Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Credential usage

Subclass of:

726 - Information security

726002000 - ACCESS CONTROL OR AUTHENTICATION

726016000 - Stand-alone

726017000 - Authorization

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20120266236PASSWORD INPUT METHOD USING VISUAL OBJECT - A method and apparatus is provided for switching from a regular desktop screen to a password input screen for a user to input a password. An apparatus may comprise a first screen display as the password input screen, a second screen display as the regular desktop screen, and a switching system. The switching system may be configured to switch a screen item position between the first screen display and the second screen display. The switching system may receive a user selection of a sequence of screen items as a password input and may switch operation of the apparatus between the first screen display to the second screen display.10-18-2012
20130031623MULTI-FACTOR AUTHENTICATION USING DIGITAL IMAGES OF BARCODES - Methods, systems, and computer-readable media for implementing a multi-factor authentication scheme utilizing barcode images in computing devices, such as standard mobile devices and smartphones having no native hardware support for reading barcodes other than standard digital camera componentry for capturing digital images of real-world phenomena. A mobile device may be configured by software to require a user, as a first authentication factor, to present a barcode, such as a Quick Response (QR) Code for image scanning using digital camera componentry built into the mobile device. The device analyzes the digital image of the barcode to decode the barcode into its encoded character data. If the device recognizes the character data as valid, then, as a second authentication factor, the device prompts the user to enter a valid password associated with the barcode. If the user-entered barcode is also valid, then the device may grant the user access.01-31-2013
20090210940SYSTEM AND METHOD OF USING RFID TAG PROXIMITY TO GRANT SECURITY ACCESS TO A COMPUTER - A system and method of granting and removing a user's security access to applications on a computer using proximity of authorized RFID tags is disclosed. A user having an authorized RFID tag that is located near the computer will be granted access to pre-authorized applications.08-20-2009
20090165121Touch Pad based Authentication of Users - Touch pad based authentication of users. In an embodiment, a user can touch (and move on) a touch pad in a specific pattern (e.g., up, down, etc.) to authenticate oneself. In an embodiment, a device translates the touch movement to the same set of characters as those a user can manually enter using a keyboard to authenticate oneself. As a result, the user can use the same password when accessing the same application from other systems which have only keyboards, but not touch pads.06-25-2009
20120174213USER IDENTIFICATION WITH BIOKINEMATIC INPUT - Systems and methods for user identification based on biokinematic input are disclosed herein. The system may include a multi-touch sensitive display including a sensor configured to receive biokinematic input including data representing detected positions of digit touches made by digits of a user, in each of a series of successive time intervals during a defined identification gesture. The system may further include a user identification module executed by a processor of the computing device. The user identification module may be configured to receive the biokinematic input from the sensor, and to compare relative positions of the digit touches and/or relative rates of change in said positions of the digit touches to a stored user template of verified biokinematic data for the user. If a match is determined, an indication that the user has been successfully identified may be displayed.07-05-2012
20090193519Systems and Methods for Accessing a Tamperproof Storage Device in a Wireless Communication Device Using Biometric Data - A novel system and method for accessing data stored in a secure or tamperproof storage device in a wireless communication device is provided. The wireless communication device may include a biometric sensor for capturing a biometric sample of the user. The captured biometric sample may be compared to known biometric samples of users stored in a memory device of the wireless communication device. If the captured biometric sample matches one of the known biometric samples, the user is allowed access to the tamperproof storage device for a preset amount of time. The user may delete existing data, add new data, modify existing data or view existing data stored in the tamperproof storage device.07-30-2009
20110202994BIOMETRIC SENSOR FOR HUMAN PRESENCE DETECTION AND ASSOCIATED METHODS - An electronic device may include a communications interface, a user prompting device, a biometric sensor, and a controller. The controller may perform biometric spoof detection with the biometric sensor, and receive a request for human presence verification from a remote device via the communications interface. The controller may also prompt the user for a verification action using the sensor based upon receiving the request, and determine that the user has completed the verification action in response to the prompting and based upon the biometric spoof detection. The controller may further send a response to the remote device via the communications interface and based upon determining that the user has completed the verification action. The controller may send a notification to the remote device that there is a biometric sensor.08-18-2011
20100115609DEVICE FOR ACCESSING MEDICAL INFORMATION - A device for accessing medical information provides an emergency responder and/or emergency personnel the ability to access medical information in an emergency situation. The device can be used to access an individual's medical records for display, storage, and/or manipulation of the information on the device. The device can access an individual's medical information directly from the individual's mobile device, via removable memory, a SIM card, a port on the device, or the like. Thus, if there is no wireless access to the individual's mobile device, or the mobile device is inoperable, medical information is still obtainable.05-06-2010
20130086673TECHNIQUES FOR SECURELY UNLOCKING A TOUCH SCREEN USER DEVICE - Techniques are provided for detecting a sequence of contact or interaction instances initiated by a user on a surface of an interface unit of a user device. Each contact instance comprises one or more points of contact between the user and the surface of the interface unit, while each interaction instance comprises one or more points of activation with respect to the surface of the interface unit. The sequence of contact instances or interaction instances initiated by the user is then compared to stored information to determine whether the sequence of contact instances or interaction instances matches the stored information. If the sequence of contact instances or interaction instances matches the stored information, access is granted to the user device or to a device or system associated with the user device.04-04-2013
20130086674Multi-frame depth image information identification - Embodiments of the present invention relate to systems, methods, and computer storage media for identifying, authenticating, and authorizing a user to a device. A dynamic image, such as a video captured by a depth camera, is received. The dynamic image provides data from which geometric information of a portion of a user may be identified as well as motion information of a portion of the user may be identified. Consequently, a geometric attribute is identified from the geometric information. A motion attribute may also be identified from the motion information. The geometric attribute is compared to one or more geometric attributes associated with authorized users. Additionally, the motion attribute may be compared to one or more motion attributes associated with the authorized users. A determination may be made that the user is an authorized user. As such the user is authorized to utilize functions of the device.04-04-2013
20130036462Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device - Techniques for improving security on a device are disclosed. In an aspect, a multi-factor password comprising a plurality of factors may be used to improve security. Each factor may correspond to a different type of information that may be used for authentication and/or other purposes. For example, the plurality of factors may include an alpha-numeric string, a fingerprint of a user, a voice clip, a picture, a video, etc. The device may authenticate the user based on the multi-factor password. In another aspect, a dynamic password that varies with at least one parameter (e.g., time, location, etc.) may be used to improve security. The dynamic password may have a plurality of values for a plurality of scenarios defined by at least one parameter. The device may authenticate a user in a given scenario based on a value of the dynamic password applicable for that scenario.02-07-2013
20130036461IMAGE-BASED AUTHENTICATION - Techniques for authenticating a user of a computing device (e.g., handheld, desktop, laptop) are provided. In order to grant access to any of the services provided by the computing device, the computing device displays, to the user, one or more images that are stored on the computing device. The user is required to accurately identify one or more objects depicted in the one or more images in order to gain access to the computing device. The computing device is not required to be connected to any network at the time of authentication. Authentication data that is associated with object(s) in each displayed image may have been established previously by another computing device and then provided to the computing device.02-07-2013
20130139250VIRTUAL APPLIANCE PRE-BOOT AUTHENTICATION - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated.05-30-2013
20090158424METHOD OF INPUTTING PASSWORD - The present invention discloses a method of inputting a password, and a background pattern is provided for helping a user to remember a password position and prevent the password from being stolen by others. The method of inputting a password sets a number of password characters on the background pattern, so that the user can remember at least one password position from the background pattern, and input a password character shown at the password position into a system. Therefore, the method can use the background pattern to help the user to remember the password position and prevent the password from being stolen by others.06-18-2009
20090158423LOCKING MOBILE DEVICE CRADLE - Systems, devices and/or methods that facilitate an improved locking system are presented. An improved locking system can employ biometric sensing to facilitate improved mobile device security, more specificity in user access, specificity in levels of access, user accountability, selection of available devices, or combinations thereof, among many others. An improved locking system can employ remote oversight, multiple layers of locking, and inferential determinations to further facilitate a more transparent, effective, and substantial locking system for mobile devices. The improved locking system can be employed in devices, cradles, docking stations, and/or aftermarket products, and the like, among many others.06-18-2009
20100107242IMAGING SYSTEM AND AUTHENTICATION METHOD - An imaging system is disclosed that performs authentication of a user. The system includes one or more manipulation detecting parts that detect one or more manipulations by the user related to an imaging process, one or more biometric information acquiring parts that acquire biometric information of the user when the manipulation detecting parts detect the manipulations by the user, and an authentication determining part that determines an authentication result of the authentication based on the biometric information acquired by the biometric information acquiring parts.04-29-2010
20120167203MANAGEMENT SYSTEM OF TEST DEVICE AND MANAGEMENT METHOD THEREOF - Assigning identifiers to a plurality of test devices to manage the test devices, and displaying the assigned identifiers on the test devices to distinguish the test devices.06-28-2012
20120167202APPARATUS AND METHOD FOR UNLOCKING A USER EQUIPMENT - An apparatus and method for unlocking a user equipment. The apparatus may include a first input unit, a second input unit, a controller, and a memory. The first input unit may be configured to set up a first password and to receive a first input. The second input unit may be configured to set up a second password and to receive a second input. The controller may be configured to compare the first input with the first password, compare the second input with the second password, and initiate an unlock operation of the user equipment based on a result of the comparisons. The memory may be configured to store at least the first password and the second password.06-28-2012
20100071060ELECTRONIC DEVICE AND METHOD FOR VERIFYING USER IDENTIFICATION - A method for verifying user identification receives an original symbol input by a user via a touch screen of an electronic device. A symbolic password is determined according to the original symbol. The method receives a login symbol input by the user via the touch screen and determines if the login symbol matches the symbolic password. The user is allowed to access the electronic device if the login symbol matches the symbolic password.03-18-2010
20090328200Hidden Markov Model ("HMM")-Based User Authentication Using Keystroke Dynamics - Hidden Markov Models (“HMMs”) are used to analyze keystroke dynamics measurements collected as a user types a predetermined string on a keyboard. A user enrolls by typing the predetermined string several times; the enrollment samples are used to train a HMM to identify the user. A candidate who claims to be the user provides a typing sample, and the HMM produces a probability to estimate the likelihood that the candidate is the user he claims to be. A computationally-efficient method for preparing HMMs to analyze certain types of processes is also described.12-31-2009
20090064318METHOD OF INPUTTING BOOTING PASSWORD - A method of inputting a booting password includes the following steps. When a computer is powered on, firstly, a first password input screen is outputted, which waits for a first password to be inputted. Next, if a second password input activating signal is received during the waiting process, a second password input screen is outputted, which waits for a second password to be inputted. Then, after the input of the first password or the second password is finished, an operating system is booted.03-05-2009
20090307768PASSWORD INPUT SYSTEM AND METHOD - A password input system includes a touch screen, a storing module, and an authentication module. The touch screen is capable of displaying a number of symbols, and is used for inputting a password by drawing a line group between the symbols on the touch screen, the line group includes one or more lines. The storing module stores a password consisting of characteristics of a preset line group. The authentication module is capable of comparing the characteristics of the line group drawn on the touch screen with the characteristics of the preset line group stored in the storing module, and allowing or denying a user's access to a main system by judging whether the characteristics of the line group drawn on the touch screen is matched with the characteristics of the preset line group stored in the storing module.12-10-2009
20090113544ACCESSING PASSWORD PROTECTED DEVICES - Embodiments of the invention include a method that comprises receiving and storing a power-on password. Embodiments of the invention include a method that comprises receiving and storing a power-on password. In one embodiment, the method includes receiving a power-on password, wherein the receiving of the power-on password occurs during power-on operations of a computer. The method can also include storing the power-on password, wherein the storing includes saving the power-on password in memory. The method can also include loading an operating system to control the computer, wherein the loading occurs after the power-on operations. The method can also include detecting, after the loading, that a peripheral devices has been added to the computer and determining that an access password is needed to access the peripheral device. The method can also include transmitting the power-on password to the peripheral device and presenting a prompt requesting a secondary password; receiving the secondary password. The method can also include transmitting the secondary password to the peripheral device; and accessing the peripheral device.04-30-2009
20120192268PASSWORD AUTHENTICATION METHOD - A password authentication method applied to an input recognition device with a touch sensitive screen, the password authentication method comprises defining and displaying at least one image according to the movement of an object touching on a touch sensitive screen, detecting a final position of the at least one image, and judging whether the at least one image and the final position thereof match a predetermined password or not; and if so entering an unlocking mode.07-26-2012
20130167227WORKING MACHINE, DATA COMMUNCATION SYSTEM FOR WORKING MACHINE, OPERATION SYSTEM FOR WORKING MACHINE, AND SETTING CHANGE SYSTEM FOR WORKING MACHINE - A working machine is provided with a control device that can make wireless communication with a mobile terminal storing a mobile-use ID code and stores a working machine-use ID code, wherein the control device is provided with: ID code checking means adapted to check the mobile-use ID code obtained by ID code obtaining means and the working machine-use ID code with each other; data communication means adapted, in the case where as a result of the checking by the checking means, matching between the ID codes is established, to allow data communication between the mobile terminal and the control device, and in the case where the matching is not established, not to allow the data communication; and ID code registration means adapted to register the working machine-use ID code in the mobile terminal as the mobile-use ID code.06-27-2013
20130061319INFORMATION PROCESSING APPARATUS, AND USER AUTHENTICATION METHOD FOR INFORMATION PROCESSING APPARATUS - An information processing apparatus to execute an application includes first and second authentication units, first and second storage units, a request unit, and an application execution unit. The first authentication unit authenticates a user of the information processing apparatus. The first storage unit stores first certification information relating to the authentication of a user. The request unit requests a second authentication unit to perform authentication required to execute the application using the first certification information when the application is executed based on an instruction from the user authenticated by the first authentication unit. The application execution unit executes the application when the authentication performed by the second authentication unit based on the request by the request unit has succeeded. The second storage unit stores second certification information relating to the second authentication unit authentication required to execute the application after associating the second certification information with the first certification information.03-07-2013
20130061318USER-DEFINED MULTIPLE INPUT MODE AUTHENTICATION - A user can define two or more input modes with respective input values to establish an authentication protocol to unlock a computer or govern other computer behavior. As an example, the user may first establish a particular voice recognition pattern followed by a particular image recognition and subsequent logons can be accomplished only by speaking the voice recognition pattern into the device and then by presenting the commanded image, such as an image of the use's face, to the device.03-07-2013
20130185790SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.07-18-2013
20120117643SYSTEM AND METHOD FOR LOCKING AND UNLOCKING ACCESS TO AN ELECTRONIC DEVICE - The disclosure relates to a system and method for unlocking and unlocking access to a device. The system comprises: a graphical user interface (GUI) module providing instructions to a microprocessor operating on the electronic device and an access management module providing instructions to the microprocessor. The GUI module provides instructions to generate on a display of the electronic device an interface for entry and modification of a tap pattern used to change an access state of the electronic device; and process inputs from an input device through the interface that select described levels of movement and described locations for expected tap signals for the tap pattern. The access management module provides instructions to receive signals from a monitoring circuit in the electronic device that processes a tap signal received from an accelerometer in the electronic device; and determine whether the tap signal completes a match for the tap pattern.05-10-2012
20130067567CHIP INTEGRATED PROTECTION MEANS - The invention relates to a chip for processing a content, comprising at least a microprocessor. Said chip includes an integrated non-volatile programmable memory for storing protection data and protected data, said protection data being intended to be used for authorizing/denying access to said protected data by said microprocessor under execution of a program. The invention allows to protect program and data dedicated to a chip-integrated conditional-access system and to protect features as external connections and downloaded data directly on the chip.03-14-2013
20130067566DEVICE TO PERFORM AUTHENTICATION ACCORDING TO SURROUNDING INFORMATION AND METHOD FOR PERFORMING AUTHENTICATION - A device to authenticate a user includes a user interface unit to receive a password input; a surrounding information detecting unit to detect surrounding information of the device; and an authentication unit to authenticate the password input and to determine whether the surrounding information matches preset surrounding information. A method for performing authentication includes receiving an authentication input for authenticating a user; determining whether an authentication condition is satisfied, based on surrounding information of a device; and authenticating the authentication input.03-14-2013
20110023113System and method for inhibiting access to a computer - A computer security system which prevents an unauthorized user from accessing the computer system when an authorized user has already logged onto the computer system and has temporarily left the workstation. The computer security system generally includes a sensor which is configured to detect the presence of a person in the region around a workstation and a processing unit which logs out of the computer when a person is no longer present in the region. An optional calibration tool may be provided to set the sensitivity of the sensor and prevent accidental logging out when the authorized user is still present in the region around the workstation.01-27-2011
20090260078AUTHENTICATION SYSTEM AND METHOD - An authentication apparatus and technology operable to change a response time based on a degree of authentication failure is disclosed. A degree of authentication failure can be determined in response to an authentication failure. A response time such as an authentication response time can be changed based on the degree of authentication failure. Intervals between entries of a password may be increased logarithmically based on the number of failed login attempts to deter unauthorized access.10-15-2009
20090007257SYSTEM, METHOD, SERVER, CLIENT TERMINAL, PROGRAM FOR BIOMETRIC AUTHENTICATION - The present invention provides a biometric authentication system including: a parameter manage server having a user parameter generating portion for generating a user parameter using a user ID transmitted from a client terminal, a master key and a temporary parameter; the client terminal having an input unit by which a user ID provided in advance for a user is input, a biological information sensor which acquires biological information of a user, a feature extracting portion which extracts feature from the biological information acquired by the biological information sensor and a transforming portion which transforms the feature using the user parameter generated by the parameter manage server to generate transformation feature; and an authentication server having a matching portion which matches the transformation feature transmitted from the client terminal against a template stored in advance in the storing portion.01-01-2009
20130167225GRAPHICAL IMAGE PASSWORD AUTHENTICATION METHOD - A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images, having different background colors, the correct image and background color which correspond to the user's computer account. In one advantageous form, in addition to selecting the correct image, the user must first enter a username and password. In an alte rnative form, if a user is seeking access to a computer network by using a preapproved access point or computer having an approved IP address, a user is allowed to gain access to the computer network without being prompted to select a correct image.06-27-2013
20130167226Handheld Mobile Device with USB Hard Drive and Optional Biometric Scanner, and Systems Including the Same - Mobile handheld communication devices such as cellular and/or smart phones are equipped with a detachable USB drive, and optionally, a biometric scanner and/or an electronic release mechanism and/or circuitry. The communication device has a housing, a central processing unit (CPU) within the housing, a memory controller within the housing and coupled to the CPU, and a universal serial bus (USB) hard drive that electrically communicates with the memory controller. The USB hard drive has an outer surface or casing that is integrated and/or integratable with the housing. The USB device may include a USB interface, a hard drive that communicates through the USB interface, and a biometric sensor. The biometric sensor establishes or authorizes electronic communication between the hard drive and the USB interface when biometric data obtained with the biometric sensor matches data stored in the hard drive.06-27-2013
20130167228SECURE DATA IN REMOVABLE STORAGE DEVICES VIA ENCRYPTION TOKEN(S) - Systems, methods, and devices that secure data on removable storage devices are presented. A token component can interface with a communication port on a host device. One or more removable storage devices can interface with one or more other communication ports on the host device. The token component includes a security component that, when interfaced with the host device, is employed to automatically and simultaneously enable access, encrypt data being stored in, and decrypt data being retrieved from the removable storage devices. When the token component is not interfaced with the host device, the removable storage devices are secured so that they cannot be accessed and data stored thereon cannot be retrieved and decrypted. A user optionally can utilize a password, which can be entered when the token component is interfaced with the host device, to facilitate controlling access to the removable storage devices and data encryption/decryption.06-27-2013
20120240223PROCESS AND APPARATUS FOR AUTOMATICALLY IDENTIFYING USER OF CONSUMER ELECTRONICS - A user of a device may be uniquely identified using a metric that is contingent upon the user using the device for its intended purpose without the user having to perform a separate step, function, or operation for the express purpose of identifying the user. Context sensitive content may be provided to or from the device based on the user's patterns of use of the device without requiring the user's personal information. The context sensitive content depends on the user's identity. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. This abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.09-20-2012
20080295166OUTPUT TERMINAL APPARATUS FOR PRINTING DATA BY EMAIL11-27-2008
20080295165Method for Safely Logging Onto a Technical System11-27-2008
20110067097PLATFORM SECURITY APPARATUS AND METHOD THEREOF - A platform security apparatus and a method thereof are capable of protecting a mobile communication terminal from an abnormal or unintended operation of an application program installed over a platform of the mobile communication terminal. An authentication key is created with respect to each function of an application program, and the authentication key and an identifier of the application program are associated with each other and stored. An authentication process is performed by comparing an authentication key and an identifier of an application program registered as function parameters with an authentication key and an identifier of the application program which have been stored, when the application program calls the function.03-17-2011
20110138459TERMINAL AND METHOD FOR CONTROLLING THEREOF - Disclosed are a terminal and a method for controlling thereof that load a user authorization function in a terminal such as a remote controller that remotely controls an external display apparatus such as a TV, etc. and allow only users who accept user authorization to use the display apparatus.06-09-2011
20120159616PRESSURE SENSITIVE MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with a computer readable medium and a computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and either the modified base image or modified overlay image is moved by the user. Positive authentication is indicated in response to alignment of a base image reference point and an overlay image reference point and an indication of a correct level of pressure applied to a pressure sensitive input device.06-21-2012
20120090022VIRTUAL REMOVABLE DISK DEVICE FOR REMOVABLE STORAGE MEDIA - A method and apparatus for interfacing a host computer with a hard drive cartridge is disclosed in one embodiment. The virtual device interface is divided between a kernel component in a driver stack of the kernel space and a user component configured to run in user space. The kernel component passes data commands from the operating system to a cartridge dock while separating other commands that are passed to the user component. The user component authenticates the kernel component and/or the hard drive cartridge. Use of the removable hard drive cartridge is also authorized by the user component.04-12-2012
20090083850EMBEDDED AUTHENTICATION SYSTEMS IN AN ELECTRONIC DEVICE - This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system may include one or more sensors operative to detect biometric information of a user. The sensors may be positioned in the device such that the sensors may detect appropriate biometric information as the user operates the device, without requiring the user to perform a step for providing the biometric information (e.g., embedding a fingerprint sensor in an input mechanism instead of providing a fingerprint sensor in a separate part of the device housing). In some embodiments, the authentication system may be operative to detect a visual or temporal pattern of inputs to authenticate a user. In response to authenticating, a user may access restricted files, applications (e.g., applications purchased by the user), or settings (e.g., application settings such as contacts or saved game profile).03-26-2009
20110283354Multi-Touch Interfaces for User Authentication, Partitioning, and External Device Control - Multi-touch interfaces allow user interaction with multiple points of contact to control external devices such as game consoles, authenticate users, partition the interface for multiple users, and so forth. The multi-touch interface may provide graphical representations that are manipulated by users through multiple points of contact to participate in games running on an external game console. Additionally, user authentication may occur through multiple points of contact with the multi-touch interface where each user has a unique contact pattern that includes points of contact, location of points of contact, rhythm of points of contact, and so forth. The graphical representations may be customized based on the authentication of a user, and the multi-touch surface may be partitioned based on the number of users present.11-17-2011
20120291123METHOD AND ELECTRONIC DEVICE FOR INPUTTING PASSWORDS - A method for inputting passwords is provided. The method includes steps of: displaying a password inputting interface on a screen, wherein the password inputting interface displays a plurality of first objects and a plurality of second objects. The first objects each have different first identification features, such that a user can distinguish the different first objects through the first identification features, and the second objects are at different locations on the screen; receiving at least one of the first objects, followed by the moving of the received at least one first objects to at least one of the second objects, wherein the user operates the movement of the received at least one first objects; and determining if the operation is correct according to moving of the at least one first objects to the at least one second objects.11-15-2012
20110302649SYSTEM FOR AND METHOD OF PROVIDING SECURE SIGN-IN ON A TOUCH SCREEN DEVICE - A system for and method of providing secure sign-in on a touch screen device that comprises an electronic device in accordance with exemplary embodiments may include receiving, from a user, password data in a first input format, determining that the password data is associated with a valid user by at least comparing the first input format of the password data to a second input format and comparing the password data to valid character element data, wherein the second input format is derived in accordance with one or more password format rules, and providing the valid user with access to one or more functions of the touch screen device.12-08-2011
20110296521METHOD AND TOKEN FOR MANAGING ONE PROCESSING RELATING TO AN APPLICATION SUPPORTED OR TO BE SUPPORTED BY A TOKEN - The invention relates to a method 30 for managing at least one processing relating to an application supported or to be supported by a token. The token comprises means for processing data, means for storing data and means for communicating with outside.12-01-2011
20130219490BIOMETRIC-RICH GESTURES FOR AUTHENTICATION ON MULTI-TOUCH DEVICES - The problem of obtaining a multi-touch input sequence for use in user authentication is solved by determining, at a plurality of time instances, a mapping from an unordered set of at least four touch points to a an ordered set of at least four fingertips, wherein for at least one of the plurality of time instances, the mapping from the unordered set of at least four touch points to the ordered set of at least four fingertips is subject to a constraint that the ordered set of at least four touch points defines a simple polygon.08-22-2013
20100146619ELECTRONIC DEVICE AND ACCESS CONTROL METHOD THEREOF - An electronic device and method for controlling access to an electronic device includes setting a username and a password of an authorized user, and creating a keystroke biometric template of the authorized user. The electronic device and method further includes receiving an input username and an input password of a user, and recording keystroke dynamics of the user, and determining an identification of the user by identifying the input username and the input password of the user and determining if keystroke characteristic values of the user match the keystroke biometric template of the authorized user.06-10-2010
20100031346AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD, AND RECORDING MEDIUM HAVING AUTHENTICATION PROGRAM RECORDED THEREON - It is determined whether a login button is pressed or not. If the login button being pressed is sensed, a user authentication window appears. After the user authentication window appears, it is determined whether an authentication code is input or not. If an authentication code is input, then it is determined whether a prescribed period of time has passed or not since the last logout. If it is determined that a prescribed period of time has not passed since the last logout, authentication is performed in MFP. It is then determined whether the authentication is “OK” or not. If the authentication is “OK,” the authentication is successful. A login process is then executed.02-04-2010
20100031345Access to a processing device - Authorizing access to one or more restricted functions provided by a processing device is described. A method for authorizing such access comprises: reading at least one time from a clock associated with the processing device; storing the read time as a reference time; after the read time is stored, reading another time (a current time) from the clock. The method also includes comparing the reference time with the current time; reading a trend status associated with the reference time; and authorizing access to the restricted functions provided by the processing device if an acceptance criterion is satisfied. The acceptance criterion may require (i) the read current time to be chronologically earlier than the reference time and the trend status to be trusted backward mode, or (ii) the read current time to be chronologically later than the reference time.02-04-2010
20090172810Apparatus and method for inputting graphical password using wheel interface in embedded system - Provided are an apparatus and method for inputting a graphical password that use representative pictures and elemental pictures of a graphic to form a graphical password and that receive the graphic via a wheel interface and a select button for user authentication. The apparatus includes: an input unit having a wheel interface and a select button; a display for displaying a graphic consisting of representative pictures and elemental pictures, and displaying a changed graphic in response to an input from the wheel interface; a memory for storing a graphical password of a user; and a controller for recognizing, when the select button is pressed, the graphic displayed on the display as a user-input graphical password, and determining whether the input graphical password matches the stored graphical password for user authentication. Thus, it is possible to increase the number of cases for a password using a wheel interface for a higher security level of an embedded system that has a low security level due to a limited type and length of letters input as a password.07-02-2009
20120110663APPARATUS AND METHOD FOR INPUTTING USER PASSWORD - An apparatus for inputting a user password, includes an interface receiving a command. Further, the apparatus for inputting the user password includes a control unit setting a target based on the command from the interface, receiving and storing a password character, and determining that authentication is successes only when the set target and the password character are positioned at a same coordinate on a skin image. Furthermore, the apparatus for inputting the user password includes a display unit connected to the interface to display the skin image of the interface that is transmitted from the control unit.05-03-2012
20120110662User Indentification with Capacitive Touchscreen - Disclosed herein are various embodiments of means and methods for verifying or authorizing one or more verified or authorized users to operate or use an electronic device containing a capacitive or other type of touchscreen or touch panel. Images are acquired from the touchscreen or touch panel and processed to determine first characteristics corresponding to fingers, hands or hand portions placed thereon. If the first characteristics match stored second characteristics with a sufficient degree of similarity, the user is identified as an authorized or verified user and then permitted to operate or use the electronic device.05-03-2012
20090150992KEYSTROKE DYNAMICS AUTHENTICATION TECHNIQUES - A keystroke dynamics authentication system collects measurements as a user types a phrase on a keyboard. A first set of derived data values are computed based on the collected measurements, and then a second set of derived data values are computed based on the first set of derived values. The first and second sets of derived values are used to construct a template for identifying the user based on his typing.06-11-2009
20090150993Mobile Device with Frequently Operated Biometric Sensors - A mobile device having a user input component receiving input from a user and a biometric sensor incorporated in the user input component collecting biometric data from the user when the user input component is receiving the input, wherein the input is non-biometric data. In addition, a system and method for receiving input from a user via a user input component of a mobile device and collecting biometric data from the user via a biometric sensor incorporated within the user input component when receiving the input from the user, wherein the input is non-biometric data.06-11-2009
20110265177SEARCH RESULT PRESENTATION - A data presentation system for a search engine may use classified or tagged elements in a resulting document to create a search result document that has portions redacted, modified, or changed based on the tags or classifications of elements within the document. The document may be rebuilt from the search engine database at presentation time with one or more elements changed or modified. The permission settings for a user or other factors may be used to determine which elements within the document are permitted to be accessed.10-27-2011
20090222912IDENTIFICATION DEVICE AND AUTHENTICATION METHOD THROUGH SUCH A DEVICE - An identification device comprises a seat for containing a sample of biological material and at least one storage support suitable for containing a record in electronic format of the DNA. An authentication method compares the record of the sample of DNA with the one stored in said support.09-03-2009
20100180338Multi-Domain Computer Password Management - A computer system has first and second password-protectable domains. The first domain has a multi-domain password manager for determining whether a password candidate is valid for both the first domain and the second domain. If so, the password manager submits the password candidate to the second domain.07-15-2010
20090293118SYSTEMS FOR AUTHENTICATION FOR ACCESS TO SOFTWARE DEVELOPMENT KIT FOR A PERIPHERAL DEVICE - A set of code for a peripheral device is installed on a host device. The set of code is used to control access to the peripheral device from the host device. The set of code also contains one or more subsets of code that can be used by software entities on the host device for access to the peripheral device. A software entity on a host device must be successfully authenticated with the set of code installed on the host device. Once the software entity is successfully authenticated, the set of code will provide access to the one or more subsets of code specific to the software entity. The one or more subsets of code can be used by the software entity to access the peripheral device.11-26-2009
20100083371User Access Control System And Method - A user access control system, comprising an electronic device comprising an electronic device comprising a reduced function operating system configured to enable access to at least one type of media content and a content control module executable by the reduced function operating system, the content control module configured to authenticate an identity of a user and control access to the at least one type of media content based on the identity of the user.04-01-2010
20100083372IMAGE FORMING APPARATUS AND SECURITY SETTING METHOD THEREOF - An image forming apparatus and a security setting method thereof. The security setting method of the image forming apparatus includes supplying power initially to the image forming apparatus, displaying an administrator setting screen for the image forming apparatus, and changing a preset administrator password of the image forming apparatus from the displayed administrator setting screen.04-01-2010
20100083370SYSTEM AND METHOD FOR DYNAMIC CYPHER AUTHENTICATION - A dynamic cypher authentication system is applied to an electronic device having an authentication password. The system includes an input module, a password triggering module, an operation module, and an authentication module. The input module receives an operator password input by a user. The password triggering module generates a trigger signal and then generates a prompt password according to the trigger signal. The operation module performs a mathematical operation on the prompt password according to the operator password, so as to generate the authentication password. The authentication module receives a login password and compares the login password with the authentication password, so as to determine whether to authorize a login request on the electronic device.04-01-2010
20090172811IMAGE PROCESSING APPARATUS, PROCESSING FLOW CONTROL METHOD, IMAGE FORMING SYSTEM, AND STORAGE MEDIUM - An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired processing flow. The image processing apparatus including an authentication unit adapted to execute user authentication, and an execution unit adapted to execute processing on image data with a plurality of processes as a sequential processing flow while cooperating a plurality of different functions with one another. Setting data personalized for a user authenticated by the authentication unit is obtained, and the plurality of processes is registered as a sequential processing flow. The processing flow is executed with a part of the processing flow replaced by processing personalized for the user set in the setting data, upon executing the registered processing flow.07-02-2009
20120291122Multi Dimensional CAPTCHA System and Method - A method of providing a Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA), the method comprising the steps of: forming a stereoscopic image including a first and second series of intermingled similar objects, with the first series of objects having a readily distinguishable stereoscopic depth from the second series of objects.11-15-2012
20120291121Unlocking Method, Computer Readable Storage Medium for Storing Thereof and Handheld Electrical Device Applying Thereof - An unlocking method for a handheld electrical device with a normal mode and a limited mode is disclosed. The handheld electrical device in the normal mode is able to display all contents of an application installed on the handheld electrical device. The handheld electrical device in the limited mode is able to display only part of the contents of the application. The unlocking method includes the following steps: at least one unlocking input without a user account is obtained from an input unit of the handheld electrical device when the handheld electrical device is under a locked status. The unlocking input is compared with first preset data and second preset data to generate a comparison result. The locked status of the handheld electrical device is released according to the comparison result.11-15-2012
20090260077SECURITY-ENHANCED LOG IN - A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device.10-15-2009
20120233690User-Defined Enablement Protocol - A user interface method is disclosed. For a particular interface, such as a touch input device, the method involves defining an enablement protocol for a function and recording and retaining the enablement protocol of said function, such that a user enables the function by substantially reproducing the enablement protocol in the absence of spatial or temporal indication of at least a portion of the enablement protocol.09-13-2012
20090276849INTELLECTUAL PROPERTY MANAGING SYSTEM, INTELLECTUAL PROPERTY MANAGING METHOD, AND PROGRAM FOR THE SAME - It is made possible to share information on intellectual properties between enterprises and between an enterprise and an office, and system development efficiency and maintenance efficiency are improved. An intellectual property managing system includes: a database 11-05-2009
20080209546EVENT DISPLAY METHOD AND APPARATUS FOR MOBILE TERMINAL - Disclosed is an event display method and apparatus for a mobile terminal, which displays events occurring in a mobile terminal on a multi time graphic (divided into a plurality of time graphics), thereby enabling easy checking and management of various types of events. For this, the event display method includes detecting at least one or more events in a mobile terminal, displaying a multi time graphic divided into a plurality of time graphics on a display screen, and locating the detected events on the multi time graphic.08-28-2008
20080209545Authentication System, Information Processing Apparatus and Method, Program, and Recording Medium - An authentication system includes a mobile device carried by a user and a sensor sensing the user's biometric information. The mobile device includes a template storage unit storing the user's biometric information as a template, a first mutual authentication unit performing mutual authentication with the sensor via the user's body, and a template transmitter transmitting the stored template to the sensor via the user's body when the sensor is verified as valid. The sensor includes a second mutual authentication unit performing mutual authentication with the mobile device via the user's body, a sensing unit sensing the user's biometric information, a degree-of-match determining unit determining whether the biometric information matches the template, and a control-signal output unit outputting a preset control signal when the mobile device is verified as valid and when the biometric information and the template are determined to match each other.08-28-2008
20120144478IMAGE PROCESSING APPARATUS, PROCESSING FLOW CONTROL METHOD, IMAGE FORMING SYSTEM, AND STORAGE MEDIUM - An image processing apparatus capable of reducing the number of processing flows and also reduce time and effort required by a user in searching a desired processing flow. The image processing apparatus including an authentication unit adapted to execute user authentication, and an execution unit adapted to execute processing on image data with a plurality of processes as a sequential processing flow while cooperating a plurality of different functions with one another. Setting data personalized for a user authenticated by the authentication unit is obtained, and the plurality of processes is registered as a sequential processing flow. The processing flow is executed with a part of the processing flow replaced by processing personalized for the user set in the setting data, upon executing the registered processing flow.06-07-2012
20110173693Assessment and analysis of software security flaws - Security analysis and vulnerability testing results are “packaged” or “bound to” the actual software it describes. By linking the results to the software itself, downstream users of the software can access information about the software, make informed decisions about implementation of the software, and analyze the security risk across an entire system by accessing all (or most) of the reports associated with the executables running on the system and summarizing the risks identified in the reports.07-14-2011
20100138914SYSTEM AND METHOD OF PROVIDING BIOMETRIC QUICK LAUNCH - By providing a biometric candidate to a biometric input device, a user may cause a computing device to be unlocked and cause a specific application to be launched on the computing device. The biometric input device may be on the computing device or on a peripheral security device that is in communication with the computing device. Indeed, the specific application may be launched pre-loaded with certain data, selection of which data is controlled by the particular biometric provided to the biometric input device.06-03-2010
20080216171Wearable device, authentication method, and recording medium - A wearable device is provided that is used while being worn on a body of a user. The wearable device includes a biometric-information authentication portion that acquires biometric information from the user for biometric authentication. The wearable device acquires biometric information from a portion in contact with or in the vicinity of the user's body to perform the biometric authentication without requesting the user to operate for the biometric authentication.09-04-2008
20100275258METHOD AND APPARATUS FOR PROCESSING BIOMETRIC INFORMATION - A biometric-information processing apparatus and method including storing sample biometric information of a user each time biometric authentication processing for verifying sample biometric information of a user against enrolled biometric information registered in a first storage unit succeeds, where the user's sample biometric information is stored in a second storage unit, and selecting an update-candidate biometric information for updating the user's enrolled biometric information from the user's sample biometric information stored in the second storage unit, based on a result of verification of multiple pieces of the user's sample biometric information stored in the second storage unit against enrolled biometric information of other users.10-28-2010
20080244735Identification and Computer Login of an Operator of a Vehicle - A method for identifying and performing a vehicle operator computer login to a vehicle computer provided in a vehicle. A device is arranged to request and receive vehicle operator data stored on a data carrier provided for a tachograph comprising a reader for reading the data carrier. The device controls communication of vehicle operator related data to the vehicle computer, wherein the device is arranged to initiate a vehicle operator login procedure of the vehicle computer, in dependence on the data carrier inserted in the tachograph. The invention is also related to a vehicle arrangement, a computer program and a computer program product. The invention solves the problem of providing identification and login of an operator of a vehicle to the vehicle computer in a simplified and secure way. The invention also enables shortened start up/stop times of a vehicle by reducing systems login/logoff time for an operator.10-02-2008
20080289034METHOD AND APPARATUS FOR PROVIDING PROCESS-BASED ACCESS CONTROLS ON COMPUTER RESOURCES - A method, apparatus, and computer instructions for process-based access controls on computer resources to processes. An access mechanism is provided in which a specific invoker obtains an object access identity (ACI). Another mechanism is provided in which a specific object, such as a file system resource, requires a specific object access identity to obtain one of the forms of access denoted by an access control list. A process may “grant” an identifier that is later “required” for a system resource access. Objects may specify their own access requirements and permitted access modes. The granted identifier, ACI, is stored in the process's credentials once these credentials match a specific “grant” entry in the access control list. This identifier has no meaning outside of being used to make an access decision for a specific resource. When a process tries to access the object, the object's access control list is scanned for “required” entries. If a match occurs between the “required” entry's identifier and the ACI stored, access to the object is granted with access rights specified in the “require” entries.11-20-2008
20080289032Computer Control Method and Computer Control System Using an Externally Connected Device - A computer system and appertaining control method allow, when an operation of a computer is controlled in accordance with an authentication result due to biological information using an externally connected device, setting up an authentication authority regarding a plurality of users, and setting up an authority per application and operation. The authentication condition on a biological authentication needed per application or operation is stored in the externally connected device along with the biological information of a plurality of users for whom biological authentication is needed. When using an external computer, it is connected to the externally connected device which performs biological authentication. When a predetermined operation requesting the biological authentication is performed in this computer, a presence of the biometrics is verified according to the authentication condition set to this operation stored in the external device, if the authentication condition is satisfied, the execution of this normal operation is permitted.11-20-2008
20080250494Image processing apparatus - An image processing apparatus is provided that is capable of displaying a customize screen without input operation to the own machine. An image processing apparatus (MFP) is communicatably connected to an information processing apparatus (PC) and includes a displaying portion. The MFP acquires user information related to a login user logging in to the PC, authenticates based on the acquired user information whether the login user is a usage permitted user permitted to use the MFP, and displays a customized screen corresponding to the login user on the displaying portion of the MFP when it is authenticated that the login user is the usage permitted user.10-09-2008
20100275257ELECTRONIC DEVICE - According to one embodiment, an electronic device includes a receiver, a selector, a converter, and an authentication module. The receiver receives data on a password input through a keyboard. The selector selects one of key layouts of different keyboards. The converter converts the data on the password received through the keyboard to a password character string according to the one of the key layouts. The authentication module determines that the password is authenticated when information based on the password character string obtained by the converter for the one of the key layouts matches information based on a registered password character string.10-28-2010
20100005523COMPUTING DEVICE WITH ENVIRONMENT AWARE FEATURES - A method and mobile electronic device are provided which automatically adjust settings based on the environment of the mobile electronic device. The settings of the mobile electronic device which are adjusted may be security settings, filter settings, or status for instant messaging in dependence on the determined location of the mobile electronic device.01-07-2010
20100138915Password Protected Built-In Test Mode For Memories - In accordance with some embodiments, a semiconductor memory may be provided with a built-in test mode that is accessible through a password protection scheme. This enables access to a built-in test mode after manufacturing, if desired. At the same time, the password protection prevents use of the built-in test mode to bypass security features of the memory.06-03-2010
20090126008ADAPTIVE CAPACITY POWER SUPPLY - Methods and systems are disclosed for automatically tracking and controlling the capacity ratings of UPS units. The methods and systems provide a central server or repository for storing the capacity ratings, grant kVA and grant code authorized for each UPS unit along with a unique security key for each unit. When a customer purchases a capacity upgrade, the server updates the capacity rating for the customer's unit and issues an upgrade grant that includes the new rating and the grant code. The upgrade grant may thereafter be downloaded by a service technician and used to upgrade the unit. Alternatively, the upgrade grant may be downloaded directly to the UPS unit, and the unit's software and/or firmware may perform the upgrade automatically. In either case, the upgrade may be performed through a software modification, thus eliminating the need for the technician to physically swap out hardware. Such an arrangement helps ensure that only authorized capacity upgrades are performed.05-14-2009
20090126009PORTABLE COMPUTING SYSTEM, APPARATUS AND METHOD - A computing system comprising a pocket personal computer and a reader are disclosed. The pocket PC is credit card-sized and comprises flash memory, and optionally a processor and a GPS chip. In some embodiments, the pocket PC also includes an operating system. The reader includes a monitor, a keyboard with docking port and an optional processor and at least one input/output USB connector. A user cannot interact with the pocket PC without the reader. The reader is a non-functioning “shell” without the pocket PC, however, when they are connected the system becomes a fully functional personal computer. To log on, a user provides security information, for example, a password or biometrics, such as fingerprints. The credit card size and capabilities of the pocket PC allows a user to easily carry virtually their entire computer in a pocket for use anywhere there is a reader. In addition, the pocket PC provides security against unauthorized use, even if lost or stolen, since a password or fingerprints are required to access to the device.05-14-2009
20090165123SECURITY SYSTEM AND METHOD FOR CONTROLLING ACCESS TO COMPUTING RESOURCES - A security system comprises a personal digital key (PDK), a reader and a computing device. The PDK is a portable, personal transceiver that includes a controller and one or more passwords or codes. The computing device includes a detection engine, vault storage and a set up module. The detection engine detect events relating to the access of any files and third-party systems by the computing device and receives information from the reader as to whether the PDK is present/linked. The detection engine controls whether a user is able to access any of the functionality provided by the computing device based upon whether the PDK is in communication with the reader or not. The present invention also includes a number of methods such as a method for initializing the security system, a method for setting up a computing device, and a method for controlling access to computing resources.06-25-2009
20090178136METHOD AND DEVICE FOR ENTERING A COMPUTER DATABASE PASSWORD - The invention relates to computers, more particularly to a method and apparatus for entering a password to gain access to computer databases. The object of the invention is to provide efficient protection of the user's password from reproduction by an unauthorized person, to substantially increase the number of possible combinations and to create passwords that are maximum easy for the users to memorize. An embodiment of the invention comprises entering parameters of a password entry dynamic image to a computer; displaying to the user the dynamic image with the selected parameters; pointing at least one predetermined object of the dynamic image that has taken a user-predetermined position in space and/or state in time. Another embodiment comprises setting a predetermined access code in the form of a rhythmic pattern; preliminary entering said rhythmic pattern via a user's entry device to a computer to store and use the rhythmic pattern in subsequent password entries; when entering the password, entering said rhythmic pattern via a set of contact means of the user's entry device.07-09-2009
20090007256Using a trusted entity to drive security decisions - An arrangement is provided for programmatically responding to a privilege request on behalf of a user by pre-configuring a trusted entity with a list of processes requiring elevated user credentials and a set of user's credentials having such privilege. The trusted entity determines if a requested process is included in the list of processes, and responds to the privilege requests generated by the kernel of the operating system for such processes, eliminating the need for the user to manually authenticate using some type of input mechanism.01-01-2009
20090038003SYSTEM AND PROCESS FOR SECURITY CONTROL OF A PROJECTOR - An exemplary projector crypto system includes a key storage unit, a password inputting unit, a comparing unit, and a switch module. The key unit is configured for determining and storing a secret picture for operating the projector. The password inputting unit is configured for reading a picture input by a user. The comparing unit is configured for determining whether the input picture is identical to the secret picture. The switch module activates the projector only if the input picture is identical to the secret picture.02-05-2009
20090013403AUTHENTICATION APPARATUS, AUTHENTICATION METHOD, AND COMPUTER-READABLE RECORDING MEDIUM STORING AUTHENTICATION PROGRAM - An authentication apparatus includes: a database section that stores a password; an entry section through which a password is entered; a storage section that stores an entered password which is entered through the entry section; an authentication section that authenticates whether the password and the entered password match with each other; and a determining section that determines whether or not a re-entered password is to be subjected to an authentication processing performed by the authentication section when the re-entered password is entered through the entry section after the authentication section determines that the password and the entered password do not match with each other.01-08-2009
20090210941IMAGE PROCESSING APPARATUS, IMAGE PROCESSING METHOD, AND IMAGE FORMING APPARATUS - Provided is an image forming apparatus that improves operability while securing security of image data stored in an apparatus. In the image forming apparatus having a filing function, when image data is stored with the filing function, a password of a user authenticated by an authenticating portion is set as a password for storing the image data, and at the time of reading image data with the filing function, when the password of the user authenticated by the authenticating portion is set to the image data, the password of the image data is released.08-20-2009
20090205042EXTERNAL USER INTERFACE BASED MEASUREMENT ASSOCIATION - A health management system (08-13-2009
20090049544Habit-Based Authentication - A method for authentication is disclosed. During use, the observed usage of the device is compared to an expected pattern of usage of the device. Deviation between the observed and expected usage indicates that the user might not be authorized to use the device. If the deviation exceeds a threshold, a credential is required from the user to authenticate itself as the authorized user.02-19-2009
20090064320Image processing apparatus and image processing system - An image processing apparatus and an image processing system, in which burdensome operation for user authentication is unnecessary, are provided.03-05-2009
20090064319ELECTRONIC TRIP UNITS WITH LIMITED READ/WRITE ACCESS - A method of limiting read/write access of information stored on an electronic trip unit is disclosed. The method includes requesting a valid password on one of a communication port of the electronic trip unit and a display device of the electronic trip unit, receiving a password at a processor of the electronic trip unit in response to the request, determining if the received password is valid based on password information stored on a memory of the electronic trip unit, and limiting read/write access of information stored on the electronic trip unit based on the determination.03-05-2009
20120198548BLANK SMART CARD DEVICE ISSUANCE SYSTEM - A smart card issuance system and method are disclosed. In a first aspect a method and system for issuing a smart card device (SC) is disclosed. The method and system comprise providing an initialization phase of the SC by a manufacturer and providing an authentication phase of the SC by the manufacturer. The method and system also include deploying the SC, providing a first time authentication phase for a specific customer by the issuer (IS) after the SC is deployed and starting a first phase of the registration process of the SC for the specific customer by the issuer. The method and system further include providing another authentication phase of the SC by IS after the first time authentication; and providing of an authentication of the IS by the SC. When both the SC and IS are mutually authenticated, the IS and the specific customer are allowed to complete the registration process. In a second aspect, a data transmission process and system for a smart card device (SC) of an issuer (IS) is disclosed. The process and system comprises performing a login of the SC by a user and performing a mutual authentication of the SC and the IS. The process and system further includes establishing a session key after mutual authentication is established. The session key is used to encrypt and decrypt data for transmission between the IS and the SC.08-02-2012
20090100516Secure Bait and Switch Resume - Procedures for resumption from a low activity condition are discussed. In implementations, a persistent state file, or a portion thereof, is secured via an encryption algorithm, with the decryption key secured via the operating system (OS) login user credentials. Once a user is authenticated via the OS login, the persistent state file may be decrypted and inserted in the OS boot path with resumption occurring through the persistent state file.04-16-2009
20090210939SKETCH-BASED PASSWORD AUTHENTICATION - A graphical password authentication method is based on sketches drawn by user. The method extracts a template edge orientation pattern from an initial sketch of the user and an input edge orientation pattern from an input sketch of the user, compares the similarity between the two edge orientation patterns, and makes an authentication decision based on the similarity. The edge orientations are quantized, and each edge orientation pattern includes a set of quantized orientation patterns each corresponding to one of the quantized edge orientations. The number of quantized edge orientations, as well as other parameters such as the dimension of the final orientation patterns and acceptance threshold, can be optimized either globally or user-specifically.08-20-2009
20110145914MOTHERBOARD AND METHOD FOR MANAGING USE OF COMPUTER - A system and method for managing use of a computer determines if a first system time of the computer is in one of the preset available time segments when the computer is powered on, and logs into the operating system of the computer if the first system time is in one of the available time segments. The system and method further determines if a second system time is in one of preset unavailable time segments if a time interval elapses after logging into the operating system, and shuts down the power of the computer if the second system time is in one of the unavailable time segments.06-16-2011
20110145916METHODS AND SYSTEMS FOR PREVENTING ACCESS TO DISPLAY GRAPHICS GENERATED BY A TRUSTED VIRTUAL MACHINE - The methods and systems described herein provide for preventing a non-trusted virtual machine from reading the graphical output of a trusted virtual machine. A graphics manager receives a request from a trusted virtual machine to render graphical data using a graphics processing unit. The graphics manager assigns, to the trusted virtual machine, a secure section of a memory of the graphics processing unit. The graphics manager renders graphics from the trusted virtual machine graphical data to the secure section of the graphics processing unit memory. The graphics manager receives a request from a non-trusted virtual machine to read graphics rendered from the trusted virtual machine graphical data and stored in the secure section of the graphics processing unit memory, and prevents the non-trusted virtual machine from reading the trusted virtual machine rendered graphics stored in the secure section of the graphics processing unit memory.06-16-2011
20110145915METHOD FOR MANAGING AUTHENTICATION PROCEDURES FOR A USER - A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager different applications to which a user shall be given an authentication access by defining at the authentication manager a specific address identification allowing addressing the application specific authentication rules, logging the user to the authentication manager, the user requesting access to an application accessible by the authentication manager, and using the application specific address identification stored at the authentication manager to retrieve the application specific authentication rules for authenticating the user to the requested application.06-16-2011
20110145913Project Management - Methods, systems, and computer program products for project management. A method embodiment for project management includes accepting a designation of disparate enterprise data from disparate sources in an enterprise system as plan data for a project. The disparate enterprise data is governed by business rules in the enterprise system. The method also includes dynamically aggregating the plan data from the disparate data sources; presenting the aggregated plan data in a project management interface; accepting a manipulation of a portion of the aggregated plan data; enforcing business rules on the aggregated plan data in the project management interface; and committing the manipulated aggregated plan data back to the datasources.06-16-2011
20090249478User Authentication System and Method - A user authentication system and method are disclosed. The user authentication system includes an authentication device which can be donned and doffed by the user, a sensor to determine whether the authentication device is donned or doffed by the user, and an authentication server to receive information from the sensor and to authenticate the user based on whether the authentication device is donned by the user.10-01-2009
20100162387Mobile device with separate access to private and public information stored in the device - An exemplary method is implemented by a wireless mobile device that transmits and receives text-based messages. Public records are stored in a public contact database in the mobile device, the public records containing public contact information for persons. Public contact information contained in a public record corresponding to a person selected by a public user is displayed upon the request of any public user of the device. Private records are stored in a private contact database in the mobile device, the private records containing private contact information for persons. Upon a valid password being received by the device from a private user, access to the private contact information is provided to the private user. In response to the receipt of a request from the private user, private contact information for a selected person from a corresponding private record is displayed on the screen of the mobile device.06-24-2010
20100154053STORAGE SECURITY USING CRYPTOGRAPHIC SPLITTING - Methods and systems for presenting a virtual disk to a client device are disclosed. One method includes receiving client credentials from a client device, the client credentials including a client identifier. The method also includes authenticating the client device at a secure storage device. The method further includes determining a volume is associated with the client device based upon the client identifier, the volume associated with a plurality of shares stored on a corresponding plurality of physical storage devices. The method also includes, upon determining the volume is associated with the client device, presenting the volume to the client device.06-17-2010
20080229409CONTROL OF EQUIPMENT USING REMOTE DISPLAY - An example display unit for facilitating operation of equipment includes a housing, an electronic display supported by the housing, and an electronic circuit located within the housing. The display unit may include one or more data receivers, such as a wireless receiver and/or an electrical interface. A biometric scanner, including a biometric sensor and proving an authorization signal when an authorized biometric input is detected by the biometric sensor, may be configured to electrically (and optionally mechanically) interconnect to the display unit. The example display unit receives an authorization status for operation of the equipment from the biometric scanner, and displays the authorization status and operational parameters relating to equipment use on the electronic display.09-18-2008
20100192220APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA - The APPARATUSES, METHODS AND SYSTEMS FOR PROVIDING A VIRTUAL DEVELOPMENT AND DEPLOYMENT ENVIRONMENT INCLUDING REAL AND SYNTHETIC DATA (“SYNONYM”) provides a development and test environment with reduced database storage requirements that uses synthetic data based on anonymized real data. SYNONYM allows the use of sensitive data for testing while protecting such data as required by privacy laws, secrecy laws and company policies.07-29-2010
20100186084REMOVABLE MEMORY STORAGE DEVICE WITH MULTIPLE AUTHENTICATION PROCESSES - A method comprises providing first user authentication data of a user and comparing the first user authentication data to first stored template data. When the comparison is indicative of a match, a first session is provided, which supports one of user access for retrieving first data that are stored within a peripheral memory storage device and user access for modifying a data content of the peripheral memory storage device. The first session does not support the other one of user access for retrieving first data that are stored within the peripheral memory storage device and user access for modifying a data content of the peripheral memory storage device. During the first session, second user authentication data of the same user is provided and compared to second stored template data. When the comparison is indicative of a match, a second session is provided, which does support the other one of user access for retrieving first data that are stored within the peripheral memory storage device and user access for modifying the data content of the peripheral memory storage device.07-22-2010
20100186082Web Management Authorization and Delegation Framework - Described is a technology in which a non-administrator computer/web user is allowed to perform an administrative-level task within a certain context and/or scope. An authorization store is queried based on information (e.g., a provider, a username, and a path) provided with an authorization request, e.g., from an application via an API. The information in the authorization store, set up by an administrator, determines the administrative action is allowed. If so, a credential store provides credentials that allow the action to be runs before reverting the user to the prior set of credentials. Also described is a pluggable provider model through which the authorization store and/or delegation store are accessed, whereby the data maintained therein can be any format and/or at any location known to the associated provider.07-22-2010
20120198547ENHANCED ORGANIZATION AND AUTOMATIC NAVIGATION OF DISPLAY SCREENS FACILITATING AUTOMATION CONTROL - The disclosed subject matter comprises an enhanced screen organizer component (ESOC) that can efficiently control organization and presentation of desired screens, which relate to an industrial control system, to a user. At design time, a designer employs the ESOC to select and organize one or more screens for a project relating to a control system, create and organize screen folders that can contain desired folders or screens in a hierarchical fashion, select a home screen or favorite screens, respectively, for the operator, role or group, wherein a home screen can be a screen a user views when authenticated into a terminal or the screen the user can be returned to in response to selection of a home control. During run time, the user can access desired screens, and use context menus to select a home screen, favorite screens, or other screens, in accordance with user access rights.08-02-2012
20100162388Wireless mobile device with automatic segregation of received messages for private and public access - An exemplary method is implemented by a wireless mobile device that transmits and receives text-based messages. Received messages are stored in memory of the wireless mobile device. Based on a privacy criteria stored in the memory, some of the received messages are automatically identified as public and others of the received messages are automatically identified as private. Access is provided to stored received messages that are designated as public to any user of the mobile device. Access is provided to stored received messages that are designated as private only after receipt of a password entered by a user of the wireless mobile device that permits access to the privately identified messages.06-24-2010
20100186083APPARATUS AND METHOD FOR AUTHENTICATING USER - A user authenticating apparatus stores user information where identification information to identify each of a plurality of users and biological information of each user are associated with each other, acquires identification information of the user, when the user starts to use a predetermined target, authenticates each user using the acquired identification information and the stored user information, as first authentication, stores the identification information of the user whose first authentication is succeeded as success information, acquires the biological information of the user, and authenticates each user using the acquired biological information and the biological information corresponding to the identification information of the users stored as the success information among the stored biological information, as second authentication.07-22-2010
20100235905REALIZATION OF ACCESS CONTROL CONDITIONS AS BOOLEAN EXPRESSIONS IN CREDENTIAL AUTHENTICATIONS - A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may contain a Boolean expression including one or more Boolean conditions. If an appropriate group of credentials are presented to a reader such that the Boolean expression is satisfied, then the group of credentials and the holders thereof are allowed access to a protected asset.09-16-2010
20100218249AUTHENTICATION VIA A DEVICE - The claimed subject matter provides a system and/or a method that facilitates authentication of a user in a surface computing environment. A device or authentication object can be carried by a user and employed to retain authentication information. An authentication component can obtain the authentication information from the device and analyze the information to verify an identity of the user. A touch input component can ascertain if a touch input is authentication by associating touch input with the user. In addition, authentication information can be employed to establish a secure communications channel for transfer of user data.08-26-2010
20100251361SYSTEM AND METHOD OF MANAGING SECURITY BETWEEN A PORTABLE COMPUTING DEVICE AND A PORTABLE COMPUTING DEVICE DOCKING STATION - A method of managing portable communication device (PCD) and PCD docking station security is disclosed and may include determining whether a PCD is mated with a PCD docking station when the PCD is docked with the PCD docking station, initiating a back-end security call when the PCD is not mated with the PCD docking station, querying a user for a primary access code, and determining whether the primary access code is correct. The method may also include terminating the back-end security call when the access code is correct and providing limiting access to PCD content items and applications via the PCD docking station.09-30-2010
20100212009Multi-Method Emergency Access - A method or system for providing multiple fallback authentication options via self-service, also known as emergency access, for users to access PC or network systems when their primary authentication method has been lost, blocked or otherwise unavailable.08-19-2010
20100212008Identification Security Elevation - Security elevation techniques are described. In an implementation, a request is received for additional security access beyond that which is currently specified for a program. An identity that describes the program is checked with a plurality of conditions. The security level is automatically elevated to grant the additional security access when the identity corresponds to one of the conditions that indicates that the security level is to be automatically elevated.08-19-2010
20100251359USER-DEFINED MULTIPLE INPUT MODE AUTHENTICATION - A user can define two or more input modes with respective input values to establish an authentication protocol to unlock a computer or govern other computer behavior. As an example, the user may first establish a particular voice recognition pattern followed by a particular image recognition and subsequent logons can be accomplished only by speaking the voice recognition pattern into the device and then by presenting the commanded image, such as an image of the use's face, to the device.09-30-2010
20100251360ACCESSING A PROCESSING DEVICE - The invention relates to a method of controlling access to a processing device using an access token with a machine readable identity. The method comprises reading the identity of the access token at the location of the processing device and querying a database comprising valid identities of access tokens, wherein each identity is associated with an access permission level. If the identity is a valid identity, the method further comprises determining the associated level of access and allowing a level of access to the processing device according to the associated access permission level. In some embodiments, the processing device is an Automated Teller Machine (ATM).09-30-2010
20110113484UNIFIED SYSTEM INTERFACE FOR AUTHENTICATION AND AUTHORIZATION - A request is received at an authorization framework via an authorization application programming interface (API) from a trusted application for authorizing a client application, where the client application requests a service provided by the trusted application. In response to the request, the client application is authorized in view of one or more authorization policies associated with the client application to determine whether the client application is authorized to access the requested service. A user associated with the client application is authenticated to determine whether the user is allowed to access the requested service. Thereafter, a value is returned from the authorization framework via the authorization API to the trusted application indicating whether the client application can access the requested service provided by the trusted application, based on results of the authorization and authentication.05-12-2011
20100162386CONTEXT AWARE BIOMETRIC AUTHENTICATION - A biometric sample of the user is received at a biometric interface of a device as part of a biometric authentication request by the user, with the biometric sample characterized by a match score when the biometric sample matches at least one stored template that uniquely identifies the user. The presence of a context usage override condition of the biometric authentication request causes a context usage factor to be updated based upon the context usage override condition. A biometric recognition threshold required for the user to access the application and indicative of a threshold security level required for biometric authentication is calculated based on the context usage factor. The user is permitted to access the application when the match score of the biometric sample is at least equal to the biometric recognition threshold.06-24-2010
20100125908STORAGE DEVICE, INFORMATION PROCESSOR, AND INFORMATION PROCESSING SYSTEM - According to one embodiment, a storage device includes a storing module, a determining module, and a releasing module. The storing module stores generated authentication information generated by a host connected to the storage device and set as authentication information for releasing access restriction to a storage module in the storage module. The determining module determines, when the storage device is turned on upon the host resuming from suspend mode and receives generated authentication information from the host in a state where access to the storage module is restricted, whether the generated authentication information matches the generated authentication information stored by the storing module in the storage module. The releasing module releases, when the determining module determines that the generated authentication information received from the host matches the generated authentication information stored by the storing module in the storage module, the access restriction to the storage module.05-20-2010
20100100956METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.04-22-2010
20090328202MOBILE TERMINAL DEVICE, METHOD OF ACTIVATING TERMINAL APPARATUS FUNCTION AND COMPUTER READABLE MEDIUM - A method and apparatus for activation of a terminal apparatus function is disclosed. User identification information is received, and a characteristic of the user identification information is determined. The characteristic is compared to a required characteristic corresponding to the terminal apparatus function. A first activation process is selected if the characteristic matches the required characteristic; otherwise access to the terminal apparatus function is restricted.12-31-2009
20100031347REPRODUCING APPARATUS, SYSTEM LSI, AND INITIALIZATION METHOD - Hardware of a playback apparatus 02-04-2010
20110113487ICON CARD VERIFICATION SYSTEM - An identity verification system uses a master key formed of first and second sets of symbols arranged in a one to one relationship. A distinct public key is assigned to each user of a plurality of users. A unique private key is established for each user and formed of at least some of the first symbols in the first set. The symbols of the private key for a user are placed in an arrangement where each first symbol is distinctly identifiable by a location. The first symbols in the arrangement are translated to a visual corresponding second symbol from the master key. Upon receiving the public key of one user, an identity validation challenge formed of at least two locations of the second symbols in the arrangement is presented to the user. The identity of the user is validated upon receiving the correct second symbols corresponding to the challenge locations.05-12-2011
20080320589SECURING SYSTEM AND METHOD USING A SECURITY DEVICE12-25-2008
20090222910MEMORY DEVICE AND CHIP SET PROCESSOR PAIRING - Systems, devices and/or methods that facilitate mutual authentication for processor and memory pairing are presented. A processor and a suitably equipped memory can be provided with a shared secret to facilitate mutual authentication. In addition, the memory can be configured to verify that the system operating instructions have not been subjected to unauthorized alterations. System integrity can be ensured according to the disclosed subject matter by mutual authentication of the processor and memory and verification of the authenticity of system operating instructions at or near each system power up. As a result, the disclosed subject matter can facilitate relatively low complexity assurance of system integrity as a replacement or supplement to conventional techniques.09-03-2009
20090241186Method for removable element authentication in an embedded system - The present invention proposes a method for protecting and monitoring removable entities in an embedded system. In accordance with the present invention, prior to insertion of a removable entity in the embedded system, a user registers details of the removable entity in the device host. The details may be entered after entering a password or a PIN. A registration identification is calculated based on an algorithm in the device host and is then stored in the host. After the removable entity is inserted, it is registered in an unalterable area (e.g. flash memory) of the device host. Information such as the category of the removable entity, a device number, etc. may be exchanged between the device host and the removable entity. The device host then computes a registration identification based on a Removable Entity Registration Algorithm. The identifications are then compared, and the device host displays the details of the removable entity to the user.09-24-2009
20100223667APPARATUS, SYSTEM, AND METHOD FOR START-UP AUTHENTICATION - An apparatus, system, and method are disclosed for start-up authentication. A prompt module prompts for a hardware password and authentication data on a single display screen. The authentication data comprises a user password. The user password is distinct from the hardware password. A store module stores the authentication data in a target storage space. In addition, the store module stores a pointer to the target storage space in a system register. A retrieve module retrieves the authentication data from the target storage space using the pointer. An authentication module automatically authenticates a user with the authentication data.09-02-2010
20100287610METHOD FOR PROTECTING THE ACCESS TO AN ELECTRONIC OBJECT CONNECTED TO A COMPUTER - An electronic object carries out at least one operation on one element of an application installed in a computer. The method includes transmitting a random value of the electronic object to the computer, when such operation is completed, while maintaining in the electronic object the right of access to the electronic object by the user; storing the random value in the computer; giving access to the electronic object by the application and, in the case of a new access to the electronic object by the application; transmitting the random values stored in the computer to the electronic object; comparing, in the electronic object, the random value received from the computer with the random value previously transmitted to the computer; and, in case the random values are matching, re-establishing the previously acquired rights in the electronic object and thereby giving the application the access to the electronic object.11-11-2010
20120144477PROCESSOR AND SEMICONDUCTOR DEVICE - According to embodiments, a CPU includes an address decoder configured to control input of data from a JTAG I/F and output of data to the JTAG I/F, an authentication unit configured to perform predetermined authentication processing using an entered password and a predetermined key and, if the authentication is successful, output a predetermined authentication signal, and a selector configured to control output of data to be outputted to JTAG I/F according to presence or absence of the predetermined authentication signal.06-07-2012
20110113486Credentialing User Interface for Gadget Application Access - An approach is provided to receive a selection of a displayed window from a group of displayed windows that are visible on a display. The displayed window corresponds to a software application and the displayed window is displayed at a location on the display. Another displayed window is shown visually animating and forming from the first displayed window. An authentication input dialog is displayed on the second displayed window, with the displayed authentication input dialog corresponding to the software application. Authentication data is received at the authentication input dialog and is authenticated.05-12-2011
20100306841SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state is provided. The method includes: displaying a security access interface on a display unit, wherein the security access interface comprises a first image input field and a second image input field; selecting one first image and at least one second image; moving the at least one selected second image to the selected first image; recording at least one property in relation to the selected first image and the at least one selected second image; generating an input password according to at least one of the at least one recorded property; determining whether the input password matches a predetermined password; and granting access if the input password matches the predetermined password. A related security system is also provided.12-02-2010
20100325722INFORMATION PROCESSING APPARATUS INCLUDING LOCKING FUNCTION, LOCKING (UNLOCKING) METHOD FOR INFORMATION PROCESSING APPARATUS AND PROGRAM THEREOF - The present invention provides an information processing apparatus capable of dynamically changing a security level according to significance of overall data saved in a terminal. A portable telephone terminal 100 includes a lock function to inhibit (allow) use of predetermined functions (part of or all of the functions) of the terminal when a lock-in condition (an unlock condition) is satisfied. The terminal 100 includes a secret level evaluating section 16 for calculating a secret level of the overall apparatus on the basis of scores set respectively to saved data items and a lock-in condition setting section 15 for making, in response to the secret level, the lock-in condition (unlock condition) more mitigated or more severe. Due to the configuration, for example, when significant data is received, the secret level of the overall terminal increases and the lock-in condition (unlock condition) is made more mitigated (more severe).12-23-2010
20100325721IMAGE-BASED UNLOCK FUNCTIONALITY ON A COMPUTING DEVICE - Utilizing an image on a computing device to serve as a template for locking/unlocking the computing device. The image includes a plurality of portions that are defined and thereafter identified and presented to a user via a touch screen. A user selects portions/zones that are defined within the image in a specified sequence and this sequence is stored as a lock/unlock code for unlocking the computing device. In an embodiment, in addition to the specified sequence of selections, a movement or sequence of movements may be also be stored as part of the lock/unlock code.12-23-2010
20100333196Systems for Controlling Access to Locked Content Contained in a Recording Medium - A communication apparatus located remotely from an individual entering into communication with said apparatus, comprises a module for: receiving a key signal uniquely representative of an individual at a remote communication apparatus; further receiving a signal representative of a specific recording medium; determining a signal representative of one or more personal identification characters based on said key signal and said recording medium signal; and transmitting said signal representative of said personal identification characters.12-30-2010
20100205667Video-Based Privacy Supporting System - Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction between a computer and a user of the computer based on the environment of the computer and the user. For example, the computer-controlled system provided by the invention comprises an input-output device including an image sensor configured to collect facial recognition data proximate to the computer. The system also includes a user security parameter database encoding security parameters associated with the user; the database is also configured to communicate with the security processor. The security processor is configured to receive the facial recognition data and the security parameters associated with the user, and is further configured to at least partially control the operation of the data input device and the data output device in response to the facial recognition data and the security parameters associated with the user.08-12-2010
20100333198AUTHENTICATION METHOD AND INPUT DEVICE - An authentication method and an input device are provided in which a password which a user has inputted in person can be easily reproduced, and it is unlikely for a password leak to occur even when peeped at. An authentication password includes position identification information disposed in an arbitrary position in an input section of an input device. Position identification information corresponding to a first indicated position of an input trajectory inputted from the input section is acquired. Based on the input trajectory, trajectory information representing repetitions of the trajectory from the first indicated position and movement information representing a movement direction with respect to the first indicated position are calculated. The acquired position identification information, and the calculated trajectory information and movement information are compared with preset setting information, and whether they correspond to the setting information is determined, thereby the authentication is carried out.12-30-2010
20100333197SECURITY SYSTEM AND METHOD FOR GRANTING ACCESS - A method for granting access to change a security system from a locked state to an unlocked state includes: displaying a security access interface, wherein the security access interface comprises a graphical region, the graphical region is filled with a plurality of colors; selecting at least one color in the graphical region; at least recording at least one color property according to the at least one selected color; generating an input password at least according to the at least one recorded color property; determining whether the input password matches a predetermined password; and granting access if the input password matches with the predetermined password. A related security system is also provided.12-30-2010
20110030052COMPUTER PROGRAM FOR SECURELY VIEWING A FILE - A method for distributing a password protected content file without revealing the password to a recipient. An unlocking program that has access to at least one password corresponding to the password protecting the password protected content file is distributed to the recipient's computer. The password protected content file is distributed to the recipient's computer wherein upon activation of the unlocking program, the unlocking program automatically supplies the at least one password upon loading of the password protected content file.02-03-2011
20100180337ENABLING ACCESS TO A SUBSET OF DATA - A method includes receiving, at a computing device, one or more replicated authorization databases. At least one of the one or more replicated authorization databases corresponds to a subscription to access selected data. The selected data is aggregated from a plurality of sources. The method also includes storing the one or more replicated authorization databases at the computing device. The method also includes determining, via the replicated authorization databases, user permission to access the selected data via the computing device. The method also includes enabling access to the selected data at the computing device after determining the user permission to access the selected data.07-15-2010
20110035798SYSTEM FOR IDENTIFYING AN INDIVIDUAL, A METHOD FOR IDENTIFYING AN INDIVIDUAL OR A BUSINESS METHOD - An individual may be identified by using a portable communication device. Biological information of the user is input into the communication device. The inputted biological information of the user is checked with reference biological information previously stored in the portable communication device. The portable communication device is connected to the Internet after the inputted biological information of the user and the reference biological information have matched. Then information that the inputted biological information of the user and the reference biological information have matched is transmitted to a server from the portable communication device.02-10-2011
20110113485CREDENTIAL DEVICE PAIRING - In one or more implementations, a computing device receives an indication that a device is attempting to pair with the computing device. If a user is not currently authenticated with respect to the computing device, inputs received by the device are restricted from being used by the computing device for uses other than authenticating the user.05-12-2011
20110247066SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR AUTHENTICATING AND AUTHORIZING AN EXTERNAL ENTITY - In accordance with embodiments, there are provided mechanisms and methods for authenticating and authorizing an external entity. These mechanisms and methods for authenticating and authorizing an external entity can enable improved data security, more efficient data transfer, improved data access channels, etc.10-06-2011
20110131649Method and apparatus of securing data in a portable flash memory - A method and apparatus of securing data stored in a memory of a portable memory storage device are disclosed. One example may include activating an authentication detection component of the portable memory storage device, and verifying an authentication key via the authentication detection component of the portable memory storage device. Once the authentication is complete, additional operations may include interfacing the portable memory storage device with a computing device and accessing data stored in the memory device. Upon ending the access operation, the discontinuing of the interfacing of the memory storage device with the computing device will automatically lock the memory storage device after a predetermined time has passed.06-02-2011
20090328201PASSWORD INPUT DEVICE, COMPUTER SECURITY SYSTEM USING THE SAME AND METHOD THEREOF - A password input device includes a detection module, a recognition module, and an output module. The detection module is configured for detecting angular velocities and accelerations of hand movement. The recognition module includes a conversion unit, a character database, and an indexing unit. The conversion unit is configured for converting the detected angular velocities and accelerations, in analog format, into usable data. The indexing unit is configured for seeking a character corresponding to user input in the character database according to the usable data, and outputting the corresponding character. The output module is configured for receiving the corresponding characters from the indexing unit and determining the password.12-31-2009
20100132035DATA PROCESSING APPARATUS, INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - In a case where a processing request corresponding to an instruction transmitted from a data processing apparatus is accepted from an external apparatus, an appropriate processing based on a processing request corresponding to an instruction made by a user who operates the data processing apparatus is performed.05-27-2010
20100132034REGISTRATION FOR INTERACTIVE WHITEBOARD - There is provided a method of controlling a computer system of an interactive display system, comprising: predetermining one or more positions on an interactive display of the interactive display system; displaying an image representing the predetermined one or more positions; receiving data identifying one or more detected positions selected on the interactive display; comparing the detected positions and the predetermined positions, wherein in dependence on a match the computer system registers the interactive display with the computer systems.05-27-2010
20090328199Apparatus for Detecting Password Attacks Using Modeling Techniques - Provided is an apparatus for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile. then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes arc from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.12-31-2009
20120036574REMOTE ACCESS ARCHITECTURE ENABLING A CLIENT TO PERFORM AN OPERATION - Enabling a client computer to perform an operation is disclosed. Login information is received from a client computer. The login information is confirmed by querying a trusted agent on the client computer.02-09-2012
20100192221System and Method for Automated Data Retrieval Based on Data Placed in Clipboard Memory - A data retrieval system and method of the invention provide automatic retrieval of information based on data placed into, for example, a Windows™ clipboard. A user highlights and cuts (or pastes) data into the clipboard during execution of an application program. A data retriever program periodically reads the clipboard to determine whether new data has been placed therein. Upon finding new data in the clipboard, the data retriever program determines whether the data or a variation thereof satisfies a predetermined criterion. If the criterion is satisfied, the data retriever program initiates a data-retrieval operation, such as a Web-based search, based on the data. If the criterion is not satisfied, the data retriever program does not perform any data-retrieval action. The data retrieval program does not interfere with the clipboard; any application program sharing the clipboard can use data placed therein, e.g., by a paste operation.07-29-2010
20100192219TEMPORALLY SYNCHRONIZED VIDEO DISPLAY UNIT SCREENSAVER OR WALLPAPER BASED ON USER PREFERENCES - A method of generating an audiovisual object such as a wallpaper or screensaver keyed to a user's preferences, local time, and location, comprising: collecting a set of user preferences for a user; providing a metadata stream associated with an audiovisual input; comparing elements within the metadata stream with the set of user preferences to form a comparison; and outputting an audiovisual object to the user's video display unit if the comparison indicates that the metadata stream matches one or more elements of the set of user preferences. User preferences may be collected from user habits based on metadata streams associated with the audiovisual input, or may be directly input by the user. The methods above may also be stored on a computer readable medium.07-29-2010
20100037313Identification and Authentication using Public Templates and Private Patterns - A system and method for providing access by a user to a secured area is provided. Access is provided after a user performs predetermined actions on a pre-selected template. The templates, in an embodiment, may include graphical, audio, and other elements and the actions may include the performance of one or more acts, such as clicking, double-clicking, or tracing a feature, on the graphical images or interacting other ways. The sequence of template elements may be dependent upon the actions taken on one or more preceding template elements. If the path and actions taken by the user match a predetermined set of paths and actions, then the user is allowed access to the secured area.02-11-2010
20100064363IMAGE PROCESSING APPARATUS, SCREEN SELECTION METHOD, AND SCREEN SELECTION PROGRAM EMBODIED ON COMPUTER READABLE MEDIUM - In order to improve operability by decreasing the number of times of switching between screens, an MFP includes an authentication portion which authenticates a user using authentication information input into one of first to third user I/Fs, a process executing portion which executes processes according to settings input, a first association data storing portion which stores first association data associating input data with the authenticated user, a second association data storing portion which stores second association data associating processes executed for the input data with the respective user I/Fs, and a determining portion which determines, in response to authentication by the authentication portion, a screen for the process associated by the second association data with one of the first to third user I/Fs that accepted the authentication information used for the authentication, if data associated with the authenticated user by the first association data is stored.03-11-2010
20090217375Mobile Data Handling Device - A mobile data handling device comprising a memory comprising software; a communications module for communication via a data network. The device further comprises a control means for connecting to a data processor (08-27-2009
20090217374License Scheme for Enabling Advanced Features for Information Handling Systems - A method for BIOS to pass license key information to a device via CLP interface during a power on self-test (POST). The license key may be stored in different locations within the information handling system. For example, the license key may be stored within a secure location on a BIOS flash chip, in which case the license key is maintained across BIOS updates. Alternately, the license key may be stored within motherboard persistent storage (such as an internal universal serial bus (USB) key that is provided on certain servers. Alternately, the license key may be stored on a central location on a network to which the information handling system is coupled.08-27-2009
20100071059Information processing system, input apparatus, and information processing method - An information processing system uses an input apparatus to input user information. After authentication of the user information, the input apparatus-transmits control information to an information processing apparatus, indicating which functions of the information processing apparatus the user may use. The control information is independent of the particular method by which authentication is performed. Use of the information processing apparatus can accordingly be controlled by a variety of methods without requiring any user authentication capability to be provided in the information processing apparatus itself, and new authentication methods can be implemented without modification or replacement of existing information processing apparatus.03-18-2010
20110154481SECURE AUTHENTICATION AT A SELF-SERVICE TERMINAL - A method of providing secure authentication of a service user at a self-service terminal is described. The method comprises: detecting attempted access by the service user to a restricted function on the self-service terminal and ascertaining if a predefined operating system account is present on the terminal. In the event that the predefined operating system account is not present, then the method comprises permitting access to the restricted function by the service user. In the event that the predefined operating system account is present, then the method comprises requesting the service user to provide login credentials and authenticating the login credentials using the operating system account. If the login credentials are not authenticated, access to the restricted function is denied; whereas, if the login credentials are authenticated, access to the restricted function is permitted.06-23-2011
20110093949SYSTEM AND METHOD FOR USING SYMBOL COMMAND LANGUAGE WITHIN A COMMUNICATIONS NETWORK VIA SMS OR INTERNET COMMUNICATIONS PROTOCOLS - A system and method for generating actions utilizing predefined commands within a communications network comprises predefined commands called symbol commands. These are character strings entered into a platform during an internet or SMS communications protocol session. The method and system can be used via the internet or a GSM network and is well-suited for mobile use. In addition, utilization of keywords and alpha-numeric or other character symbols to form symbol commands allows for complex command structuring. A search process is used in combination with a symbol command and a symbol command directory to identify specific goods and services, or related symbol commands. In addition, a platform performs specific predetermined actions in response to the symbol command such as making product purchases or providing services such as location-based services, coupon delivery or travel ticketing. The symbol command structure and platform will also utilize identification information associated with an individual user. Furthermore, the platform may implement a response using location information associated with the user from the country code, area code or prefix code of a user's telephone number, or use GPS location information associated with the user's internet device. The symbol command system and method provide an improved form of access to products and services via the internet or SMS.04-21-2011
20110154482USER AUTHENTICATION - An apparatus lets a user to determine a pool of images and then forms from the pool of images a set of images for user authentication and divides the set of images into two mutually exclusive subsets: a key image subset comprising images referred to as key images and a decoy image subset comprising images referred to as decoy images. The apparatus displays the key images to the user to teach the key images to the user. Then, to authenticate the user, the apparatus produces an assortment of decoy images and key images, and displays the assortment to the user. The apparatus receives from the user identification of images held as key images and verifies whether the identification of key images matched with the key images selected by the processor.06-23-2011
20120304284PICTURE GESTURE AUTHENTICATION - In one embodiment, a picture signature password system may use a picture signature password to determine access to a computing device or service. A display screen 11-29-2012
20110154483ELECTRONIC DEVICE WITH PASSWORD PROTECTION FUNCTION AND METHOD THEREOF - An electronic device with a password protection function is provided. The electronic device provides a password input area, which includes a number of sub-areas. Each of the sub-areas is designated a distinctive attribute, and is provided for inputting a single character. The characters and the attributes of the sub-areas are used to generate a login password according to a predetermined rule, thus the security of the login password is strengthened.06-23-2011
20110088090ENHANCEMENTS TO CLAIMS BASED DIGITAL IDENTITIES - A system and method of identifying a user to a digital system is disclosed. The method includes receiving a request for a value of an identification claim of a digital identity from a relying party, allowing a user to select the digital identity via an identification selector, querying an identification provider for the value of the identification claim, and providing the value of the identification claim to the relying party.04-14-2011
20110107415PORTABLE COMPUTING DEVICE AND HEADSET INTERFACE - A method of authenticating the interoperability of a headset and a device, as well as a headset and a device, is provided. The method includes, in a headset, monitoring at least one input for a verification signal, and, in response to failing to detect the verification signal within a predetermined period of time, selectively disabling a speaker and/or microphone of the headset. An alternative method includes, in a device, detecting a coupling of a headset to the device, transmitting a verification signal to the headset, and receiving, from the headset, at least one of a serial number associated with the headset, an identification of a user of the headset, a security certificate, or a voice translation template associated with the user.05-05-2011
20110083177SOFTWARE LICENSE MANAGEMENT - Disclosed is a system and method for automatically managing software licenses that are specifically tied to end users. A repository located on an authentication and license checking server contains the license requirements needed for each application. The repository is searched to determine which license(s) the requester needs to get access to an application. A user authentication is combined with a license checking at the server to grant or deny access to the application. A procurement license server may also be coupled to the license authentication and checking server to order any missing license(s).04-07-2011
20110078787METHOD AND SYSTEM FOR PROVISIONING PORTABLE DESKTOPS - A method is disclosed for provisioning of a peripheral portable desktop device. The peripheral portable desktop device is coupled with a workstation. A data file relating to an image for being stored within the peripheral portable desktop device is provided. The image includes secured data that is other than accessible absent user authorization data of a virtual user. Within the peripheral portable desktop device is stored data reflective of the image. A first user is then authorized to the peripheral portable desktop device by providing first user authorization data. For the first user is created a user account secured based on the first user authorization data. The account of the virtual user is accessed via the user account and the user account is configured to access the account of the virtual user upon access to the user account.03-31-2011
20110078788Electronic Device and Authentication Method of Electronic Device - An authentication method of an electronic device is disclosed. A plurality of key inputs is received from a user via activation of input keys. At least one key input from the key inputs is validated based on a predefined criterion to obtain a password. The password is compared to a registered password to obtain an authenticated password.03-31-2011
20110072511SYSTEMS AND METHODS FOR SUPPORTING PRE-BOOT LOG IN - In one embodiment, a system and method for supporting pre-boot log in pertain to receiving a password selected by a user for use in a pre-boot log in, determining whether the password can be entered by the user prior to completion of booting of the computer system, and if the password cannot be entered by the user prior to completion of the booting, signaling that the password is unacceptable.03-24-2011
20110016521INFORMATION PROCESSING METHOD, COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING APPARATUS - According to an aspect of the invention, a computer readable medium stores a program causing a computer to perform a process. In the program, the process includes receiving an instruction from a user, determining a rule based on a strength of authentication information of the user, and executing information processing according to the received instruction and the determined rule.01-20-2011
20110016520AUTHENTICATION SYSTEM AND METHODS - A system and methods authenticate sensitive information such as passwords. Password characters are transformed into distorted characters and distorted character groups are generated such that each distorted password character is part of a group. An image is created containing the groups and the password or other sensitive information is authenticated when groups are identified within the image that contain the password characters in an expected sequence.01-20-2011
20100275259METHOD AND SYSTEM FOR CREATING AND OPERATING BIOMETRICALLY ENABLED MULTI-PURPOSE CREDENTIAL MANAGEMENT DEVICES - A method and system used to integrate and control multiple secure credentialing approaches including magnetic stripes, bar codes, contact and contactless SmartCard chips, Short Message Systems (SMS), Global Positioning Systems (GPS), vicinity type Radio Frequency Identification Devices (RFID), and proximity type RFID, into compact, self-powered, biometrically-protected devices.10-28-2010
20110154486METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT - Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.06-23-2011
20120151576METHOD AND SYSTEM FOR CREATING AND ACCESSING A SECURE STORAGE AREA IN A NON-VOLATILE MEMORY CARD - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.06-14-2012
20120204258PASSWORD INPUT METHOD BASED ON TOUCH SCREEN - Disclosed is a password input method based on a touch screen, including the steps of displaying at least one background scene, generating trace data from a user's touch on the touch screen while the background scene is being displayed, comparing the trace data to password trace data preliminarily stored, and successfully terminating a password admission process if the trace data is identical to the password trace data. In entering a password by a user, even without preparing an additional input unit such as a keypad or keyboard and other similar fixed pictures (by software), this method enables a user to freely select and set a background scene in various types as well as variously forming a touch operation with his own password for admission, providing both security and input convenience of password keys.08-09-2012
20120204257DETECTING FRAUD USING TOUCHSCREEN INTERACTION BEHAVIOR - A processor can receive data indicative of interactions between a user and a touchscreen-equipped electronic device. The processor can compare a behavior pattern in the received data and a behavior pattern in previously stored data contained within a user profile for a human. The processor can generate a score indicative of a likelihood that the behavior pattern in the received data matches the behavior pattern in the previously stored data. Responsive to the generated score being below a threshold, the processor can generate an indication of a possible fraudulent action due to the user having a high likelihood of not being the human.08-09-2012
20120204259BIOMETRIC AUTHENTICATION APPARATUS - The present invention provides a biometric authentication apparatus capable of evaluating during operation with a scenario the same as during scenario evaluation. A layered structure is employed, with a BSP, a framework including an input-output section and a DB, and an application. The BSP includes a device control section that controls the device, a registration code generating section that generates a registered code from biometric data acquired by the device and stores the registered code in the DB, a matching code generating section that generates a matching code from the biometric data acquired by the device, and a one-to-one matching section that matches the matching code against a registered code read from the DB. The framework includes a registration section that performs registration processing by sending instructions to the device control section and the registration code generating section, and a matching section that performs matching processing by sending instructions to the device control section, the matching code generating section and the one-to-one matching section.08-09-2012
20090222911MULTI-USER LOGIN METHOD FOR COMPUTER NUMERICAL CONTROL MACHINE - An exemplary multi-user login method for a computer numerical control (CNC) machine includes: initializing a program installed in the CNC machine, thereby displaying a user selection interface on a screen of the CNC machine; a user inputting a user name and password on the user selection interface; the program of the CNC machine determining whether or not the user is registered based on the user name and password entered; if the user is registered, an operating system of the CNC machine loading a driver program installed in a motion control card of the CNC machine, and the driver program reading the user's personal information stored in the motion control card; and accessing a user operation interface of the registered user.09-03-2009
20080320588System of Assigning Permissions to a User by Password - A data processing system includes a data storage unit for storing data sets accessible to a user upon receipt of permission. The data processing system restricts access to data sets by requiring a username and then requiring a password to obtain permission for access to a data set stored in a data storage unit. The system is adapted to support use of more than one said password associated with a username; and each of those passwords associated with that username permits a distinct level of access to a particular data set, whereas other passwords can provide different levels of access to any data set assigned thereto.12-25-2008
20090165122Image processing apparatus and copy machine control method - An image processing apparatus is an image processing apparatus capable of reading a security paper document that has a ground design pattern and performing image processing, and is provided with: a second modification processing unit that visualizes a latent image included in the ground design pattern; a first modification processing unit that performs a modification process so that the latent image included in the ground design pattern is not visualized; a CPU that performs authentication regarding whether or not a user of the security paper document is an authorized user; and a CPU that performs control so that the first modification processing unit performs modification processing and the latent image is not visualized, or performs control so that the latent image is not visualized by the second modification processing unit, in the case where the user has been authenticated as an authorized user of the security paper document.06-25-2009
20110162068Authentication apparatus - An authentication apparatus performs local and global corrections on image data. Local correction uses the shape of a local line indicated by line information contained in a neighboring region on image data whose feature value extracted from the shape of a line is used for authentication. Global correction uses the shape of a global line indicated by line information contained in a region larger than the neighboring region. The authentication apparatus calculates the difference between line information contained in image data corrected by local correction and line information contained in image data corrected by global correction and compares the difference with a threshold. If the difference is less than the threshold, the authentication apparatus outputs, as line information contained in image data, line information corrected by local correction and, if the difference is greater, it outputs, as line information contained in image data, line information corrected by global correction.06-30-2011
20110162067Cognitive-based loon process for computing device - A method of user logon to a computing device or computer system that, distinct from requiring entry of a set of known logon credentials such as a username and password, introduces an additional thought-directed user interface whereby the user must respond to one or more prompts that measure the user's cognitive function at the time of logon or during an active logon session. The user's responses to these prompts are evaluated for several purposes, including determining whether the user demonstrates the required level of cognitive function to gain access to the computer system or continue an active logon session. The user's responses and associated data may also be stored and retrieved at a later time for various purposes, including determining whether and to what extent the user's level of cognitive function is improving, diminishing, or remaining static over time.06-30-2011
20090126007IDENTITY MANAGEMENT SUITE - A server platform hosting an integrated software-based identity management suite used in a system for authenticating users with respect to a legacy application. The identity management suite includes an administration console for domain administration, an authentication services module for user authentication, an activity intelligence engine for monitoring user activity, an open-source-based virtual layer for mapping fields of a legacy user directory to fields within the server platform, and an internal interface using an open communication protocol adapted to provide communication between the open-source-based virtual layer and at least the authentication services module within the server platform.05-14-2009
20110167489Apparatus and Method for Securing Data on a Portable Storage Device - A portable storage device including a microprocessor and a secure user data area, the microprocessor operable to perform on-the-fly encryption/decryption of secure data stored on the storage device under a user password, the microprocessor also operable to exclude access to the secure user data area unless the user password is provided.07-07-2011
20110119759SYSTEM AND METHOD FOR CONTROLLING USER ACCESS TO AN ELECTRONIC DEVICE - A method and system for authenticating a user to access a computer system. The method comprises communicating security information to the computer system, and providing the computer system with an implicit input. The method further comprises determining whether the security information and implicit input match corresponding information associated with the user. The method further comprises granting the user access to the computer system in the event of a satisfactory match. When authenticating the user, the method and system consider the possibility of the user being legitimate but subject to duress or force by a computer hacker.05-19-2011
20120311700INFORMATION PROCESSING APPARATUS AND AUTHENTICATION INFORMATION MIGRATION METHOD - An information processing apparatus of the present invention converts user authentication information based on a second one-way function into a second converted value if authentication with a first converted value obtained by converting the user authentication information based on the first one-way function is successful.12-06-2012
20120311699System and Method for Providing Access to an Information Handling System - An information handling system includes a memory and a detector circuit. The memory is configured to store a first electrocardiogram measurement. The detector circuit is configured to receive a second electrocardiogram measurement in response to a specific combination of keys of a keyboard being pressed for a specific period of time, wherein each key in the specific key combination includes an electrocardiogram sensor on a top surface of the key, to authorize a user and log the user onto the information handling system when the second electrocardiogram measurement matches the first electrocardiogram measurement, and otherwise: to deny access to the information handling system; to increase a counter; to determine whether the counter has exceeded a threshold; and to request that an input window is displayed when the counter has exceeded the threshold.12-06-2012
20110126280INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus according to the present invention includes a biometric authentication unit that authenticates one piece of biometric information based on registered biometric information, wherein the one piece of biometric information is image information unique to a living body, and a plurality of pieces of user information are associated with the one piece of biometric information, and the registered biometric information is biometric information registered in advance, and a login processing unit that selects, based on user specification information for specifying user information used for login processing, one of the plurality of pieces of user information associated with the biometric information successfully authenticated by the biometric authentication unit so that the login processing unit uses the selected one of the plurality of pieces of user information to perform the login processing.05-26-2011
20100180336System and Method for Authenticating a User Using a Graphical Password - The present invention is directed to a system and method for authenticating a user of a device or computer system using a graphical password. In an exemplary embodiment, a user is presented with a plurality of graphical images on a display screen of an access device, such as a handheld smart phone. Each graphical image includes one or more associated attributes. The user sequential selects graphical images and a password is generated based on the combination of attributes of the selected images. The generated password is compared with a stored password to authenticate the user and grant access to the device. In another aspect, the graphical password includes time, motion, and/or keyboard input attributes such that the password is multidimensional.07-15-2010
20100115611METHOD, DEVICE, AND SYSTEM FOR JUDGING USER AUTHENTICATION - A user authentication judging device includes a proper environment information memory unit, a proper environment judging threshold memory unit, a changed environment information collecting unit, an environment authentication judging unit, an authentication controlling unit, and a verification authenticating unit. The proper environment information memory unit stores proper environment information. The proper environment judging threshold memory unit stores a proper environment judging threshold. The changed environment information collecting unit detects a change in a use environment of an information processing device and collects changed use environment. The environment authentication judging unit determines whether to authenticate or not the changed environment based on proper environment information stored in the proper environment information memory unit. The authentication controlling unit instructs reception of living body information from an applicant, and setting of a proper environment judging threshold. The verification authenticating unit performs authentication judgment and verification of the living body information using the set proper environment judging threshold.05-06-2010
20100115610METHOD AND SYSTEM FOR PROVIDING AUTHENTICATION THROUGH AGGREGATE ANALYSIS OF BEHAVIORAL AND TIME PATTERNS - A method and a system for evaluating identification of a user based on behavioral patterns and time patterns, including an analysis component for analyzing data; an authentication component for authenticating the analyzed data; and a behavioral biometric device for collecting behavioral biometric data related to the user, the authentication component and the analysis component operably connected at least with the behavioral biometric device; wherein the behavioral biometric data is matched against previously obtained or expected behavioral biometric data stored in a first database component of the analysis component in order to progressively, continuously, and incrementally evaluate the identification of the user to determine a confidence factor.05-06-2010
20090293119User authentication method and system and password management system - In one embodiment of the present invention, a user authentication method including the steps of automatically generating a set of deviation parameters; deviating from a reference password object, within an object space defined by appearance parameters previously acquired from a training set of objects, in a direction and with an amount determined by the set of deviation parameters, to thereby synthesize a password object; assigning a perceptual password including the password object to a user, and receiving a user identity claim including a user-provided perceptual password. The method further includes the steps of comparing the user-provided perceptual password with the perceptual password assigned to the claimed user, and, based on the result of this comparison, accepting or rejecting the user identity claim.11-26-2009
20110265178Method and Device for Authenticating a User With the Aid of Biometric Data - Authentication system comprising an input device comprising a plurality of input elements configured for inputting respectively characters in response to an input of a sequence of at least one character carried out by a user, the input device comprising at least one determination means coupled to at least one input element in order to determine a force exerted on the said at least one input element, the system comprising a recording means for recording a series of at least one force exerted on the said at least one input element, a memory configured for storing a series of at least one reference force, and comparison means configured for comparing the series of at least one exerted force with the series of at least one reference force.10-27-2011
20100031348LOCKED-DOWN COMPUTING ENVIRONMENT - Some embodiments of the present invention provide a system that presents an alternate computing environment on a host computing device. During operation, this system detects the presence of a removable storage device which is in communication with an interface of the host computing device. The system also locates code which implements the alternate computing environment on the removable storage device. Finally, the system runs the code which presents the alternate computing environment through an environment player on the host device, wherein the environment player prevents a user of the alternate computing environment from interacting directly with a native computing environment of the host computing device.02-04-2010
20100017875PASSWORD AUTHENTICATION APPARATUS AND PASSWORD AUTHENTICATION METHOD - A password authentication apparatus and a password authentication method for preventing the leakage of password information from user's password input operations includes a storage means for storing a correct answer symbol and selection information for selecting at least one input symbol for each digit of a password; a display means for displaying combinations of input symbol candidates based on user operation; a determination means for selecting, for each digit of the password, one or more input symbols from the combinations of input symbol candidates displayed by the display means based on the selection information corresponding to the digit to determine whether the correct answer symbol corresponding to the digit is included in the selected one or more input symbols; and an authentication means for authenticating that the password is entered correctly when the determination means determines that correct answer symbols for all the digits of the password are included.01-21-2010
20110154485AUTHENTICATION APPARATUS USING HUMAN BODY COMMUNICATION, PORTABLE DEVICE HAVING AUTHENTICATION FUNCTION USING HUMAN BODY COMMUNICATION, AND AUTHENTICATION METHOD USING HUMAN BODY COMMUNICATION - Disclosed are an authentication apparatus using human body communication capable of improving the security and convenience of user authentication by using human body communication, a portable device having authentication function using human body communication, and an authentication method using human body communication. In the authentication method using human body communication, an authentication device acquires user biometric information and provides the acquired biometric information to a portable device by using human body communication. The portable device then compares the acquired biometric information with previously stored biometric information, and when the acquired biometric information and the previously stored biometric information are identical, the portable provides authentication information to the authentication device. Upon receiving the authentication information, the authentication device performs an authentication procedure based on the authentication information. Thus, security and user convenience can be improved, and an authentication can be quickly performed.06-23-2011
20110154484INFORMATION PROCESSING APPARATUS, METHOD OF CONTROLLING AUTHENTICATION PROCESS, AND RECORDING MEDIUM - An information processing apparatus includes, a determining unit to determine whether a boot trigger of a boot is power recovery, a memory to store count information indicating a skip count, a booting unit to skip an authentication process depending on a result of a determination by the determining unit and the count information to continue the boot; and an updating unit to update the count information when the authentication process is skipped.06-23-2011
20090172809Method And System For Creating And Accessing A Secure Storage Area In A Non-Volatile Memory Card - In order to create and access a secure storage account in a non-volatile memory device, an account identification value is calculated. A memory identification value is read from a first non-volatile memory device. The memory identification value and the account identification value are transmitted to a second non-volatile memory device, and a calculated credential is received. A command is transmitted to create a secure storage account in the first non-volatile memory device, where the command contains the credential and the account identification value. To access the account, a sequence is transmitted, containing the account identification value and a value based on the credential. A secure storage system contains a first non-volatile memory device that stores a memory identification value and contains a secure partition accessible using a credential, a second non-volatile memory device that can compute the credential, and a host adapted to create and access the secure partition.07-02-2009
20120042378Login system for a graphical user interface - A user sets a design and uses that to get access to a resource. The design can include lines, and distances of lines, directions and locations. The design can require a user to select a color and can include colors and amounts by which the different entered parts need to overlap.02-16-2012
20120042377PORTABLE DEVICE WITH PASSWORD VERIFICATION FUNCTION AND SYSTEM HAVING THEREOF - A portable device with password verification function includes several input units, a storage unit and a processing unit. The processing unit is electrically connected with the input units and the storage unit. Each of the input units is different from others. Password information is stored in the storage unit. The processing unit includes a receiving module and a password verification module. The receiving module receives several input signals from the input units respectively. The password verification module verifies if the input signals match the password information.02-16-2012
20120042376Host Device and Method for Securely Booting the Host Device with Operating System Code Loaded From a Storage Device - A host device and method for securely booting the host device with operating system code loaded from a storage device are provided. In one embodiment, a host device is in communication with a storage device having a private memory area storing boot loader code and a public memory area storing operating system code. The host device instructs the storage device to initiate a boot mode and receives the boot loader code from the storage device. The host device executes the boot loader code which performs a security check and executes the operating system code loaded from the storage device only if the security check is successful.02-16-2012
20110314538Computing System Providing Normal Security and High Security Services - A computing system and method providing normal security services and high security services are disclosed. The computing system includes hardware resources, a processor core and an access right checker. The hardware resources are grouped into resource security levels. The processor, switching between a normal security and a high security state, assigns a user access right to a request. In comparison with the normal security state, user access right assigned in the high security state further allows the request to use the hardware resources of a higher resource security level. According to the assigned user access right and the resource security levels of required hardware resources of the request, the access right checker determines whether the request has the authority to use the hardware resources, and thereby, the access right checker executes the request or responds the issued request with an exception.12-22-2011
20120011586BIOMETRIC AUTHENTICATION DEVICE AND BIOMETRIC AUTHENTICATION METHOD - A biometric authentication device performs authentication of a user based on biometric information. In the biometric authentication device, a registry information storage stores pre-registered biometric information as registry information. An acceptance value determiner determines a verification acceptance value used for authentication, based on quality of the registry information with regard to reliability of characterizing an individual. An authentication information acquirer obtains biometric information of a user as authentication information. A similarity calculator compares the authentication information of the user with the registry information and calculates similarity between the authentication information and the registry information. An authenticator identifies whether the user is a registrant corresponding to the registry information, based on the similarity and the verification acceptance value.01-12-2012
20120017272System and Method of Security Function Activation for a Mobile Electronic Device - A system and a method are provided for activating one or more security functions of a mobile electronic device. The system and method provide for the activation of one or more security functions when the mobile electronic device is stored in a mobile electronic device holder. Security functions include, for example, closing a data item currently being displayed on the mobile electronic device, erasing decrypted information stored on the mobile electronic device, locking the mobile electronic device, and performing a secure garbage collection operation.01-19-2012
20120017271DOMAIN-AUTHENTICATED CONTROL OF PLATFORM RESOURCES - A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers.01-19-2012
20120023574Graphical Image Authentication And Security System - A method and system for protection of and secure access to a computer system or computer network. The method includes the steps of receiving a first login account identifier, such as a user name from a user in communication with the computer system or network. A determination is made if the user is recognized and enrolled from the first login account from the first login account identifier. If the user is recognized, a grid of randomly generated visual images is displayed including one visual image from an image category which has been preselected by the user upon enrollment. An image category identifier is randomly assigned to each visual image in the grid. An image category identifier, second login account identifier, such as a password, is entered and received. If the login account identifier and the image category is validated, access is permitted to the computer system or network.01-26-2012
20120159615MULTI-LAYER MULTI-POINT OR PATHWAY-BASED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image after moving through at least one other pre-selected reference point.06-21-2012
20120159617HEADSET, METHOD FOR CONTROLLING USAGE OF HEADSET, AND TERMINAL - The present invention provides a headset, a method for controlling usage of the headset and a terminal. The headset includes a memory configured to store an authentication password; and a usage control unit configured to send, after a connection is established between the headset and a terminal, a request of inputting authentication password to the terminal when the headset is in a protected state, receive an authentication password inputted from the terminal, authenticate the received authentication password using the stored authentication password, and control an execution of a predetermined function of the headset based on an authentication result. The present invention protects the headset by limiting the usage right of the headset, so as to reduce the probability of headset loss.06-21-2012
20120159614SIMPLE ALGEBRAIC AND MULTI-LAYER PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. The modified overlay image comprises a plurality of numbers. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, in sequence, with two or more numbers from the overlay image that equal a pre-selected algebraic result when one or more algebraic operator is apply to the numbers.06-21-2012
20120159613MULTI-LAYER MULTI-POINT OR RANDOMIZED PASSWORDS - A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response a first point relative to the base image reference point being aligned with a second point relative to the overlay image reference point.06-21-2012
20090007258Secure Access to Information Associated With a Value Item - Privacy of information is protected by a method of securing access to information associated with a value item, the method including comparing a security signature and a stored profile, and permitting access to the information associated with the value item if the security signature matches the stored profile. The value item may be a machine readable document or other item of high value. The associated information may be stored in an electronic storage medium attached to the value item, or may be stored in an external database, or both. Permitting access to the associated information may include generating an access code unique to the associated information and to the value item.01-01-2009
20120159618IMAGE PROCESSING APPARATUS, CONTROL METHOD, AND COMPUTER-READABLE STORAGE MEDIUM FOR COMPUTER PROGRAM - An image processing apparatus performs specific processing on images read out of a document having pages as follows. Each of the pages is a member assigned to at least any one of groups. The apparatus determines a second security level of each group based on a first security level of each page of the corresponding group; before the specific processing on the N-th group, determines whether or not password entry is necessary based on the second security level of the N-th group and any of the second security levels of the first group through the (N−1)-th group; and performs the specific processing on the N-th group if it is determined that password entry is unnecessary for the N-th group, or, alternatively, if it is determined that password entry is necessary for the N-th group and if a password is appropriately entered.06-21-2012
20120124663STORAGE DEVICE ACCESS AUTHENTICATION UPON RESUMING FROM A STANDBY MODE OF A COMPUTING DEVICE - Example embodiments disclosed herein relate to a storage device. The storage device may include a mechanism that monitors for receipt of cached authentication data from a host computing device upon resuming operation from a standby mode of the host computing device. The storage device may further include a mechanism that unlocks the storage device in response to receipt of the cached authentication data from the host computing device. In addition, the storage device may include a mechanism that monitors for receipt of re-authentication data and a mechanism that locks the storage device when a predetermined period of time has passed since resuming operation from the standby mode without receipt of the re-authentication data. Related computing devices, methods, and machine-readable storage media are also disclosed.05-17-2012
20110107416PORTABLE DEVICE HAVING BIOMETRICS-BASED AUTHENTICATION CAPABILITIES - Apparatus and method for implementing biometrics-based authentication. In a preferred embodiment, the present invention is embodied in a portable device. Specifically, in one embodiment, the portable device includes a microprocessor, a non-volatile memory coupled thereto, and a biometrics-based authentication module controlled by the microprocessor. Preferably, the biometrics technology used is fingerprint authentication technology. The authentication module is capable of registering a fingerprint upon first use of the portable device, storing an encoded version of the fingerprint in the non-volatile memory. Subsequently, the authentication module can read a person's fingerprint and reliably determine whether the fingerprint matches the registered fingerprint stored in the non-volatile memory. If a match is found, access to information in the non-volatile memory is granted to that person; otherwise, access is denied. Embodiments of the present invention thus provide a highly convenient, secured and reliable method and system for user authentication and access control which was not achievable in prior art password-based authentication approaches.05-05-2011
20120272313CONTROLLED ACCESS TO FUNCTIONALITY OF A WIRELESS DEVICE - Various embodiments of the invention may be used to verify that a person being authorized by biometric techniques to use a device is a living person and not some form of recording intended to spoof the system. Some embodiments may try to cause a change in a measured biometric feature, and compare images taken before and after the change to verify the change occurred. In some embodiments, multiple stages of verification may be used, either to increase the difficulty of spoofing the security system, or to provide different levels of security for different levels of access to the device's functionality.10-25-2012
20120317640VARIABLE LENGTH, MULTIDIMENSIONAL AUTHENTICATION KEYS - Provided are techniques for determining access to a secure system. A portion of an input sequence is received. A security factor of the received portion of the input sequence is determined by calculating: P(is)*P(gu), where P(is) is a probability of the input sequence being a valid password, and where P(gu) is a probability of a gesture pertaining to a user based on historical data collected from the user. It is determined whether the security factor has reached a predetermined level. In response to determining that the security factor has reached the predetermined level, access to the secure system is allowed before the entire input sequence is received.12-13-2012
20120131666Virtual Appliance Pre-Boot Authentication - A system for pre-boot authentication of a virtual appliance includes one or more subsystems to receive a command to power-on an information handling system (IHS). After receiving the command to power-on the IHS, the system initializes a power-on self test (POST), passes control of the IHS to a hypervisor, loads a concurrent service environment (CSE), requests user credentials, receives user credentials, authenticates user credentials using the CSE and authorizes a specific operating system image from a plurality of images to run on the IHS via the virtual appliance after the user credentials are authenticated.05-24-2012
20120254987Pairing and authentication process between a host device and a limited input wireless device - Disclosed is an apparatus and method to perform a pairing process with a limited input wireless device. A host device includes a transceiver and a processor. The processor may be configured to execute instructions to: receive from the transceiver a pairing process request from the limited input wireless device, wherein the pairing process request includes a private code based upon a physical user action implemented with the limited input wireless device; and implement a pairing process to validate the limited input wireless device for a particular host device function associated with the private code.10-04-2012
20120174215CLIENT-SIDE CAPTCHA CEREMONY FOR USER VERIFICATION - A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system, the facility presents a CAPTCHA challenge requesting verification that the user wants the action performed on the computer system. Upon receiving a response, the facility compares the received response to an expected correct response. If the received response is the correct response, the facility authorizes the action to be performed.07-05-2012
20120174214ENHANCING BIOMETRIC SECURITY OF A SYSTEM - In one embodiment, a method includes receiving an ordered sequence of biometric inputs from a user via a biometric sensor, determining if each of the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user, and if so, enabling the user to access the processing system, otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed.07-05-2012
20120174212CONNECTED ACCOUNT PROVIDER FOR MULTIPLE PERSONAL COMPUTERS - A connected account provider system allows a user of multiple electronic devices to set up a user account on one device with the device's settings saved in the cloud for application across different devices. A user can obtain secure access to the saved settings using a second (or subsequent) device and can select settings from the initial device to be synchronized to the second device. The system employs client account provider (CAP) software that can be obtained from an independent software provider and is installed on different devices of a user. The CAP client software creates an architecture on a user's device with a CAP client software layer conceptually separate from the device's operating system software. The CAP client software provides extension points for facilitating connection between connected user devices' operating systems and a cloud services layer typically provided by the CAP client software vendor.07-05-2012
20120317639BIOMETRIC DATA SYSTEM - A biometric data system includes a biometric feature capture device, a front-end data display interface, a cloud operation system, databases, an identity code generation module, an identity code check module, and a result feedback module. The unique biometric features captured by the biometric feature capture device can be converted into a set of unique and unrepeated identity code through the information technique of the cloud operation system. The identity code serves to label a user's identity, whereby the identity code can be compared with the biometric features of the user to find whether the identity code matches the biometric features and verify the identity of the user.12-13-2012
20100299748METHOD FOR ALTERATION OF INTEGRITY PROTECTED DATA IN A DEVICE, COMPUTER PROGRAM PRODUCT AND DEVICE IMPLEMENTING THE METHOD - The invention relates to a method for enabling modifications of integrity protected data, such as SIM lock settings, in a device. The method comprises: in a device, creating a data entity containing signed change information about allowable alterations, the change information being bound to the device, a certificate with a public key corresponding to the private key used to sign the change information; accessing the device and requesting alteration; verifying the requested alteration against the data entity; and if the verification succeeds, performing the requested alteration. By centrally preparing dedicated replacement devices, which locally can be altered in a simple and secure way, without compromising sensitive information or data, a more secure handling of alteration is achieved. Also, the invention relates to a corresponding computer program product and a device implementing the method.11-25-2010
20100299747IDENTITY VERIFICATION IN VIRTUAL WORLDS USING ENCODED DATA - An avatar in a virtual world is provided with credentials for access to various parts of the virtual world by embedding information derived from avatar identification and authorized credential information in the form of a graphic image associated with the avatar. The embedded information is preferably encrypted.11-25-2010
20120254990AUTHENTICATION OF AN END USER - A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.10-04-2012
20100011439INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM - The present invention enables improvement in user convenience while reducing security degradation. To accomplish this, an information processing apparatus includes a display unit that displays an operation screen; an acceptance unit that accepts input from a user; a display control unit that controls display so as not to change the operation screen to a predetermined state when a predetermined time elapses without accepting input from the user by the acceptance unit; and an acquisition unit that acquires biological information of the user, wherein the display control unit does not change the operation screen to the predetermined state even if the predetermined time elapses without accepting input from the user by the acceptance unit if, within the predetermined time, the acquisition unit acquires biological information of the last user from whom input was accepted by the acceptance unit before the predetermined time started to be counted.01-14-2010
20090019541Sequence-acitvated applications01-15-2009
20100306842Information Processing Apparatus Capable of Authentication Processing Achieving Both of User Convenience and Security, Method of Controlling Information Processing Apparatus, and Recording Medium Recording Program for Controlling Information Processing Apparatus - Whether a log-in button has been pressed or not is determined. When it is determined that the log-in button has been pressed, an ID selection screen is displayed. Whether an ID has been selected or not is determined. When it is determined that an ID has been selected, whether a secure printing job is present or not is determined. Thereafter, whether password matching is successfully achieved or not is determined. Thereafter, whether a password image function is ON or not is determined. Then, when it is determined that password matching was successfully achieved and a password image authentication function is ON, password image authentication is carried out.12-02-2010
20130174251METHODS AND SYSTEMS FOR SERVICE DELIVERY - A system for providing a service comprising: a service provisioning control means adapted for identifying a user, and for providing services to said user; the system further comprising: a location information retrieval means adapted for receiving location information of user; and for identifying a local service delivery system; an available service pack information retrieval means adapted for retrieving available service pack information corresponding to local service delivery system, the available service pack information comprising information about the set of possible services which can be delivered to user by local service delivery system; and wherein service provisioning control means is adapted for selecting a subset of services of available service pack information corresponding, based on at least a set of priority rules; and for providing at least one of subset of services to the user; and associated methods and devices.07-04-2013
20120266238Computer Including at Least One Connector for a Replaceable Storage Medium, and Method for Starting and Operating a Computer Via a Replaceable Storage Medium - A method starts and operates a computer with an operating system held on a replaceable storage medium. The method includes: checking the authenticity of the replaceable storage medium and/or checking a user's authority for executing the operating system held on the replaceable storage medium. The operating system held on the replaceable storage medium is executed if the replaceable storage medium is authentic and/or the user is authorized to use the operating system. Checking the authenticity of the replaceable storage medium and the user's use authority ensures the integrity of the operating system. Thereby, modifications to the operating system and to the computer are made more difficult. The invention also relates to a computer and a replaceable storage medium which are suitable for carrying out the method.10-18-2012
20120266237DEVICE AND METHOD FOR AUTHORIZATION MANAGEMENT - A device may be authorized via a method, which includes: displaying several numbered folder objects while the device is in an unauthorized state, each of which is displayed with a corresponding serial number and represents a folder containing several files stored in the device; executing a predefined operation toward one of the folder objects; detecting the serial numbers corresponding to the operated folder object; comparing the detected serial numbers and a predetermined password; and maintaining the device in the unauthorized state, if the detected serial numbers do not correspond to the password.10-18-2012
20120266235Method for reconfiguring a peripheral device using a magnetic swipe card - A magnetic-stripe card, with an associated card-reader, provides the apparatus supporting a method to change the configuration of a printer, scanner, or, other peripheral device in a stand alone environment or in a networked environment. A network may be defined as “two or more devices communicating”. The method comprises programming the card with selected configuration data, such as character-font selection, serial baud-rate, or, in the case of a scanner, document-rotate, auto-stamp, scan-resolution, duplex-scan ON/OFF, and other parameters. The card may be swiped at a slot in the peripheral device directly, or through a portable reader, or, even from a reader permanently connected within a LAN. Data on the card alerts the device to be reconfigured of its intent by way of resident utility software on the device, and, within the host, if present. When the transaction is accepted, the data is transmitted to the selected device to rewrite selected configuration parameters. Another very useful feature of this method would be the operator's ability, with his or her own personal magstripe card to “customize” the device to his or her preferences, even to disable the device to other operators. The magnetic swipe-card's limited data space is well suited to the small amount of data required for configuration changes, since many of the configuration parameters are only 1 or 2 bits wide.10-18-2012
20080289033Method and system for GNSS receiver login protection and prevention - Embodiments of the present invention recite a method and system for implementing login protection and prevention to a Global Navigation Satellite System (GNSS) receiver. In one embodiment, a geospatial data collection device which is communicatively coupled with a GNSS receiver is authenticated. It is then determined that the geospatial data collection device is authorized to collect data from a geographic region in which the GNSS receiver is located. The geospatial data collection device is then permitted access to a control interface of the GNSS receiver.11-20-2008
20110047616INFORMATION PROCESSING APPARATUS AND ACCESS METHOD - An information processing apparatus configured to control authority, the apparatus including a log-in-sequence storage configured to store a log-in ID used to log in the apparatus and a search user ID that is searched for when the apparatus is logged in using the log-in ID in association with each other; a log-in processor configured to accept a log-in ID, and if a search user ID associated with the log-in ID is present in the log-in-sequence storage, to receive the search user ID from an authentication device in the vicinity of the information processing apparatus; and an operation-state reproducer configured to output the screen of an operation state corresponding to the log-in ID received by the log-in processor and the received search user ID with reference to a cooperation-history information table in which log-in IDs and search user IDs are recorded in association with operation states.02-24-2011
20110047615SYSTEMS AND METHODS FOR LOCALLY GENERATING LICENSE AND ACTIVATING DRM AGENT - Systems and methods for locally generating a license and activating a Digital Rights Management (DRM) agent are provided. The system includes a storage device and an electronic device. The storage device includes a DRM treated file, operation information, and a management application. The electronic device activates the management application from the storage device to retrieve information, such as a Unique Identification (UID) or a DRM machine certificate from the electronic device, and generate a license for the electronic device according to the operation information, and the retrieved information of the electronic device. The electronic device activates a DRM agent by providing the DRM treated file and the license to the DRM agent for playing back the DRM treated file based on the license. The management application may set the license expired after the DRM treated file is played back on the electronic device.02-24-2011
20110047614Permission management system for data accessing and method thereof - The invention discloses a permission management system for data accessing and a method thereof, applicable to operating system. The method of permission management for accessing data comprises the steps of: first, monitoring an unoccupied drive letter in operating system; then, detecting a drive letter request event and actively executing an authorizing procedure to produce an access right of the drive letter; and stop monitoring the drive letter and allowing a user to access data corresponding to the drive letter according to the access right.02-24-2011
20120324571INFORMATION INPUT DISPLAY DEVICE AND CONTROL PROGRAM THEREOF - An information input display device, having an input section for inputting information and a display section for displaying the information, which enables an access to protected information after being authenticated by an authentication processing executed after starting up of the information input display device, the information input display device including: an authentication processor which executes the authentication processing based on authentication information inputted by the input section; and an input display controller which, after the starting up of the information input display device and before being authenticated by the authentication processing, accepts inputting of prescribed information different from the authentication information through a screen displayed on the display section, and allows the display section to display the prescribed information on the screen.12-20-2012
20120324570INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD, AND COMPUTER PROGRAM PRODUCT - According to one embodiment, an information processor includes a display module and an operation module. The display module displays a plurality of display objects each at a predetermined display position. The display objects are selected in advance by a user from a plurality of objects and includes authentication objects. The operation module is used for operation to select the authentication objects in a predetermined order upon user authentication.12-20-2012
20120278883Method and System for Protecting a Computing System - The system relates to a method for protecting a computer system application. In one aspect of the method, a wrapper program is installed on a computer system and the computer system application is embedded within the wrapper program. In another aspect, the wrapper program verifies with a user prior to allowing the computer system application to be invoked.11-01-2012
20110265176System and Method for Creating Conditional Immutable Objects in a Storage Device - A data storage system includes a storage device and a data handler that receives an object, creates metadata for the object that includes a key and an authorization, stores the object on the storage device, receives a request for the object, determines if the request includes the key, and, if the request has authorization information, permits access to the object. The data handler receives another request for the object, determines if the request includes the key, and, if the request does not have the authorization information, denies access to the object.10-27-2011
20120090023SECURE AREA FOR APPS - An invention for providing privacy and restricted access to functions available on a computing device. According to one embodiment, an area accessible to a user interface on a computing device is provided. A request from a user of the device is accepted, the request for associating with the area one or more functions available on the device. The one or more functions are then associated with the area, and the one or more functions are made invisible. Another request from the user is accepted, the other request for gaining access to the area. Authentication against the user is requested. Access to the one or more functions is granted if the authentication is successful, and access to the one or more functions is not granted if the authentication is not successful.04-12-2012
20120331549SYSTEM AND METHOD FOR A LOG-IN PROCEDURE FOR NON-READERS - A system and method for logging a non-reader into a corresponding user account is disclosed. A system can include a processor, a user interface, a display, and a camera. The processor can be programmed to display a first plurality of pictures and configure the user interface to allow the user to select a first picture corresponding to the user from the first plurality of pictures to provide a first authentication step and allow the user to select a second picture from a second plurality of pictures providing a second authentication step. The system can log the user into the corresponding user account if the second picture selected from the second authentication step corresponds to the first picture selected from the first authentication step. A system and method for logging multiple users into corresponding user accounts is also disclosed.12-27-2012
20120331548Display Dynamic Contents on Locked Screens - In one embodiment, receiving a first action from a user of a computing device, wherein the first action causes the computing device to power up while a screen of the computing device is locked; obtaining a plurality of dynamic information items relevant to the user of the computing device; and displaying at least one of the plurality of dynamic information items on the locked screen of the computing device.12-27-2012
20130014251SUBSTRATE PROCESSING APPARATUS - An operating section including an operation screen and amounting section, comprises a data authentication unit configured to collate authentication data when a device is inserted into the mounting section, which is the device into which the authentication data such as at least user ID and user password is integrated, and completes log-in when the authentication data is registered, and a display control unit is configured to perform changeover of a display state of at least a part of the operation screen.01-10-2013
20120151575APPARATUS AND METHOD FOR CERTIFICATING SECURITY IN PORTABLE TERMINAL - Provided is an apparatus and method for certificating security in a portable terminal, which can enhance security in the portable terminal by multiple security certifications. An apparatus for certificating security in a portable terminal includes a security certificating unit for performing a plurality of security certification processes through a plurality of security operations performed in the portable terminal, and a control unit for performing a relevant function after completion of the security certification processes through the security operations.06-14-2012
20120151574SOFTWARE ACTIVATION USING DIGITAL LICENSES - Systems and methods are provided for activation of software that uses digital licenses. In some embodiments, a software vendor may securely deliver at least one digital proof-of-purchase to an OEM (e.g., to avoid piracy of software licenses). The OEM may install an associated software copy on a computer system, and store the at least one digital proof-of-purchase on it. The OEM may communicate the proof(s)-of-purchase stored on the computer system and its system identifier to the software vendor. A user of the computer system may attempt to activate the OEM pre-installed software by sending an activation request to a software vendor, who may verify whether or not the digital proof-of-purchase and system identifier in the activation request match those previously reported by the OEM, and may either grant or deny the activation request.06-14-2012
20130019305METHOD AND SYSTEM FOR CONTROLLING ACCESS TO EMBEDDED NONVOLATILE MEMORIESAANM Berenbaum; AlanAACI New YorkAAST NYAACO USAAGP Berenbaum; Alan New York NY USAANM Wahler; RichardAACI St. JamesAAST NYAACO USAAGP Wahler; Richard St. James NY US - A system to control access to a nonvolatile memory. The system includes an embedded controller, and a nonvolatile memory including a password. The embedded controller and the nonvolatile memory may be in communication with one another. The system further includes a lock register receiving and storing the password from the nonvolatile memory, and a key register receiving a key from the embedded controller and holding the key for one machine cycle. Further, the system includes a comparator connected between the lock register and the key register. The comparator compares the password received from the lock register and the key received from the key register. Output from the comparator is provided to an access filter connected between the embedded controller and the nonvolatile memory. Based on the comparator output, the access filter may grant or block access to the nonvolatile memory.01-17-2013
20130024932ENHANCED SECURITY FOR BLUETOOTH-ENABLED DEVICES - In one embodiment, a method includes determining a location of a device relative to a reference, and identifying a first password from a plurality of passwords for use to unlock the device based on the location of the device relative to the reference. The plurality of passwords includes at least one complex password and at least one simple password. The method also includes prompting for input arranged to unlock the device, obtaining the input, and determining when the input matches the first password. When it is determined that the input matches the first password, the device is unlocked.01-24-2013
20080244734INFORMATION PROCESSING APPARATUS AND METHOD, PROGRAM, AND INFORMATION PROCESSING SYSTEM - An information processing apparatus limiting access to a storage medium from outside, includes unlock command obtaining means for obtaining, from an authentication unit configured separately from the information processing apparatus, a unlock command requesting release of inhibition of access to the storage medium, and also an authentication mode ID for identifying an authentication mode of the authentication unit, authentication data supplying means for supplying the authentication unit with authentication data used as sample data indicating that a user is verified in an authentication processing of a user instructing access to the storage medium, the authentication data being corresponding to the authentication mode ID obtained together with the unlock command from the unlock command obtaining means, authentication result obtaining means for obtaining, from the authentication unit, an authentication result of the authentication processing performed by using the authentication data supplied from the authentication data supplying means, authentication result confirming means for confirming contents of the authentication result, and release means for releasing inhibition of access to the storage medium from outside when, as a result of confirmation made by the authentication result confirming means, the user is authenticated as being verified.10-02-2008
20080235789METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING REGISTRATION AND CONFLICT RESOLUTION OF WEB APPLICATION KEYBOARD SHORTCUTS - Conflict resolution of web application keyboard shortcuts implementation includes a web application being loaded in a web browser and application keyboard shortcuts for the web application are registered with the web browser. The web browser identifies application keyboard shortcuts for the web application that conflict with keyboard shortcuts for the web browser. Then the web browser resolves each conflict.09-25-2008
20080229408Access control system based on brain patterns - The invention includes a control system and a method for access control of an application system, with electrically measurable data acquired as the result of a biometric reaction of a user, the biometric reaction triggered by stimulatory information presented to the user. An acquisition means for acquiring the electrically measurable data, a provision means for providing reference data and a comparison means for comparing the data are provided in the control system. The reference data is provided relating to the stimulatory information and/or the acquired, electrically measurable data. The acquired measurable data is compared with the provided reference data by means of the comparison means. An authorization of the user to the application system takes place on the basis of the comparison results. By means of this control system it is possible to dynamically authorize and identify a user with absolute reliability and to unambiguously authenticate said user.09-18-2008
20110247067DISPLAY APPARATUS, AUTHENTICATION METHOD, AND PROGRAM - A display apparatus includes an input section that inputs input information representing an input operation from an operation means contacting a touch screen, a display section that refers to an authentication table correlating the input operation with a display image so as to display the display image on the touch screen, and an authentication processing section that refers to the authentication table so as to determine whether or not a combination of a display image displayed on the touch screen and an input operation represented by the input information input by the input section in a state where the display image is being displayed is correlated in the authentication table, and authenticates an input action by the input operation when the combination is correlated in the authentication table.10-06-2011
20110265175GRAPHICAL USER INTERFACE TESTER - A method including accessing a test case that tests one or more user interfaces associated with another device, wherein the test case is defined in a spreadsheet; interpreting the test case; executing the test case with respect to the one or more user interfaces associated the other device; and outputting a test result.10-27-2011
20130179966PASSWORD AUTHENTICATION CIRCUIT AND METHOD - A password authentication circuit includes a timer that measures first and second periods of a password authentication period, a control circuit that, in a first period, disables writing of a password received into a password register, in a predetermined period within a second period enables writing of a password received into the password register and outside the predetermined period within the second period disables writing of a password received into the password register; a password comparison unit that compares a password in the password register and a password expected value to perform authentication of the password; and a first period generation unit that controls variably the first period, a password last written into the password register in the predetermined period of the second period being made a target for authentication.07-11-2013
20120254989Providing greater access to one or more items in response to verifying device transfer - A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.10-04-2012
20120254988Providing greater access to one or more items in response to verifying device transfer - A computationally implemented method includes, but is not limited to: acquiring one or more indicators that suggest that a computing device has been transferred to a first user from a second user, the first user having at least greater accessing rights than the second user to one or more items via the computing device; detecting, in response to said acquiring, input that verifies that the computing device has been transferred to the first user; and providing at least greater access via the computing device to the one or more items in response to detecting the input verifying that the computing device has been transferred to the first user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.10-04-2012
20130139249IMAGE PROCESSING APPARATUS, METHOD FOR CONTROLLING THE SAME, AND STORAGE MEDIUM FOR CARRYING OUT LOGIN PROCESSING - An image processing apparatus transmits, after reception of a login notification of an authenticated user, the login notification to an identified application, and then changes displaying of a screen of a display unit to displaying of an initial screen corresponding to the identified application. After the displaying of the display unit has been changed to the displaying of the initial screen, the image processing apparatus transmits the login notification to, among applications belonging to a first group, an application to which the login notification has not been transmitted, and applications belonging to a second group.05-30-2013
20130139248METHOD OF AUTHENTICATING PASSWORD AND PORTABLE DEVICE THEREOF - A method of authenticating a password and a portable device thereof are provided. The method includes: displaying an input keyboard on which a plurality of objects are arranged; changing an object arranged on the input keyboard according to a manipulation of a user; and if an object pattern arranged in a designated position of the input keyboard corresponds to a preset password pattern, authenticating the user. Therefore, it is difficult to use artifacts on the display screen to trace a password after entry, and thus security is improved. As a result, a protection of personal information of a user is strengthened.05-30-2013
20130097698System and Method for Transaction Security Enhancement - The present disclosure involves a system that includes a computer memory storage component configured to store computer programming instructions and a computer processor component operatively coupled to the computer memory storage component. The computer processor component is configured to run a secure operating system and a non-secure operating system in parallel. The secure and non-secure operating systems are isolated from each other. The computer processor component is configured to execute code to perform the following operations: receiving an authentication request from an application that is run by the non-secure operating system, wherein the authentication request contains credentials of the application; communicating with a secure applet that is run by the secure operating system, and wherein the communicating includes transferring the credentials of the application to the secure applet; and authenticating and vetting the application based on the credentials of the application.04-18-2013
20130104227ADVANCED AUTHENTICATION TECHNOLOGY FOR COMPUTING DEVICES - Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern.04-25-2013
20130125232IMPLEMENTING ENGINEERING UNIT CONVERSIONS ASSOCIATED WITH CONTROL DEVICES - The disclosed subject matter comprises a converter component that can efficiently manage conversion of data associated with a control system from one engineering unit (EU) type to another EU type, and/or conversion of the data from one language to another language, based at least in part on the user. The converter component can identify a user, or can receive a conversion selection(s) from the user, and can automatically select a specified subset of EU conversions and/or language conversions to employ in relation to the user, convert the data associated with the control system in accordance with the subset, and present the converted data to the user via the interface. The converter component can present a pre-populated table of EU conversions associated with the subset, and can allow a user to add or modify an EU conversion.05-16-2013
20130125233FLEXIBLE SECURITY CONTROL ENVIRONMENT - An automation control system is provided with an interface device configured to enable a user to monitor, control, or monitor and control processes of the automation control system. Upon power on or initialization of the interface device or when a previously logged in user is logged off, the interface device logs in a guest account associated with a user role having a defined set of access rights and provides access to monitor, control, or monitor and control the processes based upon the set of access rights.05-16-2013
20130145457Protecting Personal Information Upon Sharing a Personal Computing Device - In particular embodiments, a temporary user is able to use another's personal computing device in shared mode for a short period of time while experiencing a personalized user interface. An indication is detected that a personal computing device associated with a primary user is to be shared with a temporary user. Access to local personal information associated with the primary user is disabled if it is stored on the personal computing device. Access to remote personal information of the primary user that is accessible from the personal computing device is disabled. A personalized user interface incorporating personal information associated with the temporary user is presented on the personal computing device for the temporary user. Personal information of the primary user is not accessible by the temporary user, and vice versa. When shared mode is to be terminated, all personal information of the temporary user is deleted.06-06-2013
20130145458ELECTRONIC DEVICE AND METHOD FOR UNLOCKING LOCKED OPERATING SYSTEM - A method for unlocking a locked operating system of an electronic device is provided. The electronic device includes a storage unit and a locking unit, the storage unit is configured for storing a preset password and preset unlocking request information. The method includes steps: receiving a message from a second electronic device; verifying the received message according to the preset unlocking request information; and sending the preset password to the second electronic device if the verification is successful.06-06-2013
20080201775Multifunction peripheral, password setting system, method and computer readable medium for password setting - There is provided a multifunction peripheral comprising an operation unit, a key definition unit to define usable keys for password setting depending on a type of a certain function, a password setting unit to accept a password through the usable keys defined by the key definition unit and to set the password in the multifunction peripheral, a password authentication unit configured such that when execution of the certain function is instructed, the password authentication unit accepts a password through the plurality of keys of the operation unit and judges whether the password accepted through the plurality of keys matches the password set by the password setting unit, and a function control unit configured to permit execution of the certain function if it is judged by the password authentication unit that the password accepted through the plurality of keys matches the password set by the password setting unit.08-21-2008
20080201774Security System - A security system for controlling access to a plurality of secure areas, an interface to obtain verification data, particularly biometric scan data of the user, processing means arranged to compare the biometric scan data with stored template data and return a match condition, and signal means arranged to allow access to at least one of the plurality of secure areas if the match condition is satisfied.08-21-2008
20130152193METHOD FOR AUTHENTICATION WITH DYNAMIC AND RANDOM PASSWORDS - An approach is provided for a method for authentication with dynamic and random passwords, which comprises acts of obtaining a code equation initially from a person through an register page of a system, generating a starting code set and a result value, obtaining a password from the person through an authentication page of the system, determining the identity of the result value and the password, and granting the person for the authentication when the password and the result value are the same. The code equation is formed by at least one mathematical equation. The result value is the calculation result of the starting code set and the code equation. The starting code set is a set of number randomly generated by the system. Therefore, the present invention is able to prevent password cracking or recovering from data that has been stored in or transmitted by an apparatus.06-13-2013
20100299749Secure Booting System And Method - In a method for securing and disabling an electronic device, the electronic device automatically executes a basic input/output system (BIOS) component of a security and tracking service during boot up. The BIOS component automatically determines whether an application component of the security and tracking service has requested disabling of the electronic device. In response to a determination that the application component has requested disabling of the electronic device, the BIOS component automatically displays system information and unlock key. The BIOS component also automatically prompts a user of the electronic device to enter an activation password to re-enable the electronic device. Other embodiments are described and claimed.11-25-2010
20130205387Method and Apparatus to Authenticate a User to a Mobile Device Using Mnemonic Based Digital Signatures - A user device comprising a processor configured to enable a mnemonic based digital signature scheme for user authentication that is based on a combination of one or more secrets and one or more actions implemented on the user device and associated with the secrets, and a device input system coupled to the processor and configured to detect the actions implemented on the user device. Also disclosed is an apparatus comprising a processor configured to implement a mnemonic based digital signature for authenticating a user, a device input system configured to enable the mnemonic based digital signature, and a memory unit configured to store input data that is used to recognize the mnemonic based digital signature, wherein the mnemonic based digital signature comprises a secret, an action associated with the secret and implemented using the device input system, and a cue associated with the action.08-08-2013
20120284789MOBILE DEVICE AND CONTROL METHOD THEREOF - This specification relates to a mobile terminal capable of executing a lock state of restricting a touch input and a control method thereof. The control method for the mobile terminal, which displays a lock screen in the lock state of restricting an input of a control command for an application, includes displaying an execution screen of an application on the lock screen, and controlling the lock screen based upon a touch input detected in the lock state.11-08-2012
20130160113COMPUTING APPARATUS AND METHOD FOR OPERATING APPLICATION - Computing apparatus and method for operating an application are provided. The computing apparatus includes: a communicator which communicates with a paired external device; a storage unit in which applications are installed; a controller which, if one of the applications installed in the storage unit is selected, controls the communicator to request login information corresponding to the selected application from the external device and, if the login information is received from the external device, performs a login by using the login information; and a display unit which displays an operation screen corresponding to the selected application. Therefore, a user further easily and conveniently uses services of applications respectively installed devices.06-20-2013
20130160109METHOD AND DEVICE - A method and device for user authorization is presented herein. The authorization device may be integrated in a display interface configured to receive an infrared input signal. The device may include a means for converting the infrared signal into an electric signal. The device may further include a processor configured to analyze the electrical signal. The processor may further be configured to provide an authorization of a user based on the analysis of the electrical signal.06-20-2013
20130160110Device Locking with Hierarchical Activity Preservation - Techniques are described for device locking with activity preservation at a specified level within a multi-level hierarchy of device states. Such locking enables a user to share a device with another user while specifying a particular level of access to the device, such as access to a particular class of applications, a specific application, or a specific task within an application. Determination of the authorized activity may be based on a currently active application, or on the particular user gesture. The level of functionality made available may be based on the number of times a user gesture is repeated. Gestures may include a selection of a hardware or software control on the device, issuance of a voice command, and the like.06-20-2013
20130160111Device and Method for Use of Real-Time Biometric Data To Control Content and Device Access - A device and method for unobtrusively conducting security access checks via biometric data. The device and method obtains biometric data in response to a request for content and initiates a security clearance process that is substantially unobservable to an individual with clearance to access the requested content.06-20-2013
20130160112CONTROLLER AND METHOD OF STORAGE APPARATUS - According to one embodiment, a controller for controlling a connected storage apparatus includes a storage unit and a control unit. The control unit acquires a password input by a user, judges whether or not the password is consistent with a password previously registered in the storage unit, cancels authentication data that is stored in the storage unit and enables reading and writing toward the storage apparatus of data and allows the formatting toward the storage apparatus in a condition that the password is consistent with the password previously registered in the storage unit, and disables reading and writing toward the storage apparatus of data and formatting toward the storage apparatus in a condition that the password is not consistent with the password previously registered in the storage unit.06-20-2013
20110321157SYSTEM AND METHOD FOR USER AUTHENTICATION - A system and a related method are disclosed for authenticating a user of an electronic system. The system, and related method access (a) data relating to a defined interaction with an input device for a purported authorized user, (b) a probability distribution representation for the defined interaction for an authorized user, and (c) a probability distribution representation for the defined interaction for a wide population, from which it can determine value indicative of whether the purported authorized user is the authorized user. The purported authorized user can be authenticated as the authorized user, if the value satisfies a prescribed threshold.12-29-2011
20110321156Privacy Tool - The present invention provides a method and system for hiding private activities on logged on computing devices of all types. Its countermeasures help users inconspicuously block snoops manually or automatically by moving from sub-profiles displaying sensitive data to sub-profiles displaying non-sensitive data, or even no data at all.12-29-2011
20130191909Industrial Automation System and Method for Safeguarding the System - An industrial automation system comprising a digital fingerprint that is allocated to a unit requesting access to the automation system and which is based on one or more parameters of a communication between the unit and a fingerprint-determining component of the automation system, wherein the industrial automation system additional comprises the fingerprint-determining component which, during the operation of the automation system, grants the requesting unit access to the automation system and compares the determined fingerprint of the requesting unit with a stored fingerprint.07-25-2013
20130191910Device, Method, and Graphical User Interface for Accessing an Application in a Locked Device - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to entry of a correct passcode in the passcode entry interface, the device enters an unlocked state.07-25-2013
20130191911Device, Method, and Graphical User Interface for Accessing an Application in a Locked Device - A device with a touch sensitive display and a plurality of applications, including a camera application, while the device is in a locked, passcode-protected state: displays a lock screen interface, the lock screen interface including a camera access indicia; detects a gesture; in response to a determination that the gesture starts on the camera access indicia: ceases to display the lock screen interface; starts a restricted session for the camera application; displays an interface for the camera application, without displaying a passcode entry interface; and maintains the device in the locked, passcode-protected state for the applications other than the camera application; and in response to a determination that the gesture starts at a location other than the camera access indicia: displays a passcode entry interface, wherein in response to entry of a correct passcode in the passcode entry interface, the device enters an unlocked state.07-25-2013
20120291120TOUCHSCREEN PASSWORD ENTRY - A method of user authentication on a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and movement of either the modified base image or modified overlay image is responsive to receiving an input starting outside a display area of a touchscreen. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image.11-15-2012
20120030755INFORMATION PROCESSING APPARATUS AND SECURITY PROTECTION METHOD - According to one embodiment, an information processing apparatus includes an input module to input a password, a biological authentication device including a storage unit for storing biological information and identification information, and an authentication control module which sets and holds identification information to be stored in the storage unit of the biological authentication device, and permits a password input using the input module to be substituted by authentication using the biological authentication device when the identification information held by itself and the identification information stored in the storage unit of the biological authentication device match. The authentication control module includes a setting module to perform a setting for the identification information stored in the storage unit of the biological identification device and held by itself, on both conditions of authentication establishment with a registered password entry using the input module and authentication establishment using the biological authentication device.02-02-2012
20120030754SECURITY MANAGEMENT SYSTEM, MEDICAL DEVICE AND METHOD FOR MANAGING SECURITY - A security management system, comprising: an authentication unit for authenticating an operator of an operating terminal in order to determine whether the operator is permitted to log in or release a lock; a current operator information inquiry unit for inquiring for login status information and current operator information; an authority information inquiry unit for inquiring for authority information regarding the operator and that regarding the current operator; a lock unit for detecting an event, where a predetermined lock condition is satisfied, in the login status to allow the operating terminal to change to a lock status, and for allowing the operating terminal to change to an operable status in response to a login instruction or an instruction for a release; and a lock control unit for transmitting the instruction for a release to the lock unit when a predetermined condition is satisfied.02-02-2012
20130198836Facial Recognition Streamlined Login - A system and method are disclosed for providing login credentials to a computer system using a biometric indicator. The system includes an image comparison module, a user interface, and an access control module. The image comparison module is configured to compare an image of a user, requesting login access to a client device, with images in a database to determine whether the image matches an image in the database. The user interface is configured to receive input from the image comparison module and to prompt the user for login credentials based on the input received from the comparison module. The access control module is configured to grant or deny login access to the user based on the user input that is entered in response to the prompting.08-01-2013
20130198835METHOD OF USING AN ACCOUNT AGENT TO ACCESS SUPERUSER ACCOUNT SHELL OF A COMPUTER DEVICE - A method of using an account agent to access a superuser account shell of a computer device is disclosed. The method includes receiving an authentication request; verifying whether an identity authentication is passed; when the identity authentication is passed, establishing a secure channel between the account agent and a normal user account shell; and allowing controlling the superuser account shell of the computer device through the normal user account shell.08-01-2013
20130198837UNLOCKING SCHEMES - An end device may include a camera configured to capture an image of an object, a touch screen configured to receive a touch input and a processor configured to determine to unlock the end device based, at least in part, on the image of the object and the touch input.08-01-2013
20120042379SYSTEM AND METHOD FOR DETECTING GENUINE COPIES OF PRE-RECORDED DIGITAL MEDIA - To authenticate a digital medium for a given title, an authentication server selects a number of challenges corresponding to the title from an authentication database, clears an error counter and sends the challenges sequentially to an authentication application in a media reader in which the digital medium is inserted. Upon reception of a response, it is verified if the answer is correct. If this is the case, then the next challenge is sent; otherwise, it is first verified if a correct answer was mandatory and if so, it is deduced that the digital medium is not genuine. If an incorrect may be accepted, then the error counter is incremented and the next challenge is sent. When there are no more challenges to send, it is verified if the error counter is above an acceptable limit. If so, the digital medium is deemed as not genuine. The invention may be used to allow an owner of a digital medium to access further information or content.02-16-2012
20120060215MOBILE TERMINAL AND METHOD FOR PROTECTING ITS SYSTEM DATA - A mobile terminal and a method for protecting system data of the mobile terminal, wherein the critical system data of the mobile terminal is stored into the singlechip with 128-bits ID code, and the method of the public password encryption of the mobile terminal is applied such that the user has to pass the password authentication when the user accesses the data stored in the singlechip, thus protecting important system data of the mobile terminal, thereby protecting the legal right of the mobile terminal manufacturer, avoiding the counterfeit mobile terminal stealing the related technique of the mobile terminal, and prompting the normal development of the mobile terminal market at the same time.03-08-2012
20120060214Behavioral Stochastic Authentication (BSA) - Methods and systems for authenticating a user and a consumer electronic device (CED) to a financial services provider (FSP) for purposes of communications initiated from the device and needing security, such as purchases and financial transactions, are provided. The FSP may compile information about a user's behavior from various sources, both public and private, including the CED. The information may be of a stochastic nature, being gathered by sampling user data and behavior at chosen times. The information may include indicators of user behavior—such as the user using the device to check various accounts and web-pages—and data from the device—such as GPS location. Based on the compiled stochastic information, and using a sliding scale, a throttling mechanism, acceptance variation, and pinging information, the FSP can compare current information from the device with what is known about the user and the device to provide a more accurate and reliable authentication process.03-08-2012
20120072981IMAGE PROCESSING APPARATUS, CONTROLLING METHOD OF IMAGE PROCESSING APPARATUS, AND COMPUTER PROGRAM - In a case where a plurality of users are made correspondent to one IC card, user changeover is performed without a logout process. When the IC card is passed over a card reader while a user is logging in, it is judged whether or not the passed card is the IC card used in a login process of the user who is logging in. If NO, a logout process of the user who is logging in is performed, and a user login process using the newly passed IC card is performed. On the other hand, if YES, it is further judged whether or not the plurality of users are made correspondent to the passed IC card. If YES, selection of the user who intends to newly log in is accepted.03-22-2012
20120096545METHOD FOR RESTRICTING THE USE OF AN APPLICATION PROGRAM, SYSTEM FOR AUTHENTICATING THE USER OF A MEASURING APPARATUS, AUTHENTICATION SERVER, CLIENT APPARATUS AND STORAGE MEDIUM - A user authentication system is provided with a client apparatus and an authentication server. An application program used for processing the measurement results of the measuring apparatus is installed on the client apparatus. Databases for storing use authority information of the application program are provided on the authentication server. A user inputs authentication information when operating the client apparatus and the application program is started. The client apparatus sends the authentication information to the authentication server, and an authentication process is performed by the authentication server. When authentication is successful, the use authority information of this user is sent from the authentication server to the client apparatus, and the client apparatus sets the application use restrictions according to the use authority information.04-19-2012
20120096544INFORMATION PROCESSING APPARATUS, CONTROL METHOD THEREFOR, AND PROGRAM - There are provided an information processing apparatus which provides a user credential sharing service on a user credential sharing condition intended by a vendor that creates an application, and a control method for the information processing apparatus. To accomplish this, the information processing apparatus generates sharing settings which defines a sharing condition for each item of a user credential among applications according to a manifest file acquired from each application. Upon receiving a request of a user credential from one of the applications, the information processing apparatus provides the user credential to the requesting application according to the generated sharing settings.04-19-2012

Patent applications in class Credential usage