Patent application number | Description | Published |
20130024918 | METHODS AND SYSTEMS FOR AUTHENTICATING USERS OVER NETWORKS - A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal identification number from the entered personal identification number, combining the hashed personal identification number with the replaceable shared secret to generate a modified shared secret, and generating a one-time password with the modified shared secret and the time of requesting the one-time password. | 01-24-2013 |
20130024947 | METHODS AND SYSTEMS FOR REPLACING SHARED SECRETS OVER NETWORKS - A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life. | 01-24-2013 |
20130074194 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes. | 03-21-2013 |
20130074195 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 03-21-2013 |
20140020058 | METHODS AND SYSTEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 01-16-2014 |
20140020074 | METHODS AND SYSTEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 01-16-2014 |
20140099003 | METHODS OF MAINTAINING THE RELATIVE POSITION BETWEEN A DATA CAPTURE DEVICE AND AN OPERATOR OF THE DEVICE - A method for maintaining the relative position between a data capture device and an operator of the data capture device includes prompting the operator to arrange a data capture device to be in an optimal position relative to an operator of the device. Moreover, the method includes capturing authentication data of the operator with the data capture device while the operator uses data displayed on a screen of the data capture device, and determining whether the data capture device is in the optimal position relative to the operator while capturing authentication data of the operator. Furthermore, the method includes determining a displacement of the data capture device relative to the optimal position when the data capture device is in a position different than the optimal position, and shifting the data relative to the screen by applying the relative displacement to the data. | 04-10-2014 |
20140130186 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication. | 05-08-2014 |
20140208402 | METHODS AND SYSTEMS FOR INCREASING THE SECURITY OF ELECTRONIC MESSAGES - A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes. | 07-24-2014 |
20140283022 | METHODS AND SYSEMS FOR IMPROVING THE SECURITY OF SECRET AUTHENTICATION DATA DURING AUTHENTICATION TRANSACTIONS - A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data. | 09-18-2014 |
Patent application number | Description | Published |
20080319682 | Method and System For Operating In-Situ (Sampling) Chemical Sensors - A system and method of alternately purging an in-situ sensor with clean fluid and sampling a fluid volume of interest, in order to eliminate drifts and errors associated with the absorption of chemicals to the sensing elements of in-situ sensors. The system and method effectively processes the output of the in-situ sensor using this alternating sample and purge cycle to detect and identify chemicals accurately and reliably. The system and method also effectively reduce errors induced by temperature and humidity drifts in the ambient, and the sampled, fluid. | 12-25-2008 |
20090055102 | Remote sensor and in-situ sensor system for improved detection of chemicals in the atmosphere and related method thereof - A system having an optical remote sensor where sensing can be achieved from distance, and therefore without necessarily making contact with the threat chemical, with one or more in-situ sensors where sampling of air is required, and where at least one sensor is cross-reactive. Aspects of some of the various systems capable of achieving, but not limited to thereto, the following advantages: (a) by the optical sensor: long range advanced warning, rapid large volume analysis, fast response continuous monitoring for protection against bursts, safety to the operator, (b) by the in-situ sensor: high sensitivity, (c) by the combination of sensors, high specificity, better avoidance of interferences by chemicals and (d) by the inclusion of cross reactive characteristics, the ability to learn response to new chemicals. | 02-26-2009 |
Patent application number | Description | Published |
20110083685 | COIL PACKAGING FOR SMOKELESS TOBACCO - A pocket sized dispenser houses in coiled form a flexible strip of portions of smokeless tobacco sized for placement between a consumer's cheek and gum, where the flexible strip includes a base tape removably attached to the plurality of portions, and wherein the dispenser and strip are adapted to allow a consumer to separate individual portions from the base tape. The individual portions comprise either a collection of tobacco particles at least partially enclosed by a coating comprising a water-soluble non-crosslinked component and a substantially water-insoluble cross-linked component; or pouches attached to the base tape with a food-grade adhesive, the pouches comprising smokeless tobacco enclosed in a water-permeable wrapper with at least one lap-sealed edge. Methods of preparing such are disclosed. | 04-14-2011 |
20110203601 | NON-TOBACCO POUCH PRODUCT - A pouched non-tobacco product includes a lined pouch material of a web and a water-soluble liner adjacent the web and a non-tobacco flavorful component contained within the lined pouch material. The water-soluble liner is interposed between the web and the non-tobacco flavorful component. The liner preferably reduces staining of the web by the non-tobacco flavorful component. Additionally, the liner may include a flavorant. | 08-25-2011 |
20110240048 | TOBACCO POUCH PRODUCT - A pouched tobacco product includes a lined pouch material of a web and a water-soluble liner adjacent the web and a tobacco component contained within the lined pouch material. The water-soluble liner is interposed between the web and the tobacco component. The liner preferably reduces staining of the web by the tobacco component. Additionally, the liner may include a flavorant. | 10-06-2011 |
20120024301 | Preformed Smokeless Tobacco Product - Some embodiments of a smokeless tobacco system include one or more preformed smokeless tobacco products configured to generally retain their shape during processing, shipping, and consumer handling. In particular embodiments, each smokeless tobacco product can comprise a moist smokeless tobacco in combination with a selected binder such that the final product is configured to have material properties providing improved handling, an improved mouth feel, and a satisfying flavor profile. | 02-02-2012 |
20140130818 | Preformed Smokeless Tobacco Product - Some embodiments of a smokeless tobacco system include one or more preformed smokeless tobacco products configured to generally retain their shape during processing, shipping, and consumer handling. In particular embodiments, each smokeless tobacco product can comprise a moist smokeless tobacco in combination with a selected binder such that the final product is configured to have material properties providing improved handling, an improved mouth feel, and a satisfying flavor profile. | 05-15-2014 |
20140158145 | NON-TOBACCO POUCH PRODUCT - A pouched non-tobacco product includes a lined pouch material of a web and a water-soluble liner adjacent the web and a non-tobacco flavorful component contained within the lined pouch material. The water-soluble liner is interposed between the web and the non-tobacco flavorful component. The liner preferably reduces staining of the web by the non-tobacco flavorful component. Additionally, the liner may include a flavorant. | 06-12-2014 |
20140166512 | TOBACCO POUCH PRODUCT - A pouched tobacco product includes a lined pouch material of a web and a water-soluble liner adjacent the web and a tobacco component contained within the lined pouch material. The water-soluble liner is interposed between the web and the tobacco component. The liner preferably reduces staining of the web by the tobacco component. Additionally, the liner may include a flavorant. | 06-19-2014 |