authentication of the user. The processors can also authenticate the target devices, and control the target devices in response to successful authentication of the target devices. The sensors may include a camera, and to authenticate the user of the device, the processors may send a request to one or more remote devices requesting display of a pairing visual, receive an image from the camera, determine whether the image comprises valid pairing information, and if so, establish a pairing between the device and the remote devices. | 11-19-2015 |
20150332033 | TWO OR THREE STEP AUTHORIZATION VIA TAPPING - Example methods and systems directed to a Transaction Manager are described. According to various embodiments, the Transaction Manager generates modules and sends modules to various computing devices. The modules, when executed on a computing device(s), cause a computing device(s) to execute various actions described below. Transaction Manager sends modules to a wireless mobile device. Upon executing the modules, the wireless mobile device receives a transaction initiation message and presents an alert upon receipt of the transaction initiation message. The wireless mobile device detects an occurrence of a physical gesture and recognizes the occurrence of the physical gesture as authorization to proceed with a transaction. The wireless mobile device sends a response to the transaction initiation message based on detecting the occurrence of the physical gesture. The response includes a customer identification for the transaction. The customer identification is associated with an account through which the transaction can be fulfilled. | 11-19-2015 |
20150332036 | TOROIDAL FLEXIBLE INPUT DEVICE - A method and/or computer program product receives computer inputs from a toroidal flexible input device. Physical contact between a toroidal flexible input device and a display on a computer is detected. The toroidal flexible input device is authenticated, and a communication session between the toroidal flexible input device and the computer is established. The computer then receives inputs from the toroidal flexible input device while the toroidal flexible input device is in physical contact with the display on the computer. | 11-19-2015 |
20150332037 | CLAIMING DATA FROM A VIRTUAL WHITEBOARD - A method of storing data from a whiteboard application executed on a computing system including an interactive display device is provided. The method comprises storing, in a memory of the computing system, whiteboard data input to the whiteboard application in response to user interaction with the interactive display device, displaying a login selector on the interactive display device, upon detecting actuation of the login selector, identifying the user based on credentials of the user; and in response to identifying the user, (i) retrieving previews of stored whiteboard files from a user account in a cloud-based storage system corresponding to the identity of the user, (ii) displaying the previews on the interactive display device, and (iii) uploading the whiteboard data as a whiteboard file from the memory of the computing system to the user account. | 11-19-2015 |
20150332038 | SECURE ENTRY OF SECRETS - Disclosed is a method for enabling the input of a secret at an electronic device. The method includes establishing a plurality of primary identifiers and a plurality of secondary identifiers; associating each secondary identifier with a corresponding primary identifier by use of a mapping function; on a display configured such that it is only viewable by a single user displaying the plurality of primary identifiers and the plurality of secondary identifiers, with each secondary identifier being associated with a corresponding primary identifier; receiving one or more inputs from the user indicating a secondary identifier, translating each input secondary identifier using the mapping function to its corresponding primary identifier to generate one or more primary identifiers and using the generated primary identifiers as an input to an authentication function where the authentication function allows access to private data or functionality associated with an electronic device. | 11-19-2015 |
20150339468 | METHOD AND APPARATUS FOR USER AUTHENTICATION - A method is provided including: detecting, by an electronic device, at least one signal that is generated while a predetermined content is displayed on a display; identifying a security-related object associated with the content based on the signal; comparing, by the electronic device, information relating to the object with specified security setting information; and releasing a restriction on access to a resource based on an outcome of the comparison. | 11-26-2015 |
20150339469 | METHOD AND APPARATUS FOR DIFFERENTIATED ACCESS CONTROL - A method for differentiated access control on a computing device, and the computing device, the method including starting a timer on the computing device; resetting the timer if activity occurs on the computing device prior to the expiration of the timer; and preventing a subset of applications from being launched or enabled on expiry of the timer. | 11-26-2015 |
20150339471 | DEVICE UNLOCK WITH THREE DIMENSIONAL (3D) CAPTURES - A method for unlocking a device, comprising projecting, via a light signal projection unit, a plurality of light signals sequentially on a three dimensional (3D) target object, capturing, via an image capture unit, a plurality of images of the target object dynamically, wherein the plurality of images correspond to the sequence of light signals, constructing a 3D feature representation of the target object from the plurality of images, computing a matching score by comparing the constructed 3D feature representation to a reference 3D data set associated with an object that is approved for unlocking the device, and determining to unlock the device when the computed matching score exceeds a pre-determined threshold. | 11-26-2015 |
20150347725 | Dynamic Authorization - Systems and techniques are provided for dynamic authorization. A signal may be received from a sensor. A concept may be determined from the signal. The concept may be a location of a computing device, an action being performed with the computing device, an identity of a user of the computing device, or a temporal context for the computing device. A current pattern may be determined from the concept. The current pattern may be matched to a stored pattern. The stored pattern may be associated with a security outcome. The security outcome may be sent to be implemented. A security message may displayed indicating the security outcome and part of the stored pattern that was matched to the current pattern. The security outcome may be causing presentation of an authentication prompt or not causing presentation of an authentication prompt. | 12-03-2015 |
20150347727 | IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA - The invention disclosed herein is an in-circuit security system for electronic devices. The in-circuit security system incorporates identity credential verification, secure data and instruction storage, and secure data transmission capabilities. It comprises a single semiconductor chip, and is secured using industry-established mechanisms for preventing information tampering or eavesdropping, such as the addition of oxygen reactive layers. This invention also incorporates means for establishing security settings, profiles, and responses for the in-circuit security system and enrolled individuals. The in-circuit security system can be used in a variety of electronic devices, including handheld computers, secure facility keys, vehicle operation/ignition systems, and digital rights management. | 12-03-2015 |
20150347730 | Contextual Device Locking/Unlocking - Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device. | 12-03-2015 |
20150347732 | Electronic Device and Method for Controlling Access to Same - An electronic device selects, based the detected position of a user, which sensor it will use to authenticate the user. The device may, for example, select a first sensor based on a first position and motion of the user, grant a first level of access to the user based on an authentication procedure the device carries out using data from the first sensor, select a second sensor based on a second position and motion of the user, and grant a second level of access to the user based on an authentication procedure the device carries out using data from the second sensor. | 12-03-2015 |
20150347735 | USER AUTHENTICATION METHOD, USER AUTHENTICATION DEVICE, AND PROGRAM - Provided is a user authentication method including reproducing sound data of which a sound source in a first position of a space around a user is virtually localized using a Head-Related Transfer Function (HRTF) of the user toward the user, acquiring a second position of the space around the user, the second position being estimated by the user who has listened to the reproduced sound data as a position of the sound source; and authenticating the user according to a coincidence between the first position and the second position. | 12-03-2015 |
20150347736 | QUANTIFIED IDENTITY - Determination of a quantified identity using a multi-dimensional, probabilistic identity profiles is contemplated. The quantified identity may be used to authenticate a user entity provided to a point-of-sale device or other interface associated with identity requester in order to verify the corresponding users as who they say they are. The user identity may be determined initially as a function of user inputs made to the identity requester and/or as a function of wireless signaling exchange with devices associated with the user. | 12-03-2015 |
20150347741 | METHOD FOR MANAGING SECURITY OF A DATA PROCESSING SYSTEM WITH CONFIGURABLE SECURITY RESTRICTIONS - Techniques for managing security of a data processing system are described herein. According to one embodiment, in response to a request for modifying a security settings of a data processing system, a message is displayed on a display of the data processing system to request a user who operates the data processing system to perform a physical action to prove that the user was physically present to issue the request for modifying the security settings. It is verified whether a user action physically performed by the user conforms to the requested physical action. The security settings of the data processing system is modified, in response to determining that the user action conforms to the requested physical action. | 12-03-2015 |
20150347766 | SECURE RESERVATION MODE FOR LOGICAL UNIT NUMBERS AND PERSISTENT RESERVATIONS - A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers. | 12-03-2015 |
20150347776 | METHODS AND SYSTEM FOR IMPLEMENTING A SECURE LOCK SCREEN - Disclosed herein is a technique for implementing a secure lock screen on a computing device. The secure lock screen is configured to permit particular applications to display their content—such as main user interfaces (UIs)—while maintaining a desired overall level of security on the computing device. Graphics contexts, which represent drawing destinations associated with the applications, are tagged with entitlement information that indicates whether or not each graphics context should be displayed on the computing device when the computing device is in a locked-mode. Specifically, an application manager tags each application that is initialized, where the tagging is based on a level of entitlement possessed by the application. In turn, a rendering server that manages the graphics contexts can identify the tagged entitlement information and display or suppress the content of the applications in accordance with their entitlements. | 12-03-2015 |
20150350190 | ELECTRONIC DEVICE AND PASSWORD AUTHENTICATION METHOD FOR ELECTRONIC DEVICE - A password authentication method for an electronic device and an electronic device is provided. The method comprises: receiving by the electronic device an input password, in which the input password is an n-bit character string and n≧1; comparing by the electronic device characters of the input password with corresponding characters of a pre-stored correct password bit by bit in sequence or randomly; and providing by the electronic device a comparison result at a predetermined feedback time or a random feedback time, in which each of the predetermined feedback time and the random feedback time is not less than a total time required to compare the n-bit character string of the input password. | 12-03-2015 |
20150356286 | Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management - A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. Upon success, the state machine transitions to the continuous authentication state wherein data samples are captured as the user interacts with the device and compared with stored exemplary fingerprints. Preferably, the state machine enforces a negative identification technique to determine whether the individual currently interacting with the touchscreen is not the user from which the exemplary fingerprints were generated. Upon such negative authentication, the state machine transitions to the invalidation state. In this state, operations (e.g., screen lock) are performed to secure the device against an unauthenticated use. On a next interaction, the state machine transitions to full authentication requiring robust authentication to continue operating in a normal mode. | 12-10-2015 |
20150363581 | SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A COMPUTING DEVICE - A system and/or method may be provided to silently authenticate a user. An example method of silently authenticating a user includes receiving a set of device characteristics from a user device and identifying, based on the set of device characteristics, the user device. The method also includes determining whether to trust the user device and determining whether the user device is associated with a user that was previously authenticated. The method further includes in response to determining to trust the user device and that the user device is associated with the user that was previously authenticated, authenticating the user based on the previous authentication. | 12-17-2015 |
20150363585 | METHOD AND APPARATUS FOR BIOMETRIC-BASED SECURITY USING CAPACITIVE PROFILES - A biometric security method and apparatus for a capacitive sensor system is provided herein, where the method may include capturing a set of raw capacitive frames for a body part via the capacitive sensor system, wherein each raw capacitive frame includes a distribution of a plurality of capacitance levels measured from the body part; creating a capacitive profile based on the set of raw capacitive frames; comparing a first value in the capacitive profile to a second value in a biometric template generated from an enrolled body part, wherein the first value and the second value are located at a similar location with respect to the capacitive profile; and, generating an authentication signal based on a difference between the first value and the second value. | 12-17-2015 |
20150363586 | SYSTEMS AND METHODS FOR IDENTIFYING AN INDIVIDUAL - The present application relates to systems and methods using biometric data of an individual for identifying the individual and/or verifying the identity of an individual. These systems and methods are useful for, amongst many applications, more secure identification of high-risk individuals attempting to gain access to an entity, transport, information, location, security organization, law enforcement organization, transaction, services, authorized status, and/or funds. | 12-17-2015 |
20150363587 | METHOD AND APPARATUS FOR CONTROLLING LOCK/UNLOCK STATE OF TERMINAL THROUGH VOICE RECOGNITION - A method for controlling a terminal through a voice input is provided. The method includes receiving a voice input when the terminal is in a state in which the terminal is locked and performing an operation corresponding to the voice input if the voice input corresponds to a preset command. | 12-17-2015 |
20150365825 | Electronic Equipment and Method of Authenticating a User - An electronic equipment comprises a sensor circuit operative to measure at least one electrical property of a user at a plurality of frequencies to thereby capture frequency-resolved electrical characteristics of the user. The electronic equipment comprises a processing circuit operative to perform a comparison between the frequency-resolved electrical characteristics of the user and reference characteristics to authenticate the user. The processing circuit is operative to perform an unlocking operation based on a result of the comparison. | 12-17-2015 |
20150371025 | METHOD AND APPARATUS FOR SECURE CREDENTIAL ENTRY WITHOUT PHYSICAL ENTRY - A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system. During operating system startup of the operating system of the computer, fields relating to security of the operating system are prompted for. The portable memory store retrieves from memory therein data for populating said fields and provides same to the computer system mimicking a data entry device other than a portable memory store. | 12-24-2015 |
20150371030 | PROVIDING ACCESS TO AND ENABLING FUNCTIONALITY OF FIRST DEVICE BASED ON COMMUNICATION WITH SECOND DEVICE - In one aspect, a device includes a processor and a memory accessible to the processor. The memory bears instructions executable by the processor to receive at least a first Bluetooth low energy (BLE) signal from a BLE beacon and enable a first function of the first device at least in part in based on receipt of the firs BLE signal. | 12-24-2015 |
20150379249 | METHOD, MODULE, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING USER OF MOBILE DEVICE - A module for authenticating a user of a mobile device. The mobile device has an orientation sensor and a touch screen sensor. The module includes: a behavioral biometrics conversion element, used to perform calculation by matching timestamps with a plurality of behavioral data of operations, sensed by the orientation sensor and the touch screen sensor, on the mobile device to acquire a plurality of behavioral biometrics quantities, and convert, by using a statistical method, multiple sets of the behavioral biometrics quantities into a behavioral biometrics pattern in a histogram constructing manner; and an authentication mechanism core element, used to determine whether the behavioral biometrics pattern conforms to a behavioral biometrics model pattern in a histogram manner. The present invention further includes a method and a computer program product for authenticating a user of a smart phone. | 12-31-2015 |
20150379251 | ELECTRONIC DEVICE, METHOD, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an electronic device including: a fingerprint detector; and circuitry configured to execute a first function when a detected fingerprint substantially coincides with a first fingerprint from a plurality of registered fingerprints of a user, and to execute a second function different from the first function when a detected fingerprint substantially coincides with a second fingerprint different from the first fingerprint from a plurality of registered fingerprints of the user. | 12-31-2015 |
20150379252 | METHOD AND DEVICE FOR LOCKING FILE - A method for locking a file includes: acquiring biological feature recognition information of a user, the biological feature recognition information including at least one of fingerprint information, voiceprint information, iris information, or face information; and locking a designated file using the biological feature recognition information. | 12-31-2015 |
20150379253 | User Identity Authentication Techniques for On-Line Content or Access - On-line course offerings can be made available to users using computational techniques that reliably authenticate the identity of individual student users during the course of the very submissions and/or participation that will establish student user proficiency with course content. Authentication methods and systems include applications of behavioral biometrics. | 12-31-2015 |
20150379254 | AUTHENTICATION SYSTEM THAT UTILIZES BIOMETRIC INFORMATION - The purpose of the present invention is to provide a highly accurate authentication system in a biometric authentication system. The authentication system includes: a measurement device that acquires biometric modality information from a living body of a first user; an input unit that generates at least one item of input information from the biometric modality information; a storage device that stores first feature information acquired from the biometric modality information of the first user, and second feature information acquired based on a correlation between the biometric modality information of the first user and biometric modality information of a second user; and an authentication unit that authenticates the first user by collating the input information with the first feature information and collating the input information with the second feature information. | 12-31-2015 |
20150379255 | SYSTEMS AND METHODS FOR GRANTING ACCESS TO A COMPUTING DEVICE USING A WEARABLE DEVICE - Certain embodiments herein relate to authenticating access to a computing device by a user. Such authentication can be performed by processing information received from a wearable device transmitting a signal, including access credentials data, through the user's body to a computing device in electrical contact with the computing device. The computing device can process the received signal to extract the access credentials data. Upon validating the extracted access credentials data, the computing device can grant a user access to the computing device. In some embodiments, the computing device can additionally receive biometric data acquired from the user by the computing device. In such embodiments, the computing device can grant the user access to the computing device if the received access credentials data and the received biometric data are authenticated. | 12-31-2015 |
20150379257 | ASSERTING IDENTITIES OF APPLICATION USERS IN A DATABASE SYSTEM BASED ON DELEGATED TRUST - Techniques are provided for integrating application-level user security context with a database. A session manager, in a middle tier that includes an application, obtains the security context of a user and establishes, in the database, a light-weight session (LWS) that reflects the security context. The security context is synchronized between the middle tier and database before application code execution. The database maintains an isolated copy of the LWS for the unit of application code executed as the security context. The database sends to the session manager the identifier of the copy of LWS. Before allowing a request from an application to be sent to the database, the session manager, transparent to the application, inserts an identifier that identifies the LWS. In this way, the database processes an application request in the context of the corresponding user's security context that is the same as the security context in the middle tier. | 12-31-2015 |
20160006678 | USER TERMINAL AND METHOD OF DISPLAYING LOCK SCREEN THEREOF - An example user terminal device includes a display unit, including a display, configured to display a lock screen. The lock screen includes content representative information representing content included in a message that is provided by an acquaintance of a user of the user terminal device, and a first user interface element. A control unit, including a processor, is configured to, when a user input signal is received via the first user interface element, execute an application capable of reproducing the content and to reproduce the content. | 01-07-2016 |
20160007007 | SECURABLE WEARABLE COMPUTER INTERFACE - A wearable computer interface comprising a three dimensional (3D) range camera and a picture camera that image the user and a controller that process the images to identify the user and determine if the user is authorized to use the interface to access functionalities provided by a computer interfaced by the interface. | 01-07-2016 |
20160014284 | SYSTEM FOR VERIFYING PRINTED DOCUMENTS OF WEB PAGES | 01-14-2016 |
20160019382 | USER AUTHENTICATION SECURITY SYSTEM - A method for providing secure user authentication including presenting a displayed representation of a three dimensional object having multiple selection areas, wherein respective selection areas are represented on at least two faces of the object and a symbol is depicted in each of the multiple selection areas; receiving a sequence of user inputs including a plurality of user selections of respective selection areas of the object indicating selection of the respective symbol and at least one user input indicating a movement of the object between the two faces so that user selection of selection areas on each of the two faces is accomplished; utilizing a processor to compare the sequence of user inputs to a predetermined authentication sequence stored in memory; and responsive to a positive comparison of the predetermined authentication sequence, providing user authentication. | 01-21-2016 |
20160026782 | Personal Identification Combining Proximity Sensing with Biometrics - Described is a technology by which the identity of a person (e.g., a customer in a commercial transaction) is determinable without active identification effort, via biometric data is obtained without action by the person. Machine processing of the biometric data over a set of possible persons, determined from secondary proximity sensing, is used to determine or assist in determining the identity of the person. | 01-28-2016 |
20160026784 | MULTI-VOCAL PASSWORD VERIFYING METHOD AND DEVICE - A multi-vocal password verifying method includes the steps of: (1) displaying at least one set of candidate information units, the information units of the password being included in at least one set of candidate information units for being chosen; (2) accepting setting of relative location between a target selection region and the candidate information units such that the number of the candidate information units covered by the target selection region is two or more, the candidate information units covered by said target selection region being defined as a selection information unit set; and (3) comparing the information units of the password with the selection information unit set, and it being determined that the user has chosen correct information units from the predefined password when the selection information unit set contains the information units of the password. The password verification performed by the present multi-vocal password verifying method brings good effects such as vagueness of explicit expression and use convenience of user operation, and is therefore more reliable. | 01-28-2016 |
20160034681 | ELECTRONIC APPARATUS, SECURITY PROCESSING METHOD AND STORAGE MEDIUM - According to one embodiment, an electronic apparatus includes a first detector, a second detector, a third detector and a security controller. The first detector detects a speed of movement of the electronic apparatus. The second detector detects a direction of the movement. The third detector detects whether the electronic device is located in a first area. The security controller updates position information wherein the position information is indicative of a first position in the first area, and executes a monitoring process based on the position information, detection information of the first detector and detection information of the second detector. | 02-04-2016 |
20160034682 | VISUAL IMAGE AUTHENTICATION - Methods and systems described herein perform a secure transaction. A display presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a universal identifier is represented by images recognizable by a person, but difficult for malware to recognize. | 02-04-2016 |
20160042162 | LOCK SCREENS TO ACCESS WORK ENVIRONMENTS ON A PERSONAL MOBILE DEVICE - One or more embodiments of the invention provide access to a work environment in a mobile device from a lock screen presented by a personal environment of the mobile device, wherein the work environment is running in a virtual machine supported by a hypervisor running within the personal environment and wherein the personal environment is a host operating system (OS) of the mobile device. The host OS receives an authentication credential from a user in response to a presentation of the lock screen on a user interface (UI) of the mobile device and then determines whether the authentication credential is valid for the personal environment or the work environment. If the authentication credential is valid for the personal environment, access is enabled only to the personal environment. If the authentication credential is valid for the work environment, access is enabled to both the personal environment and the work environment. | 02-11-2016 |
20160042165 | SECURE HANDWRITING INPUT FOR PASSWORD FIELDS - For secure handwriting input for password fields, an apparatus for using a tone indicator to identify language in text recognition is disclosed. The apparatus may include a processor, a handwriting input unit operatively coupled to the processor, a display operatively coupled to the processor, a handwriting element module that identifies a handwriting element from handwriting input, an input replication module that controls the display to present the handwriting element, and a privacy module that controls the display to obscure the handwriting element in response to a predetermined trigger event. Obscuring the handwriting element may include removing the handwriting element, rendering transparent the handwriting element, replacing the handwriting element and an area surrounding the handwriting element with a colored area, and/or replacing the handwriting element with an anonymizing symbol. A method and computer program product also perform the functions of the apparatus. | 02-11-2016 |
20160042171 | OPERATION DEVICE AND OPERATION METHOD - An operation device includes a screen display section that displays a login screen on a touch panel, a key position changing section, a key information reception section, and a key information determination section. The key position changing section changes positions of a plurality of keys that are displayed on the login screen such that the keys are displayed for a current login process at positions that are different from previous positions at which the keys were displayed for a previous login process. The key information reception section generates input information representing a key pressed on the login screen. The key information determination section allows login of a user when a combination of pieces of input information corresponding to a plurality of key presses performed by the user matches registration information and does not allow login of the user when the combination does not match registration information. | 02-11-2016 |
20160042172 | METHOD AND APPARATUS FOR UNLOCKING DEVICES - Methods and apparatuses for unlocking a device with enhanced security level are provided. The method includes: receiving a first input indicating a reference point, receiving an input pattern including a plurality of inputs in a plurality of directions, wherein each of the plurality of inputs is initiated from the reference point, determining whether the plurality of inputs included in the input pattern are substantially identical to a plurality of inputs included in predetermined unlocking data; and unlocking the device based on the determination. | 02-11-2016 |
20160048664 | USER DEVICE AND OPERATING METHOD THEREOF - An apparatus and security method are provided. The apparatus includes at least one communication interface and a controller. The controller is configured to discover, using the at least one communication interface, an external electronic device available for a communication connection with the apparatus, the discovering including receiving information from the external electronic device, adjust a security level for the apparatus based at least in part on the information, and control at least part of the apparatus using the adjusted security level. | 02-18-2016 |
20160048665 | UNLOCKING AN ELECTRONIC DEVICE - Unlocking an electronic device includes displaying, by a security module, a plurality of objects including at least one target object and at least one decoy object, where the at least one target object is obtained from a stored history of viewed objects, detecting, by the security module, a user selection from the plurality of objects, and in response to detecting that the user selection is one of the at least one target objects, unlocking, by the security module, the electronic device. | 02-18-2016 |
20160048667 | METHOD AND DEVICE FOR MANAGING AUTHENTICATION USING AN IDENTITY AVATAR - Aspects of the subject disclosure may include, for example, generating a digital certificate responsive to an authentication of a user according to a dynamic biometric process, associating the digital certificate with a transaction record for the transaction, storing information associated with authentication conditions of the dynamic biometric process, receiving an access request associated with the transaction, and providing access to the transaction record, the information associated with the authentication conditions of the dynamic biometric process or a combination thereof responsive to the access request, where granting of the access is according to transmitting an access acknowledgement to equipment of the user, or obtaining another authentication to allow permission to access or a combination thereof. Other embodiments are disclosed. | 02-18-2016 |
20160048668 | COMPUTING DEVICE CHORDING AUTHENTICATION AND CONTROL - Chording techniques are described that may be utilized in a variety of ways to provide inputs to a computing device. The computing device, for instance, may include sensors disposed on a housing of the computing device such that the sensors are configured to detect fingers of a user when grasping the device. Detection of a likely indexed relative position of the fingers of the user's hand in relation to each other, and even an amount of pressure used by respective ones of the fingers, may be used to define and input chords that may be used to initiate operations of the computing device. | 02-18-2016 |
20160048669 | ACCESS AUTHORIZATION BASED ON SYNTHETIC BIOMETRIC DATA AND NON-BIOMETRIC DATA - A method of selectively authorizing access includes obtaining, at an authentication device, first information corresponding to first synthetic biometric data. The method also includes obtaining, at the authentication device, first common synthetic data and second biometric data. The method further includes generating, at the authentication device, second common synthetic data based on the first information and the second biometric data. The method also includes selectively authorizing, by the authentication device, access based on a comparison of the first common synthetic data and the second common synthetic data. | 02-18-2016 |
20160048673 | SECURE ELECTRONIC LOCK - Embodiments are directed to simulating an operation of a mechanical lock in an electronic context, comprising: applying a contactless wireless credential to a lock, authenticating the credential, unlocking the lock to provide access to a resource protected by the lock based on having authenticated the credential, determining a security level associated with the lock, and conditionally capturing the credential based on the security level. | 02-18-2016 |
20160055326 | DETERMINING USER AUTHENTICATION BASED ON USER/DEVICE INTERACTION - Embodiments are directed to systems, methods and computer program products for providing user authentication based on historical user patterns. Embodiments of the present invention may be configured to communicate code executable by a computing device that causes the computing device to monitor user patterns of a user based on the user interacting with the computing device; receive baseline user patterns to identify the user; identify, from the baseline user patterns, one or more routine actions performed by the user operating the computing device; receive a request to perform a transaction, wherein the transaction is associated with a level of security that must be authenticated; receive identification user patterns of the user based on the user interacting with the computing device; determine a threshold score based on comparing the identification user patterns with the baseline user patterns; and alter the level of security. | 02-25-2016 |
20160055327 | Systems and Methods for Multi-Factor Authentication for Administration of a Computer-Based Test - Systems and methods are provided for providing a computer-based test to be taken at a computer. A determination is made as to whether a geolocation of the computer is within an approved geolocation range. A determination is made as to whether a time at which the computer-based test is to be provided to the computer is within an approved time range. A hardware profile of the testing center is compared to an expected hardware profile of the testing center. Biometric data of a test center administrator is compared to expected biometric data of the test center administrator, and a confidence score is modified based on results of the comparison. If the confidence score meets or exceeds a threshold, the computer-based test is provided to the computer over a network. If the confidence score is less than the threshold, the computer-based test is prevented from being provided to the computer. | 02-25-2016 |
20160055330 | THREE-DIMENSIONAL UNLOCKING DEVICE, THREE-DIMENSIONAL UNLOCKING METHOD, AND PROGRAM - A three-dimensional unlocking device ( | 02-25-2016 |
20160063228 | Discrete Password Entry Using Keyboard with Character and Position Carriers - A method and apparatus for password entry, the method comprising: displaying a password inputting keyboard on a display, the keyboard including a character carrier and a position carrier, the character carrier and the position carrier are capable of relative movement between each other so that when the position of a character in the character carrier is corresponding to a position mark on the position carrier, the position of at least one other character in the character carrier is corresponding to at least one other position mark in the position carrier; in response to a user causing relative movement between the character carrier and the position carrier, aligning a character in the character carrier with a position mark in the position carrier; and in response to a lapse of a predetermined time, recording the character and its input order and changing the layout of the password inputting keyboard. | 03-03-2016 |
20160063232 | WEARABLE TERMINAL - There is disclosed a wearable terminal including a main body, a main board provided in the main body, a first touch pad provided in a rear surface of the main body, a flexible board configured to connect the main body and the first touch pad to each other, a band coupled to the main body, wound around a user's wrist to secure the main body to the user's body part, a second touch pad provided in the other surface of one surface contacting with the user's body part when the user wears the band, a flexible board having one end connected to the second touch pad and the other end connected to the main board, and a controller configured to extract an electrocardiogram by measuring a difference of electric potentials of body muscles sensed from the first touch pad and the second touch pad. | 03-03-2016 |
20160063233 | USER AUTHENTICATION METHOD AND APPARATUS BASED ON ELECTROCARDIOGRAM (ECG) SIGNAL - A user authentication apparatus includes an electrocardiogram (ECG) waveform acquirer configured to acquire an authentication ECG waveform of a user to authenticate the user; a filter configured to filter the authentication ECG waveform using a Kalman filter by applying a reference model parameter extracted from a reference ECG waveform to the Kalman filter; and an authenticator configured to compare the filtered ECG waveform and the reference ECG waveform, and determine whether the filtered authentication ECG waveform corresponds to the reference ECG waveform based on a result of the comparing. | 03-03-2016 |
20160063234 | ELECTRONIC DEVICE AND FACIAL RECOGNITION METHOD FOR AUTOMATICALLY LOGGING INTO APPLICATIONS - A method for logging into a number of applications of an electronic device includes obtaining a login facial image of a user when the user opens a first application of the number of applications, determining whether the login facial image matches a preset facial image stored in the electronic device, and logging into the first application when the login facial image matches the preset facial image. The preset facial image is linked to each of the number of applications. The electronic device automatically logs into the rest of the applications when the rest of the applications are opened, after the login facial image matches the preset facial image to log into the first application. | 03-03-2016 |
20160063238 | METHOD AND SYSTEM FOR USER-DESIGNED APPLICATION DEPLOYMENT - Embodiments of a method and system for utilizing user-designed applications are disclosed. A user-designed application that utilizes at least one high-level API available within a system may be received. The user-designed application may be deployed server-side within the system. A user request may be processed server-side for the user-designed application in the system. | 03-03-2016 |
20160063274 | Data Processing Device with Light Indicator Unit - This invention comprises an image and audio data processing device that comprises a transceiver to send and receive image and audio data over a network, a camera module which captures and processes image and/or audio data individually or in combination when a user activates the camera module, a camera module sensor which identifies a use operation of capturing the image and audio data, and an indicator unit which includes a light emitting module. When the camera module is capturing and processing the image and audio data and the transceiver sends and receives said data over the network, the camera module sensor identifies the use operation and activates the indicator unit thereby illuminating the light emitting module. | 03-03-2016 |
20160065374 | METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE - A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key. | 03-03-2016 |
20160070899 | METHOD AND SYSTEM FOR SECURED TRANSFER OF APPLICATION DATA BETWEEN ELECTRONIC DEVICES ON SIMULTANEOUS TOUCH - A method and a system for transmitting data from a first electronic device to a second electronic device using a human body as a signal transmission path, are provided. The method includes detecting a first touch event on the first electronic device, the first touch event corresponding to the data. The method further includes receiving indication of a second touch event that is detected on the second electronic device, the second touch event corresponding to a memory location in the second electronic device. The method further includes capacitively transmitting the data from the first electronic device to the memory location through the human body in response to the detecting the first touch event and the receiving the indication of the second touch event. | 03-10-2016 |
20160070901 | DEVICE AND METHOD FOR AUTHENTICATING ON BASIS OF POSITION VALUE - The present invention relates to a device and a method for authenticating on the basis of position value, and comprises the steps of: registering, by the authentication device, position value information for authentication; outputting a symbol string including symbols corresponding to position values; selecting a symbol included in the outputted symbol string; and comparing the selected symbol with a symbol corresponding to a registered position value in the symbol string to determine whether the symbols match each other, and security is remarkably improved therethrough. | 03-10-2016 |
20160078204 | ELECTRONIC DEVICE AND PROTECTION METHOD - A protection method for an electronic device includes generating a control command using a processor of the electronic device when it is determined to acquire information of a current user of the electronic device. The electronic device is controlled to acquire the information of the current user and to acquire data of the electronic device according to the control command. The acquired information is stored. The acquired information and the acquired data is transmitted to the server. | 03-17-2016 |
20160078205 | DISPLACEMENT SIGNATURES - In one implementation, a security management system accesses a displacement signature defined in relation to physical contact with a surface and determines that the displacement signature is correlated with a known displacement signature. The security management system then performs an operation in response to determining that the displacement signature is correlated with the known displacement signature. | 03-17-2016 |
20160078206 | TERMINAL DEVICE AND METHOD FOR CONTROLLING ACCESS TO SAME - A method for controlling access to a terminal device includes collecting light signals emitted by a lighting device of an electronic device. The light signals is converted to digital signals. Once the digital signals match a preset password of the electronic lock, the electronic lock is controlled to unlock the terminal device. | 03-17-2016 |
20160078207 | METHOD AND APPARATUS FOR PROVIDING COMBINED AUTHENTICATION SERVICE - Disclosed herein are a method and apparatus for providing a combined authentication service. Combined authentication information is set by acquiring an entry window location and authentication characters from a user, an entry window including the entry keypad is displayed at the entry window location, entry information including entry characters and entry coordinates is acquired from the user via the entry window, and combined authentication is performed by verifying the entry characters and the entry coordinates, thus strengthening the security of authentication of a mobile terminal while maintaining the user's existing password. Further, if a region to which the password entry coordinates are to be mapped is selected when the user sets a password, authentication is performed by additionally considering mapping coordinates in addition to the password even if the user enters the password into the existing password entry window, thus strengthening the security of password authentication. | 03-17-2016 |
20160078213 | SECURE INDUSTRIAL CONTROL SYSTEM - A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials. A key management entity of the secure industrial control system monitors and manages the security credentials of the industrial elements starting from the time they are manufactured up to and during their implementation within the industrial control system for promoting security of the industrial control system. An authentication process, based upon the security credentials, for authenticating the industrial elements being implemented in the industrial control system is performed for promoting security of the industrial control system. In one or more implementations, all industrial elements of the secure industrial control system are provisioned with the security credentials for providing security at multiple (e.g., all) levels of the system. | 03-17-2016 |
20160080370 | SECURE MANAGEMENT OF A SMART CARD - A smart card includes a processing circuit, a memory that contains a protected object, an activity detector that receives a signal that describes a planned activity of a person who is in physical possession of the smart card, and an activity analyzer that evaluates features of the planned activity. In response to the activity analyzer determining that a predefined risk associated with the planned activity exceeds a predetermined value, the activity analyzer issues an instruction to a user to provide a biomarker to a biosensor. A blending logic blends real-time biometric data with a security object to generate a hybrid security object. A conversion logic uses the hybrid security object to convert a protected object into a usable object that can be utilized by the processing circuit within the smart card. A matrix barcode generator generates a matrix barcode that contains information about the user of the smart card. | 03-17-2016 |
20160085948 | MOTION-BASED IDENTITY AUTHENTICATION OF AN INDIVIDUAL WITH A COMMUNICATIONS DEVICE - Systems, methods and computer storage mediums securely authenticate an identity of an individual based on a pattern that is traced by the individual. Embodiments of the present disclosure relate to prompting an individual with a pattern to trace when attempting to authenticate the identity of the individual during an identity authentication session. Motion-based behavior data that is generated by motions executed by the individual as the individual traces the pattern is captured via a motion-capturing sensor. The motion-based behavior data is unique to the individual and has a low likelihood of being duplicated by an unauthorized individual attempting to fraudulently pose as the individual. The captured motion-based behavior data is compared to previously captured motion-based behavior data from previous traces of the pattern completed by the individual. The identity of the individual is authenticated when the motion-based behavior data is within a threshold of the previously captured motion-based behavior data. | 03-24-2016 |
20160085949 | USER VERIFICATION USING TOUCH AND EYE TRACKING - A method includes receiving at a processor, an indication of a user touching a point on a data entry device, receiving at the processor, an indication of a user gazing in a direction, and comparing via the processor the touched point and the gazing direction to a known touch point and gaze direction to verify the user is an authorized user. | 03-24-2016 |
20160085951 | APPARATUS AND METHOD FOR ENABLING FINGERPRINT-BASED SECURE ACCESS TO A USER-AUTHENTICATED OPERATIONAL STATE OF AN INFORMATION HANDLING SYSTEM - A computer-implemented method provides power to a fingerprint reader while the remaining components of the information handling system are held in a low power, non-operating state. Placement of a finger across the fingerprint reader is detected with the information handling system in the non-operating state. A fingerprint is read and a corresponding fingerprint image is generated. The fingerprint image is buffered and an embedded controller is triggered to start an authentication device having a secure storage. The fingerprint image is compared to a fingerprint template contained in the secure storage. In response to the fingerprint image matching the fingerprint template, the authentication device signals the embedded controller to activate a user authenticated wake-up cycle to provide power to the other components of the information handling system such that the information handling system activates an operating system and enters a fully powered and user authenticated, operational state. | 03-24-2016 |
20160085952 | MOTION-BASED CREDNTIALS USING MAGNIFIED MOTION - Systems and methods are provided which allow for motion-based authentication of a user using magnified motion. Very small or imperceptible motions of a user may be captured and magnified to determine characteristics of the motions that may be used as a motion-based credential for user authentication. The motions, which may be very small and imperceptible to an observer, may be difficult for potential attackers to observe and copy, but may be useful when magnified. | 03-24-2016 |
20160085958 | METHODS AND APPARATUS FOR MULTI-FACTOR USER AUTHENTICATION WITH TWO DIMENSIONAL CAMERAS - A data processing system (DPS) includes a user authentication module that uses a hand recognition module and a gesture recognition module to authenticate users, based on video data from a two-dimensional (2D) camera. When executed, the hand recognition module performs operations comprising (a) obtaining 2D video data of a hand of the current user; and (b) automatically determining whether the hand of the current user matches the hand of an authorized user, based on the 2D video data. When executed, the gesture recognition module performs operations comprising (a) presenting a gesture challenge to the current user, wherein the gesture challenge asks the current user to perform a predetermined hand gesture; (b) obtaining 2D video response data; and (c) automatically determining whether the current user has performed the predetermined hand gesture, based on the 2D video response data. Other embodiments are described and claimed. | 03-24-2016 |
20160085961 | AUTHENTICATION SYSTEM, AUTHENTICATION DEVICE, AND AUTHENTICATION METHOD - According to an embodiment, an authentication system includes a physical device, a calculator, and an authenticator. The physical device includes a data source which outputs a data sequence along time series. The calculator performs, using hidden Markov model, probability calculation on an ID which is based on the data sequence obtained from the physical device. The authenticator authenticates the physical device based on calculation result of the calculator. | 03-24-2016 |
20160092664 | ELECTRONIC APPARATUS, AUTHENTICATION METHOD AND STORAGE MEDIUM - According to one embodiment, an electronic apparatus includes an input controller and circuitry. The input controller is configured to receive a password. The circuitry is configured to detect an external device which is externally connected, and to determine whether the password received by the input controller matches a password set in association with the detected external device. | 03-31-2016 |
20160092669 | AUTHENTICATION PROCESSING DEVICE FOR PERFORMING AUTHENTICATION PROCESSING - The present invention is to enable a user to input authentication information without burden, such that the user only has to memorize part of the authentication information even when inputting lengthy authentication information in order to ensure high-level security. When an operation of inputting and arranging authentication information in an information arrangement region is performed in a state where an arrangement status of a specified portion in the information arrangement region is set in advance as partial-authentication reference information in a reference authentication information memory, a CPU detects an arrangement status of the specified portion from an overall arrangement status in the information arrangement region, and performs, as partial authentication, processing of matching the detected arrangement status of the specified portion and the arrangement status of the specified portion set as the partial-authentication reference information. | 03-31-2016 |
20160098549 | RHYTHM-BASED USER AUTHENTICATION - The present invention is directed to an apparatus, a method, and a computer program product for authenticating a user based on a sequence of rhythmic inputs. The user via a mobile device provides one or more inputs (e.g., pushing a button, tapping a touchscreen, a biometric, or the like) to one or more sensors associated with the mobile device as an attempt of authorization. The one or more inputs may be provided in a rhythmic manner (e.g., provided in time with music). The present invention then compares the provided one or more inputs to one or more predetermined sequences of inputs that are associated with positive authentication of the user (e.g., a known password). The phone determines that the one or more provided inputs match one or more predetermined rhythmic sequences associated with positive authentication of the user and authenticates the user. | 04-07-2016 |
20160098553 | GRAPHICAL USER PASSWORDS - A method includes a computer device receiving a set of images for at least one user; the computer device receiving unique visual clue inputs from the at least one user for each image of the set of images; the computer device receiving drawing gesture inputs from the at least one user for each image of the set of images; and the computer device using the visual clue and drawing gesture inputs to create passwords to provide a locked access point for at least one device. | 04-07-2016 |
20160103985 | REVERSE BATTERY PROTECTION DEVICE AND OPERATING METHOD THEREOF - A wearable device includes: a touch screen; an acceleration sensor configured to generate an acceleration signal; an optical sensor using a light source and configured to generate a touch interrupt signal; and a control unit configured to detect a wearing state of the wearable device, the wearing state of the wearable device including a not-wearing state for the wearable device, a wrist wearing state, and a hand gripping state on the basis of the acceleration signal and the touch interrupt signal, and to execute a function corresponding to the wearing state of the wearable device. | 04-14-2016 |
20160103990 | Unattended Secure Device Authorization - Unattended secure device authorization techniques are provided. An operating system (OS) module, which is responsible for device validation when that device is interfaced to a host device, is enhanced. The enhanced OS module silently checks the peripheral device's identifier against a white list and if a match occurs, the enhanced OS module grants permission to the host device applications; if no match occurs, the enhanced OS module silently rejects application access to the device. In an embodiment, the enhanced OS module interacts with the device to determine whether the device is to be authorized or rejected. | 04-14-2016 |
20160110528 | Methods and Systems for Using Behavioral Analysis Towards Efficient Continuous Authentication - A computing device processor may be configured with processor-executable instructions to implement methods of using behavioral analysis and machine learning techniques to identify, prevent, correct, and/or otherwise respond to malicious or performance-degrading behaviors of the computing device. As part of these operations, the processor may perform multifactor authentication operations that include determining one or more of a transaction type criticality value, a user confidence value, a software integrity confidence value, and a historical behavior value, using the one or more of these values to determine a number of authentication factors that are be evaluated when authenticating a user of the computing device, and authenticating the user by evaluating the determined number of authentication factors. | 04-21-2016 |
20160110538 | MULTI- PROFILE MOBILE DEVICE INTERFACE FOR SAME USER - A multi-environment computer device configured for providing a work environment type and a personal environment type via a user interface for a device user, each of the environments having the same persona, the device having: a computer processor coupled to a memory, wherein the computer processor is programmed to coordinate interaction between the device user and the pair of environments presented on the user interface by: configuring the user interface to present the personal environment for facilitating interaction between the device user and personal applications associated with the personal environment, the personal environment having an assigned user name of said persona and a personal password, the personal environment presented using a set of unique personal environment user interface design elements for distinguishing the personal environment from the work environment via the user interface; and responding to a switch environment command generated by a switch mechanism invoked by the device user via the user interface to replace the personal environment with the work environment on the user interface. | 04-21-2016 |
20160117490 | AUTOMATIC ACTIVATION OF A SERVICE - A triggering mechanism may provide a user of a device the ability to send a multimedia message and/or capture multimedia information via the device without the user unlocking the device, without the user opening a messaging application and/or without the user opening an information capturing application on the device. In an example configuration, an emergency call button, or the like, on the device may provide a user several options for sending a message and/or capturing information. Upon selecting one or more of the options, applications for effectuating the selected option(s) may be automatically initiated without user intervention. | 04-28-2016 |
20160117491 | ELECTRONIC DEVICE AND METHOD FOR VERIFYING USER IDENTIFICATION - A user verification method executed in an electronic device stores iris information of a user in a storage device of the electronic device. In response to a user request to access the electronic device, iris information of the user is captured. The captured iris information is compared with the stored iris information. If the captured iris information matches the stored iris information, the user is allowed to access the electronic device. | 04-28-2016 |
20160117492 | METHOD OF AUTHENTICATING A USER HOLDING A BIOMETRIC CERTIFICATE - The present invention concerns a method of generating a biometric certificate of a user performed by a data processing device of a certifying authority, comprising a step of generating (E | 04-28-2016 |
20160125176 | BEHAVIORAL CHARACTERISTICS BASED USER VERIFICATION - A method, system, and computer program product for user verification based on behavioral characteristics are provided in the illustrative embodiments. A set of questions is presented from an application to a user, where the user has not previously been asked the set of questions. A set of answers received from the user corresponding to the set of questions is analyzed. A score is computed using the set of answers. A determination is made whether the score matches, within a tolerance value, a base score in a psychological profile of the user. When the score matches the base score within the tolerance value, a conclusion is made that an identity of the user has been verified. | 05-05-2016 |
20160125181 | Secure Display Element - Techniques for securely displaying sensitive information against attempts to capture such information via screenshots are introduced. Similar to the pieces of a puzzle, a plurality of images that collectively represent a keypad (for example) are generated and each image represents a different part of the characters. The generated images are to be displayed to a human user in a sequential fashion at at least a predetermined minimum frame rate, such that the plurality of images sequentially displayed are perceivable by the human user collectively as the keypad. In each of the plurality of images, at least a part of the characters of the keypad is disguised or concealed, and in some embodiments, to the extent that not a single character of the keypad is recognizable by a human or a machine. Further, bogus data can be selectively inserted to enhance security. | 05-05-2016 |
20160132669 | BIOMETRIC USER AUTHENTICATION SYSTEM AND A METHOD THEREFOR - The present disclosure relates to a method and a system for authenticating a user. In one embodiment, one or more input and target data samples extracted from a plurality of physiological and movement signals of the user are processed to train one or more regression models. In real time authentication, the input and target data samples are extracted from the plurality of physiological and activity signals and mapped with trained regression models to determine a regression error. Based on the regression error, an appropriate authentication signal is then generated and transmitted to the user. Using dynamically selected multiple input and target data samples for user authentication increases the accuracy of authentication, thereby reducing possibilities of invalid authentication. Further, the power consumed by the sensors and computation load is reduced by dynamically powering up and powering down of the one or more sensors based on their usage during the authentication process. | 05-12-2016 |
20160132670 | SYSTEMS AND METHODS FOR AUTHENTICATING USER IDENTITY BASED ON USER-DEFINED IMAGE DATA - The disclosed embodiments include computerized methods and systems that facilitate two-factor authentication of a user based on a user-defined image and information identifying portions of the image sequentially selected by the user. In one aspect, a communications device presents a first digital image of a first user on a touchscreen display. The communications device may receive, from the first user, information identifying portions of the first digital image selected in accordance with a candidate authentication sequence established by the first user. The selected first image portions may, for example, be associated with corresponding facial features of the first user. The communications device may determine whether the candidate authentication sequence matches a reference authentication sequence associated with the first digital image, and may authenticate an identity of the first user, when the first selection sequence is determined to match the second selection sequence. | 05-12-2016 |
20160132671 | Online Pseudonym Verification and Identity Validation - Methods, systems, and computer program products for authenticating an online user. Authentication involves sending a code from a server to a user device equipped with a source of illumination and a camera capable of capturing video imagery of the online user. The user device receives the code, modulates the source of illumination in accordance with the code, and captures video imagery of the user while the source of illumination is being modulated according to the code. The captured video imagery of the online user is sent to the server where it is analyzed to detect evidence of changes in illumination that correspond to the code. If good correspondence is found, the user may be authenticated. Similar methods may be applied to other biometric data. Applications of the authentication include identify validation, pseudonym verification, and distinguishing human from non human access attempts. | 05-12-2016 |
20160132672 | REMOTE ENTRY SYSTEM - A system is disclosed for providing secure access to a controlled item, the system comprising a database of biometric signatures, a transmitter subsystem comprising a biometric sensor for receiving a biometric signal, means for matching the biometric signal against members of the database of biometric signatures to thereby output an accessibility attribute, and means for emitting a secure access signal conveying information dependent upon said accessibility attribute, wherein the secure access signal comprises one of at least a rolling code, an encrypted Bluetooth™ protocol, and a WiFi™ protocol, and a receiver sub-system comprising means for receiving the transmitted secure access signal and means for providing conditional access to the controlled item dependent upon said information. | 05-12-2016 |
20160132673 | VARIABLE IMAGE PRESENTATION FOR AUTHENTICATING A USER - Facilities are provided herein for authenticating a user to use a processing device. A user predefines authenticators of one or more types and associates these with graphical images. Upon on attempt to activate the processing device, a graphical image, of the graphical images, is selected for presentation to the user. The selected graphical image is presented to the user, who then provides input to authenticate with the device. A determination is made as to whether the user is authenticated to use the device. The determination is made based on input received from the user and based further on the authenticator associated with the selected graphical image. Varying the selection of image(s), each associated with a predefined authenticator and authentication type, enables variability in the authenticator that is suitable for unlocking a device at a given time, providing greater security to the authentication process. | 05-12-2016 |
20160132674 | APPARATUS AND METHOD FOR CONFIGURING PASSWORD AND FOR RELEASING LOCK - Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels. | 05-12-2016 |
20160132688 | Task Oriented Passwords - When the mobile device is awakened, a task oriented password system takes control of the device in order to present a screen in which the user must participate in a particular task prior to being granted access to the device contents or a particular application on the device. While not limited, in some embodiments, this particular task may be educational in nature. In this way, the user is exposed to educational content every time he attempts to access his device. Although each task is relatively short, the aggregate time during the course of a day may be substantial. The task oriented password system may include the mobile device, as well as one or more content providers, who generate the content that becomes part of the tasks described herein. | 05-12-2016 |
20160132691 | SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS - A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be programmed to display a first plurality of pictures and configure the user interface to allow the user to select a first picture corresponding to the user from the first plurality of pictures to provide a first authentication step and allow the user to select a second picture from a second plurality of pictures providing a second authentication step. The system can log the user into the corresponding user account if the second picture selected from the second authentication step corresponds to the first picture selected from the first authentication step. A system and method for logging multiple users into corresponding user accounts is also disclosed. | 05-12-2016 |
20160140332 | SYSTEM AND METHOD FOR FEATURE-BASED AUTHENTICATION - A system and method for capturing an image of a user. An image is captured with a camera, wherein the image includes a user's image. A first avatar is displayed in a display, wherein displaying includes positioning an avatar in at least some of the user's image. The user is then encouraged to move so the first avatar moves to a second position in the display. | 05-19-2016 |
20160140333 | SYSTEMS AND METHODS FOR DIFFERENTIAL ACCESS CONTROL BASED ON SECRETS - Differential access to data for a user of a processor-based system is disclosed wherein the user may select one secret from among a plurality of secrets that allows and/or enables access to potentially different sets of data, different resources for accessing the data and/or different tasks for the user to interact with the system. The selection of any particular secret may arise as to the user's feeling as to how secure the environment is for accessing the data. For example, if the user is in a very secure environment, the user may select a secret that allows substantially broad access to data, resources and tasks. If the environment is not secure, or if the user is under duress, the user may select a secret that provides limited access, or a decoy set of data and/or may provide the user with access to defensive measures to protect the data. | 05-19-2016 |
20160140334 | Device Functionality Access Control Using Unique Device Credentials - Apparatus and method for controlling access to protected functionality of a data storage device. In some embodiments, a plurality of identification (ID) values associated with a data storage device are combined to form a combined ID value. The combined ID value is cryptographically processed using a secret symmetric encryption key in combination with a hash function or a key derivation function to generate a unique device credential for the data storage device. The unique device credential is used as an input to a selected cryptographic function to control access to a protected function of the data storage device. | 05-19-2016 |
20160140379 | IMPROVEMENTS IN OR RELATING TO USER AUTHENTICATION - A user authentication method and system is disclosed, in which the same sensor surface is used for scanning a fingerprint and for entry of a user-specific code. The user specific-code comprises gestures that are guided by a frame. | 05-19-2016 |
20160142509 | SMART REMOTE CONTROL SYSTEM - A smart remote control system includes multiple terminals and a server. Each terminal is accessible by an electronic device through use of a registered account/password set. Upon receipt of an association request and a to-be-associated account/password set, one of the terminals is operable to transmit the to-be-associated account/password set to the server. In turn, the server determines whether the to-be-associated account/password set conforms with one of a plurality of user account/password sets stored therein, and enables the one of the terminals to be accessible by the electronic device through use of the to-be-associated account/password set when the determination is affirmative. | 05-19-2016 |
20160147987 | BIOMETRICS-BASED AUTHENTICATION METHOD AND APPARATUS - Provided are a method and an electronic device for performing an authentication on the basis of biometrics. The electronic device may acquire sensing data by sensing a target to be authenticated. The electronic device may calculate feature information from the sensing data. The electronic device may determine whether the calculated feature information and stored registered information match each other by using a dynamic matching scheme in which matching between the feature information and the registered information is variably performed according to a state of the electronic device. When the feature information and the registered information match each other on the basis of a result of the determination, the electronic device may generate an event for authentication success. | 05-26-2016 |
20160147989 | METHOD AND SYSTEM FOR AUTHENTICATING ACCESS TO A COMPUTING DEVICE - Embodiments of the present disclosure disclose a method and a system for authenticating access to a computing device. The method comprises providing a user interface on a display of the computing device. The user interface comprises a grid comprising a plurality of colorable grid cells and a plurality of colors to be filled in the plurality of colorable grid cells. The method further comprises receiving a pattern from the user, wherein the pattern comprises of a plurality of colored grid cells and order of coloring of the plurality of colored grid cells. The method further comprises comparing the pattern received from the user with a predefined pattern. The method further comprises providing access to the computing device based on the comparison. | 05-26-2016 |
20160147990 | METHOD FOR AUTHENTICATING A USER OF A MOTOR VEHICLE, AUTOMOTIVE, AND COMPUTER PROGRAM - A method for authenticating an authorization of a user of a motor vehicle. The method includes sending a request signal for an authentication code to a computer. The method also includes providing the authentication code via the computer to an onboard device included in the motor vehicle. | 05-26-2016 |
20160148012 | SYSTEM, METHOD AND APPARATUS FOR VOICE BIOMETRIC AND INTERACTIVE AUTHENTICATION - A system, method and apparatus is disclosed for voice biometric and interactive authentication including the obtaining of a voice authentication file and a sequence of user's face images and making a decision about the presence of a dummy on the images. A distinctive feature of invention combine pronunciation of a phrase (in addition to physically typing in) taken from this grid with the voice biometrics that will double check not only if the voice is correct, but if the numbers are correct as well. This passphrase is secured during pronunciation because the numbers are changing randomly and frequently while the same numbers are also placed in the other places along the selected graphic, grid, pattern or a combination thereof. | 05-26-2016 |
20160154950 | SYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICE | 06-02-2016 |
20160154951 | BUTTON DEPRESS WAKEUP AND WAKEUP STRATEGY | 06-02-2016 |
20160154954 | ACTIVATING DISPLAY AND PERFORMING ADDITIONAL FUNCTION IN MOBILE TERMINAL WITH ONE-TIME USER INPUT | 06-02-2016 |
20160154955 | COMMUNICATION SYSTEM, ELECTRONIC DEVICE AND METHOD | 06-02-2016 |
20160154956 | EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE | 06-02-2016 |
20160162677 | PERFORMING AUTHENTICATION BASED ON USER SHAPE MANIPULATION - In one embodiment, an apparatus comprises: a first logic to receive a user selection of an authentication shape, the authentication shape to be displayed on a display of a system during a user authentication, associate at least one identity characteristic with each of a plurality of sides of the authentication shape, and receive a plurality of user indications each corresponding to a manipulation of the authentication shape to enable one of the plurality of sides of the authentication shape to be a prominent side of the authentication shape on the display; an encoding logic to encode an identification of the authentication shape, the at least one identity characteristic associated with each of the plurality of sides, and the plurality of user indications into an encoded value; a security logic to generate a secure authentication value based on the encoded value; and a secure storage to store the secure authentication value. Other embodiments are described and claimed. | 06-09-2016 |
20160162680 | Login System And Method With Integrated Password And Verification Code - A login system and method with an integrated password and verification code are provided, in which an input frame and verification code are displayed on a login interface having a user message and the password and the verification code are prompted to be simultaneously keyed into the input frame, so that a key-in message may be decomposed into a password message and a verification message for a login verification use, whereby achieving the technical efficacy of an enhanced convenience of the login operation onto the login interface of a mobile device. | 06-09-2016 |
20160165450 | ACCESS CONTROL AUTHENTICATION BASED ON IMPEDANCE MEASUREMENTS - A computing device may be configured to authenticate a user for access control, and may include at least one ground electrode configured for contact with a user, an impedance sensor coupled to the least one ground electrode, where the impedance sensor may be configured to perform a measurement based on a touch input from the user, a memory which stores instructions, and a processor, coupled the impedance sensor and the memory, where the processor may be configured to execute the instructions. The instructions may cause the processor to: receive the touch input from the user, receive an impedance value based on the touch input measured by the impedance sensor, and determine whether the received impedance value corresponds to at least one stored impedance value associated with a user profile. | 06-09-2016 |
20160171184 | METHOD AND SYSTEM FOR VERIFYING RENAMED CONTENT USING MANIFESTS IN A CONTENT CENTRIC NETWORK | 06-16-2016 |
20160171192 | USER AUTHENTICATION AND DATA ENCRYPTION | 06-16-2016 |
20160171193 | SYSTEMS AND METHODS RELATED TO SECURITY CREDENTIALS | 06-16-2016 |
20160171195 | Continuous Monitoring of Access of Computing Resources | 06-16-2016 |
20160171197 | SYSTEM LEVEL USER BEHAVIOR BIOMETRICS USING FEATURE EXTRACTION AND MODELING | 06-16-2016 |
20160171198 | MANAGING LATENCY AND POWER IN A HETEROGENEOUS DISTRIBUTED BIOMETRIC AUTHENTICATION HARDWARE | 06-16-2016 |
20160171203 | SYSTEM AND METHOD OF USING RFID TAG PROXIMITY TO GRANT SECURITY ACCESS TO A COMPUTER | 06-16-2016 |
20160180069 | SYSTEM AND METHOD FOR UNLOCKING DEVICES ASSOCIATED WITH A CARRYING BAG | 06-23-2016 |
20160180078 | TECHNOLOGIES FOR ENHANCED USER AUTHENTICATION USING ADVANCED SENSOR MONITORING | 06-23-2016 |
20160188851 | COMPUTER HOST AND COMPUTER SYSTEM INCLUDING THE SAME - The disclosure provides a computer host including a south bridge chipset, an inductive circuit, a memory, and a processor. The inductive circuit obtains an identity information of an identification card. The memory device can store an authentication information. The processor obtains the identity information from the identification card and the authentication information from the memory device, and configured to compare the identity information with the authentication information. When the identity information of the identification card matches with the authentication information of the memory device, the computer is activated. The disclosure also provides a computer system including the computer host. | 06-30-2016 |
20160188853 | TECHNOLOGIES FOR AUTHENTICATING A USER OF A COMPUTING DEVICE BASED ON AUTHENTICATION CONTEXT STATE - Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of various context states of a mobile computing device based on sensor data generated by sensors of the mobile computing device. An authentication manager of the computing device implements an authentication state machine to authenticate a user of the computing device. The authentication state machine includes a number of authentication states, and each authentication state includes one or more transitions to another authentication state. Each of the transitions is dependent upon a context state output. The computing device may also include a device security manager, which implements a security state machine that includes a number of security states. Transition between security states is dependent upon the present authentication state of the user. The device security manager may implement a different security function in each security state. | 06-30-2016 |
20160188854 | AUTOMATIC LOG-IN FUNCTION CONTROL - Technologies are generally described for an automatic log-in function control scheme. In some examples, a method performed under control of an end device may include detecting, from the end device, input of one or more passcodes to access the end device; determining that a user of the end device is not an authorized user based at least in part on a detected behavioral pattern in connection with the input of the one or more passcodes; and disabling an automatic log-in function of at least one application that is hosted on the end device. | 06-30-2016 |
20160188856 | AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An authentication device includes a face image extracting unit that extracts a face image of an operator, a footwear image extracting unit that extracts a footwear image, the footwear image being an image of footwear of the operator, a face authentication unit that performs face authentication based on the face image and a registered face image that is registered in advance, and a footwear authentication unit that performs footwear authentication based on the footwear image and a registered footwear image that is registered in advance. The operator is authenticated based on the result of the face authentication performed by the face authentication unit, and the result of the footwear authentication performed by the footwear authentication unit. | 06-30-2016 |
20160188857 | Apparatus, login processing method, and medium - An electronic device that executes a first application program to control displaying a registration interface on a display; receive identification information input to the registration interface; generate a random character string in response to receiving the identification information; control the display to display the random character string on the registration interface; and store the random character string to a memory area allocated to the first application program. And executes a second application program to read the random character string from the memory area; and control the display to display the read random character string on a second interface which is different from the registration interface. | 06-30-2016 |
20160188865 | 3D PASS-GO - A 3D graphical password authentication method displays a 3D grid upon a user's request to access a restricted resource. The 3D graphical password authentication method requires the user to enter his or her access password by touching one or more intersections, namely touching the corresponding sensitive areas, on the 3D grid with an input device. A password is then produced as a sequence of the coordinates of the intersections touched along with penup values. | 06-30-2016 |
20160188899 | SECURITY ENHANCEMENT BASED ON USE OF ICONS WITH PASS CODES - Embodiments are directed to receiving, by a computing device comprising a processor, a selection of an icon that corresponds to a request for access to at least one of a resource and an activity associated with a conveyance device, receiving, by the computing device, a pass code, determining, by the computing device, that the pass code corresponds to the icon, and causing, by the computing device, the requested access to be provided based on determining that the pass code corresponds to the icon. | 06-30-2016 |
20160191475 | DATA ACCESSING METHOD AND SYSTEM AND MEMORY STORAGE APPARATUS - A data accessing method and system for a memory storage apparatus are provided. The method includes: performing a near field communication between a memory storage apparatus and an electronic apparatus, and receiving a first password from the electronic apparatus by the memory storage device in the near field communication. The method also includes: recording the first password in a memory unit of the memory storage apparatus. The method further includes: when the memory storage apparatus is not connected to the electronic apparatus or a host in a predetermined time after the memory storage apparatus receives the first password, deleting the first password recorded in the memory unit; and when the first password recorded in the memory unit is the same as a second password in the memory storage apparatus, allowing the electronic apparatus or the host to access the memory storage apparatus by the memory storage apparatus. | 06-30-2016 |
20160196417 | INFORMATION PROCESSING APPARATUS | 07-07-2016 |
20160202486 | HEAD-MOUNTED DISPLAY DEVICE, CONTROL METHOD FOR THE HEAD-MOUNTED DISPLAY DEVICE, AND AUTHENTICATION SYSTEM | 07-14-2016 |
20160203306 | Background Enrollment and Authentication of a User | 07-14-2016 |
20160203307 | AUTHENTICATION FOR ACCESS TO A DEVICE THAT HAS A PRIMARY DISPLAY PORTION AND A SECONDARY DISPLAY PORTION | 07-14-2016 |
20160203308 | Continuously Changing Unlock Pattern Using Moving Icons | 07-14-2016 |
20160203309 | INPUT DEVICE FOR INPUTTING PASSWORD OR THE LIKE AND MOBILE TELEPHONE HAVING THE INPUT DEVICE | 07-14-2016 |
20160203311 | AUTHORIZATION OF UNIQUE COMPUTER DEVICE SPECIMENS | 07-14-2016 |
20160203340 | METHOD AND APPARATUS FOR SECURELY SAVING AND RESTORING THE STATE OF A COMPUTING PLATFORM | 07-14-2016 |
20160203362 | Air Writing And Gesture System With Interactive Wearable Device | 07-14-2016 |
20160253488 | AUTHENTICATING DEVICE AND AUTHENTICATING METHOD | 09-01-2016 |
20160253502 | One-Time Power-On Password | 09-01-2016 |
20160378961 | SECURITY SYSTEM, APPARATUS AND METHOD USING ADDITIONAL CODE - The present invention relates to a system and a method for controlling the use of electronic equipment using a code input method and, more specifically, to a security system, apparatus and method using an additional code, in which the use of functions or services of electronic equipment such as smartphones, mobile equipment, computers, banking terminals, door electronic equipment and service providing servers is restricted, or an additional function for user's convenience is controlled, by using a code input method combined with an additional code having an additional function; and when the electronic equipment is exposed to a criminal, the electronic equipment operates as normal, notifying a response institution of the emergency situation while the criminal's requests are carried out by using a disguised control code including an additional code having an additional function disguised as an authentication code, thereby protecting a user from a crime. | 12-29-2016 |
20160378963 | AUTHENTICATION OF GESTURE INPUT THROUGH RFID SCANS - Systems, apparatuses and methods may provide for receiving one or more radio frequency identifier (RFID) codes from a passive wearable device and identifying gesture input in at least one of the RFID code(s). Additionally, access to a computing system may be granted if the gesture input corresponds to a known gesture. In one example, identifying the gesture input includes detecting a change in at least one of the RFID code(s) and the detected change is compared to an expected change associated with the known gesture. | 12-29-2016 |
20160378965 | ELECTRONIC APPARATUS AND METHOD FOR CONTROLLING FUNCTIONS IN THE ELECTRONIC APPARATUS USING A BIO-METRIC SENSOR - According to various embodiments of the present disclosure, an electronic device may include a biometric sensor configured to detect a contact signal from at least two biometric electrodes and a processor configured to determine whether the contact signal received from the biometric sensor has biological characteristics. When the processor determines that the contact signal is a biometric input having biological characteristics, the processor executes a biometric information function. When the processor determines that the contact signal does not include the biological characteristics, the processor executes a general function related to an application. | 12-29-2016 |
20160378966 | FINGERPRINT GESTURES - User authentication for a user device can leverage one or more fingerprint sensor regions capable of detecting and/or recognizing a user's fingerprints. The user can define a fingerprint gesture or sequence of fingerprint gestures as a passcode, with access to a protected function being conditional on the user performing the defined fingerprint gesture or sequence of fingerprint gestures. Different fingerprint gestures or fingerprint gesture sequences can invoke or authorize different functions of the device. Fingerprint gestures from two or more users in the same location or in different locations can be used to unlock a protected function of a device. | 12-29-2016 |
20160378967 | System and Method for Accessing Application Program - System and method for accessing and launching application programs or applications on electronic devices. In an aspect, when a user enters a password plus an element, a selected application is launched along with the unlocking process. In other aspects, an express button is arranged for executing a specific application directly or accessing multiple applications. A user may make an express button appear, disappear, or reappear on screen with simple acts. | 12-29-2016 |
20160378968 | TECHNOLOGIES FOR DEPTH-BASED USER AUTHENTICATION - Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password. | 12-29-2016 |
20160378969 | METHOD AND APPARATUS FOR OPERATING MOBILE TERMINAL - A method and apparatus for easily restricting a use right and improving use convenience in a mobile terminal are provided. The method includes displaying a profile list for selecting a set operation mode of the mobile terminal from the displayed profile list; setting an operation mode of the mobile terminal as the selected operation mode, when the set operation mode is selected from the displayed profile list; and displaying a screen associated with the selected operation mode, wherein the set operation mode includes an open mode to use all functions of the mobile terminal and a limited mode to use only set functions. | 12-29-2016 |
20160378990 | VALIDATING FIRMWARE ON A COMPUTING DEVICE - For validating computing device firmware, systems, apparatus, and methods are disclosed. The apparatus includes a processor, and a memory that stores code executable by the processor, the code including code that acquires a firmware manifest for locally stored firmware, authenticates a digital signature of the firmware manifest, and validates contents of the locally stored firmware using the firmware manifest. The apparatus may also include code that generates a local firmware manifest from the firmware, wherein validating the contents of the firmware includes comparing the local firmware manifest to the firmware manifest. In certain embodiments, the apparatus may indicate, to a user, one of success and failure of the firmware validation. The firmware manifest may be a location-specific firmware manifest corresponding to a geographical location of the apparatus and/or computing device including the locally stored firmware. | 12-29-2016 |
20160378992 | AUTHENTICATION SYSTEM AND METHOD - An example method includes receiving an indication of a first level of authentication for an electronic device, the first authentication being associated with a first authentication device associated with the user; receiving an indication of a second level of authentication for the electronic device, the second authentication being associated with a second authentication device associated with the user, the second authentication device being different from the first authentication device; and upon receiving the indication of at least the first level of authentication and the second level of authentication, allow access to the electronic device. | 12-29-2016 |
20170235933 | WEARABLE COMPUTING DEVICE | 08-17-2017 |
20170235934 | METHOD AND APPARATUS FOR IDENTITY AUTHENTICATION | 08-17-2017 |
20170235935 | MOBILE TERMINAL, SMART WATCH, AND METHOD OF PERFORMING AUTHENTICATION WITH THE MOBILE TERMINAL AND THE SMART WATCH | 08-17-2017 |
20170235936 | SECURE CREDENTIAL SERVICE FOR CLOUD PLATFORM APPLICATIONS | 08-17-2017 |
20170235940 | ENHANCED TASK SCHEDULING FOR DATA ACCESS CONTROL USING QUEUE PROTOCOLS | 08-17-2017 |
20170235941 | KEY GENERATING METHOD AND APPARATUS USING CHARACTERISTIC OF MEMORY | 08-17-2017 |
20170238138 | MOBILE COMPUTING DEVICE AND WEARABLE COMPUTING DEVICE HAVING AUTOMATIC ACCESS MODE CONTROL | 08-17-2017 |
20180025139 | AUTHENTICATION BASED ON CONFIGURATION OF INTERLOCKING BRICKS | 01-25-2018 |
20180025142 | COMPUTING DEVICE CHORDING AUTHENTICATION AND CONTROL | 01-25-2018 |
20180025144 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND STORAGE MEDIUM | 01-25-2018 |
20180025146 | METHOD FOR SECURE SYNCHRONIZATION AND PAIRING BETWEEN DEVICES AND APPARATUS USING THE METHOD | 01-25-2018 |
20190147153 | Enhanced Security Access | 05-16-2019 |
20190147158 | SECURE PASSWORD INPUT IN ELECTRONIC DEVICES | 05-16-2019 |