Entries |
Document | Title | Date |
20080209547 | Electronic device and information processing method - An electronic device including a non-volatile memory and connectable to an information processing apparatus, including the following elements: a sensor configured to sense biometric information; an authentication unit configured to perform user authentication on the basis of the biometric information sensed by the sensor; a management unit configured to manage a number of authentication failures, the number of authentication failures being the number of times the authentication performed by the authentication unit has failed; and a controller configured to disable the electronic device or delete data stored in the non-volatile memory in a case where the number of authentication failures exceeds a preset threshold number of times. | 08-28-2008 |
20080222720 | Financial and similar indentification cards and methods relating thereto - Apparatuses forming portable identification cards and associated methods are described. A preferred apparatus includes an input device adapted for a consumer to enter authentication data, a memory for storing reference data, a processor configured to compare the authentication data entered by the consumer to the reference data stored in the memory to determine whether the authentication data entered by the consumer is valid authentication data, an indicator for informing a merchant when the processor has determined that the consumer has entered valid authentication data, and a power source adapted to supply power to the processor and the indicator. Other features are also disclosed. | 09-11-2008 |
20080229410 | PERFORMING A BUSINESS TRANSACTION WITHOUT DISCLOSING SENSITIVE IDENTITY INFORMATION TO A RELYING PARTY - A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction. | 09-18-2008 |
20080229411 | CHAINING INFORMATION CARD SELECTORS - A machine includes card stores to store information cards. For each card store, one or more card selectors can be provided. When performing a transaction involving information cards, a generic card selector, using a selector policy engine, can identify a card selector to use for the transaction. The identified card selector can be used to identify an information card in a card store to use in performing the transaction, which can be used to provide a security token to the relying party. | 09-18-2008 |
20080235790 | SECURE ISOLATION OF APPLICATION POOLS - A secure web hosting system is provided. In various embodiments, the secure web hosting system identifies an application that is to be loaded, creates a security token that is unique to the computer system and based on a name of the identified application, receives a request to load the identified application, and creates a process in which to load the identified application, the process having security attributes associated with the created security token. In various embodiments, the secure web hosting system includes an isolation service component that creates a security token based on an application name of an application identified by the configuration file. | 09-25-2008 |
20080256626 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND STORAGE MEDIUM - An information processing apparatus includes a user authentication unit that authenticates a user in a condition where an authentication medium used for authenticating the user is inserted, the authentication medium storing personal identification information of the user, a private key, and a software program for using the private key and including a processor for running the software program, to thereby establish a verified state in which the user is allowed to use the apparatus, a data processor that performs data processing including private key processing, a processing completion detector that detects completion of the private key processing performed by the data processor, and a verification state changing unit that changes, the verified state of the user having been established as a result of authenticating the user to a user unverified state based on detection of the completion of the private key processing in the processing completion detector. | 10-16-2008 |
20080263656 | Device, System and Method of Performing an Administrative Operation on a Security Token - Some demonstrative embodiments of the invention include a method, device and/or system of performing an administrative operation on a user token. The method may include, for example, providing to an admin token user-identification data identifying the user token; receiving from the admin token an administrator code to enable performing the administrative operation; and providing the administrator code to the user token. Other embodiments are described and claimed. | 10-23-2008 |
20080289035 | METHOD AND SYSTEM FOR PREVENTING PASSWORD THEFT THROUGH UNAUTHORIZED KEYLOGGING - A method for preventing password theft through unauthorized keylogging includes detecting, from a host application, a request for a password input by a user of an input keyboard device; activating a randomly generated keyboard map uniquely associated with the host application such that a first set of keystroke values inputted by the user results in a second, converted set of keystroke values transmitted to the host application, in accordance with the randomly generated keyboard map uniquely associated therewith; and upon completion of a password entry process by the user, deactivating the randomly generated keyboard map such that subsequent keystroke values inputted by the user are no longer converted to the values according to the keyboard map. | 11-20-2008 |
20080295167 | Removable computer with mass storage | 11-27-2008 |
20080301804 | METHOD AND APPARATUS FOR CONTROLLING DEVICE THROUGH WEB-BASED SERVICE - A method and apparatus for controlling a device through a web-based service is provided. The apparatus includes a control module which determines whether a user is authorized to access a control server via a terminal of the user based on information received from the terminal, and transmits an authentication token to the terminal if it is determined that the user is authorized to access the control server; and an output module which receives a request message for controlling a device along with the authentication token from the terminal, the request message being transmitted via a third party application by the terminal, and transmits the request message to the device if the authentication token received from the terminal is valid. | 12-04-2008 |
20090038004 | ROLE CHANGE BASED ON COUPLING OR DOCKING OF INFORMATION HANDLING APPARATUS AND METHOD FOR SAME - An information handling system, comprising an information handling device containing memory for information specific to a particular role or function to be performed by a user of the device, having a display for displaying a portion of the information and functional portions for manipulating the information; and apparatus for coupling to the device, the apparatus being associated with a user of the device and containing information concerning identity and preferences of the user of the device. The apparatus acts a dock for receiving the device. A method comprising loading information from the apparatus to which the device is coupled so as to customize operation of the device. Information can include at least one of preferences, settings, authorization rights, security codes and programs preferred by a user of the apparatus. Role of the device may change in response to communications hardware for receiving signals indicative of location of the device, which changes roles based on the signals. | 02-05-2009 |
20090044268 | Installation-free chip card reader for secure online banking - In order to use a mobile smartcard reader that can address commercial smartcards conforming to the EMV standard in a simple manner, the invention provides a method for controlling a chip card reader ( | 02-12-2009 |
20090055924 | Trusted records using secure exchange - A secure method and apparatus for data exchange that allows a client's or patient's financial data, medical records, and other information to be stored on a card-shaped compact disk, with multiple levels of encryption to preserve privacy. The trusted record disc can be read on any computer with a network or internet connection, but access to the information on the disc is restricted according to a password protected hierarchical encryption policy. In order to obtain access to the restricted information, an individual user needs to enter a unique password that is sent to a central server. The server confirms the password and returns an electronic key to the user's computer. The electronic key unlocks the encryption and allow the user to view only the information that is permitted (under federal patient, financial privacy or other laws). Thus, in the medical setting, physicians can review the patient's entire medical record and make changes to it. Nurses, pharmacists, and billing clerks have differing predetermined levels of access. | 02-26-2009 |
20090055925 | IMAGE FORMING APPARATUS, METHOD FOR MANAGEMENT OF AUTHENTICATING INFORMATION AND COMPUTER READABLE MEDIUM STORING PROGRAM THEREOF - An information forming apparatus includes: a communication unit that carries out data communication with an authentication card inserted into a card slot; an authentication unit that authenticates that a user who attempts to operate the apparatus is an authorized user by sending entered authenticating information to the authentication card; a storing unit that stores the entered authenticating information; and a process execution unit that, when a process is invoked that requires input of authenticating information to the authentication card, executes the process using the authenticating information stored in the storing unit. | 02-26-2009 |
20090077654 | Approach For Managing Device Usage Data - Techniques are provided for securely managing, using smart cards, the usage of a peripheral device. In one embodiment, both the peripheral device and the smart card have digital certificates and a means for authenticating each other. Each device requires authentication of the other device before access to the device's resources is granted. In one embodiment of the invention, the smart card executes a local Java application for managing usage data. The application provides quota and prior usage data to the peripheral device, and updates on the smart card usage data provided by the peripheral device. The usage data on the smart card is used to limit, audit, or track access to resources and operations on the peripheral device. In another embodiment, the authentication and usage management functions of the smart card is implemented on a remote server. | 03-19-2009 |
20090077655 | PROCESSING HTML EXTENSIONS TO ENABLE SUPPORT OF INFORMATION CARDS BY A RELYING PARTY - A user engages in a transaction with a relying party through a computer system. The relying party requests identity information from the user using HTML extensions. The computer system includes a web browser having browser extensions. The HTML extensions cause the web browser to call a card selector invoker. The card selector invoker invokes a card selector to provide a security token. The card selector invoker extracts identity information from the security token and provides the identity information to the web browser. The computer system then returns the identity information to the relying party. | 03-19-2009 |
20090126010 | USING OBJECT BASED SECURITY FOR CONTROLLING OBJECT SPECIFIC ACTIONS ON A SURFACE BASED COMPUTING DEVICE - The present invention discloses a solution for object level security on a surface based computing device that includes software objects and behavior tokens. The behavior tokens can control an extent that users are able to manipulate the software objects using the surface based computing device. Different levels of control can be established on an object-by-object basis for different users. The extent users are able to manipulate the software objects can also depends upon set of users proximate to the surface based computing device. | 05-14-2009 |
20090150994 | Biometric access control transactions - Aspects and embodiments of the present disclosure provide devices and methods for biometric authentication of a user during access control transactions. In one aspect, an access control processor device, comprising a biometric input sensor configured to receive user biometric information; a biometric verification processor configured to authenticate the input user biometric information; and a communication element configured to activate when the biometric information entered into the biometric verification system is authenticated and maintain an inactive status for the communication element on the payment processor device when the biometric information entered into the biometric verification system is not authenticated. | 06-11-2009 |
20090172812 | TWO FACTOR TOKEN IDENTIFICATION - An apparatus, method and program product allow two factor token authentication in the presence of multiple tokens. When multiple tokens are detected, a user desiring access needs merely to provide a unique biometric identifier, referred to as a capture BIR, and that capture BIR is evaluated against a stored BIR associated with at least one of the tokens to determine if access is to be granted. If there is a match, that user is given access. If not, the capture BIR is evaluated against the stored BIR associated with another of the detected tokens. The process may repeat until either a match is found and the user is granted access, or none is found and access is denied. The foregoing occurs without the user having to input any user ID or the like and without the inconvenience or risk of error associated with selecting a user ID from a list of potential user ID's. | 07-02-2009 |
20090210942 | DEVICE, SYSTEM AND METHOD OF ACCESSING A SECURITY TOKEN - Some demonstrative embodiments of the invention relate to a method, device and system of accessing a security token. One demonstrative embodiment of the invention includes a security token to securely maintain one or more protected resources, the security token including a token application to authenticate a first request to access the protected resources based on user authentication data assigned to a user of the security token, generate an output including an authentication ticket different from the user authentication data, and authenticate a second request to access the protected resources based on the authentication ticket. Other embodiments are described and claimed. | 08-20-2009 |
20090222913 | SYSTEM FOR CONTROLLING SHARED SERVICE RESOURCE, AND METHOD FOR CONTROLLING SHARED SERVICE RESOURCE - An owner code (service-recipient code) assigned to a package, which is an object to which a service is provided by transportation installations or facilities (i.e., shared service resource) including a pickup branch office | 09-03-2009 |
20090300756 | System and Method for Authentication - A system for authentication comprises a mobile unit and a smart card reader. The mobile unit includes a security application that prevents access to functionalities and data stored thereon and further includes an authentication application that securely stores an authentication token. The smart card reader communicatively connects to a smart card. The smart card includes authentication data. The authentication application transmits the authentication token to the smart card reader to verify the smart card. The authentication application shares the authentication token with the security application when the verification is successful. The authentication token indicates to the security application to grant access to the functionalities and the data. | 12-03-2009 |
20090300757 | IMAGE FORMING APPARATUS PERFORMING USER AUTHENTICATION USING A CARD - An image forming apparatus includes an ID acquisition part configured to acquire a card ID readable by a card reader. A correspondence information management part manages correspondence information between the card ID and user identification information. A user information acquisition part acquires the user identification information corresponding to the card ID acquired by the card ID acquisition part from the correspondence information management part, and acquires a password of a user corresponding to the acquired user identification information. An authentication control part causes an authentication process of the user to be executed in accordance with the acquired user identification information and the acquired password. | 12-03-2009 |
20090328203 | PARAMETRIC BASED CONDITIONAL ACCESS CODES FOR ACCESS CONTROL APPLICATIONS - A system and method is disclosed for providing conditional access control using a parametric-based conditional access code. The parametric-based access code is generated by a access grantor, such as a homeowner, parent, employer, rental company, etc., from a set of parameter values associated with an access control device. Such parameters can include date and time, location, purchase amount, type of purchase, etc. Once a parametric-based access code is generated, it can be used by the grantee, i.e., the person seeking access, at the appropriate access control device. The access control device extracts the conditional parameter values and compares them to current parameter values of the access control device. Access is granted only when the conditional parameter values match the current parameter values. | 12-31-2009 |
20100005524 | Determining authorization to manipulate a token - In one embodiment, a method includes determining the authorization of a user to manipulate a token relative to a display device using identification information. | 01-07-2010 |
20100031349 | Method and Apparatus for Secure Data Storage System - A secure storage system includes a storage device having a communication device and a memory. The communication device is for polling a communication medium. A security token is received from the communication medium via the communication device of the storage device. The security token received from the communication medium is compared to a second security token stored on the storage device. In one embodiment, a current location of the storage device is determined. The current location of the storage device is compared to an approved security zone. Access to the memory is provided if the security token received from the communication medium matches the second security token stored on the storage device and the current location of the storage device lies within the approved security zone. A time-out counter is set to a non-zero value after access to the memory is provided. | 02-04-2010 |
20100031350 | IC CARD AUTHENTICATION APPARATUS, IC CARD AUTHENTICATION METHOD, AND RECORDING MEDIUM HAVING IC CARD AUTHENTICATION PROGRAM RECORDED THEREON - An IC card is recognized by an IC card reader. Data is obtained from the recognized IC card. Card ID included in the obtained data is compared with card ID stored in a user registration information DB. If it is determined that the same card ID exists, an IC card issue count included in the obtained data is compared with an IC card issue count stored in the user registration information DB, and it is determined whether the counts are the same. If it is determined that the issue counts are not the same, a PIN code entry window appears so that the entered PIN code is compared with a PIN code in the user registration information DB. If it is determined that the PIN codes are the same, authentication success is displayed. | 02-04-2010 |
20100050251 | SYSTEMS AND METHODS FOR PROVIDING SECURITY TOKEN AUTHENTICATION - Described herein are systems and methods for centralizing and standardizing implementation of security tokens so as to provide one token per one user for accessing business applications across an enterprise, providing scalability to support authentication of as many enterprise users as desired or needed, and providing a standardized token management interface that supports both pre-binding and post-binding user registration processes and different types of security token. | 02-25-2010 |
20100077474 | PHYSICAL ACCESS CONTROL SYSTEM WITH SMARTCARD AND METHODS OF OPERATING - An improved physical access control system has an online portion and an offline portion. A smartcard is configurable to transport access control information between the online portion and offline portion. The smartcard is further configurable to receive an offline reader identifier from an offline reader, and to control access of the smartcard holder to an offline entry/exit point. The smartcard is further configurable to carry a revoked list that is transmitted to each offline reader accessed. Methods of operating the improved physical access control system are also disclosed. | 03-25-2010 |
20100095372 | TRUSTED RELYING PARTY PROXY FOR INFORMATION CARD TOKENS - An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module running on the machine and configured to perform a search for the mapping, a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim, and a transmitter configured to transmit the secret to the remote application. | 04-15-2010 |
20100138916 | Apparatus and Method for Secure Administrator Access to Networked Machines - A secure access method includes generating administrator access security information including a public and private key pair. The administrator access security information is associated with a set of client users assigned to a specified group. Each client user has personal security credentials for accessing a client computer. The administrator access security information is copied to a set of security tokens. The security tokens are distributed. A client computer associated with a client user of the set of client users is accessed by utilizing one of the security tokens instead of personal security credentials for the client computer. | 06-03-2010 |
20100175128 | AUTHENTICATION INFORMATION MANAGEMENT APPARATUS, AUTHENTICATION INFORMATION MANAGEMENT PROGRAM AND METHOD THEREOF, AUTHENTICATION APPARATUS, AND AUTHENTICATION PROGRAM AND METHOD THEREOF - An authentication information management apparatus manages authentication information for execution of authentication in an information processing device by utilizing a terminal device equipped with an IC card and a memory. The apparatus includes an identification information acquisition section that acquires identification information which is written in the IC card, and an authentication information setting section that retrieves stored authentication information corresponding to the identification information from the memory based on the identification information acquired by the identification information acquisition section, and sets up the IC card so that the retrieved authentication information is readable from the IC card. | 07-08-2010 |
20100235906 | METHOD AND APPARATUS FOR ACTIVATE AN AUTHENTICATION ON A MOBILE DEVICE - In accordance with an example embodiment of the present invention, a mobile device comprising: a processor configured to receive security data from a dongle and activate, on the mobile device, at least one of the following: a power supply, an application, or a login based at least in part on the received security data. | 09-16-2010 |
20100269173 | METHOD AND APPARATUS FOR ENFORCING LOGICAL ACCESS SECURITY POLICIES USING PHYSICAL ACCESS CONTROL SYSTEMS - A method and apparatus for providing a security system. The method includes the steps of providing an identity card for use by a person entering a secured area of the security system, reading the identity card at an entry point to the secured area, randomly generating an alphanumeric key upon the occurrence of a predetermined event, writing the alphanumeric key into the identify card at the entry point, reading the card within the secured area as a request for access to a computer and granting access to the computer by the person, but only when an alphanumeric key is found on the card that matches the generated alphanumeric key. | 10-21-2010 |
20100293612 | Secure Authentication - Technologies are generally described for secure authentication tokens that employ hardware public physically unclonable functions. Each unique token can be implemented as hardware such that manufacturing variations provide measurable performance differences resulting in unique, unclonable devices or systems. For example, slight timing variations through a large number of logic gates may be used as a hardware public physically unclonable function of the authentication token. The authentication token can be characterized such that its physical characteristics may be publicly distributed to authenticators. Authenticators may then simulate the result from a particular input vector and then request the authentication token to generate the same result in a very short amount of time. The time may be specified such that the result could not be simulated by an imposter for a timely response. | 11-18-2010 |
20100293613 | SYSTEM AND METHOD FOR CONTACTLESS SMART-CARDS - Embodiments of the invention are concerned with smart-card devices and in one aspect provide a mobile communications device for providing a user with access to information relating to authorized take-up of a service for which authorization is provided using a contactless smart-card device. The device includes a plurality of personal information managers, each having a data store comprising a plurality of data fields. The device is configured to access an interface for receiving data from the smart-card device and a a parser arranged to parse the received data so as to identify content therein and to identify, from the parsed content, content portions corresponding to at least some of said plurality of data fields. An application manager is provided to select a personal information manager on the basis of the identified content; wherein the application manager is arranged to provide the selected personal information manager with said identified content portions so as to update the selected personal information manager with parameters accompanying the taken-up service. | 11-18-2010 |
20100299750 | Method and System for Using Shared Secrets to Protect Access to Testing Keys for Set-Top Box - Certain aspects of a method and system for using shared secrets to protect the access of testing keys for a set-top box may comprise receiving within a security processor within a set-top box a plurality of secret keys from a plurality of users. A password may be generated utilizing secret sharing based on the received plurality of secret keys. The generated password may be compared with a generated response. The plurality of users may be authenticated access to the set-top box based on the comparison. | 11-25-2010 |
20100319066 | METHOD AND APPARATUS FOR SUPPORTING SUBSCRIBER IDENTITY MODULE FEATURES USING A DONGLE - In accordance with an example embodiment of the present invention, an apparatus comprises at least one processor and at least one memory. The at least one memory includes computer program code. Further, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following receive a service subscriber key request from an electronic device; determine a service subscriber key request from a subscriber identity module; and transmit the service subscriber key request to the electronic device. | 12-16-2010 |
20100325723 | SHARED REGISTRATION SYSTEM MULTI-FACTOR AUTHENTICATION - A system and method for establishing a chain of trust from a registrant to a registry. A registrant request to a registrar to change a domain name record includes at least one registrant factor, such as a one time password. The registrar can formulate an extended EPP command that includes the factor to effectuate the change and send it to a registry. The registry can verify the at least one factor using at least one validation server. If the factor is successfully verified, the EPP can be processed by the registry. If the factor is not verified, the EPP command may not be processed and an error message may be generated and sent to the registrar. | 12-23-2010 |
20110030053 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions - A token device that generates and displays one-time passwords and couples to a computer for inputting or receiving data for generating and outputting one-time passwords and performing other functions is provided. The token includes an interface for coupling to a computer. The token may also be coupled to any network that the computer may be connected to, when coupled to the computer. Data and information may be transmitted between the computer and token, and between the network and token, via the computer and interface. The data and information may include one-time password seeding, file transfer, authentication, configuration and programming of the token. The token must be seeded to generate and display one-time passwords. An original, or seed, value is loaded into the token. One-time passwords are subsequently generated or calculated, or both, from the seed value. Seeding of the token involving a counter, time, or time-related functions, may allow synchronization of the token with such functions. The token may support different authentication methods. | 02-03-2011 |
20110041177 | CONTEXT-SENSITIVE INPUT USER INTERFACE - A context-sensitive user input interface may be provided. An application may display a user interface element, such as a text box. The interface may provide suggested action tokens, and may receive a user selection of one of the suggested tokens and/or a text-based input of an action token. The interface may also provide suggested options and/or guidance to the user in entering an application action. The interface may further determine when the user's input comprises a complete action and may provide an execute option to the user for finalizing and executing the action. | 02-17-2011 |
20110078789 | IMAGE FORMING APPARATUS, METHOD FOR CONTROLLING IMAGE FORMING APPARATUS, AND PROGRAM - The purpose of the present invention is to add a user restriction function with use of a card by a simple structure even with an inexpensive image forming apparatus. A CPU of an image forming apparatus determines a port of a signal acquired from a card R/W at the time of initialization of the connected IC card R/W. Then, the CPU of the image forming apparatus controls an execution or a stop of an application for performing authentication service processing corresponding to the port of the signal received from the card R/W. | 03-31-2011 |
20110145917 | METHOD AND SYSTEM FOR FACILITATING MEMORY AND APPLICATION MANAGEMENT ON A SECURED TOKEN - A system for facilitating memory and application management on a smartcard the system includes a client having a number of applications and a smartcard having specification logic allowing file structures and security and access conditions to be defined using a set of common commands. Each application has a corresponding group of data on the smartcard. An applet instance is created for each application and corresponding group of application data. At the time of instantiation, the specification logic allows an application to specify the file structure and/or to specify security and access conditions for its group of data. An application can utilize passcode and credential management so that a single passcode is used to access the smartcard regardless of whether the application utilizes the common commands to specify a file structure. | 06-16-2011 |
20110173694 | Method For Activating Functions Of A Tachograph - A method for activating functions of at least one tachograph having a control unit and an interface. The control unit is activated by a program to perform a first group of functions. First, a connection of an external storage medium to the interface of the at least one tachograph is established. The storage medium has at least one instruction for activating a function, which can be read out by the control unit. An authentication between the external storage medium and the control unit also takes place. The function associated with the at least one instruction is activated in such a way that the function is associated with the first group of the control unit. Next, the connection between the external storage medium and the interface of the at least one tachograph is released. | 07-14-2011 |
20110252471 | Computer System with Electronic Lock - A computer system with electronic lock is presented, which includes an end-user unit and a mobile unit. The end-user unit has a communication port and an identification database coupling with the communication port and storing at least one identification code. The mobile unit has an identifying module with a logging code, with the mobile unit able to connect with the end-user unit through the communication port to connect the identifying module with the identification database of the end-user unit. When the mobile unit is coupled with the end-user unit, the end-user unit catches the logging code and executes an identifying process to determine whether the logging code is one of the at least one identification code in the identification database. | 10-13-2011 |
20110296522 | Systems and Methods for Providing Security Token Authentication - Described herein are systems and methods for centralizing and standardizing implementation of security tokens so as to provide one token per one user for accessing business applications across an enterprise, providing scalability to support authentication of as many enterprise users as desired or needed, and providing a standardized token management interface that supports both pre-binding and post-binding user registration processes and different types of security token. | 12-01-2011 |
20110314539 | Proximity Based Device Security - Devices, systems and methods are disclosed for additional security, functionality, and convenience in the operation of a wireless communication device with the use of a separate proximity security token in communication with the wireless communication device. In exemplary embodiments, the token is carried by the user while device logic is installed on the user's wireless communication device. The device logic along with transceivers allows the device to sense proximity of the token through wireless communication. Given a certain range of the proximity security token, as determined by the wireless signal strength, the device logic determines whether the device is in a locked or unlocked state. If the proximity security token is outside the range, then the device is locked. The proximity security token uses ultra low power communications for optimal battery life. | 12-22-2011 |
20110321158 | GUEST ACCESS TO ADDRESS SPACES OF ADAPTER - An authorization mechanism allows a host executing a guest operating system to grant permission for the guest to directly access an adapter function's address spaces without host intervention. This access is via instructions implemented based on the architecture of the adapter function. The host also has the capability to intervene in the execution of the instruction, if desired. | 12-29-2011 |
20120017273 | APPARATUS AND METHOD FOR IMPROVING THE SECURITY IN PORTABLE COMMUNICATION SYSTEM - An apparatus for improving the security of a portable communication terminal includes: a security card having a plurality of projections provided in a predetermined projection form that is capable of identifying a user; and an authentication managing unit for analyzing the projection form, which is detected through a touch input of the security card, and performing an authentication process using the analyzed outcome. | 01-19-2012 |
20120036575 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 02-09-2012 |
20120102566 | SYSTEM AND METHOD FOR ACCESSING PRIVATE DIGITAL CONTENT - Method for providing access to private digital content owned by an owner and installed on a content server, wherein a content manager server has a number of clients potentially interested in the private content, the method comprising the following steps performed at a content management server being informed that the owner has installed private content on a content server; obtaining a delegate token from the content server; receiving a query for the private digital content from a client of the number of clients of the content management server; providing said client with a token using the delegate token enabling the client to access the private content. | 04-26-2012 |
20120144479 | METHOD FOR AUTHENTICATING A TERMINAL - The invention provides a system, a secure device and a method for authenticating dynamically a host device with a secure device without modifying hardware or basic functional software of the host device. An authentication engine implemented in the secure device allows detecting non-authorized host devices or illegal secure devices environment. The secure device is locally connected to the host device comprising at least one processor configured for handling a plurality of hardware or software parameters defining the functioning behavior of the host device. A memory associated to the processor stores a plurality of reference hardware and software parameters. The secure device monitors the behavior of the host device both in terms of hardware and software. After comparison with the reference parameters, the host device is considered as authentic or authorized only when the values of counters associated to the hardware and software parameters are within an acceptable. | 06-07-2012 |
20120180123 | TRUSTED VENDOR ACCESS - A system is provided and facilitates management of a device by a first entity and management of a third entity by a second entity, wherein by way of the system access rights permitting access otherwise prevented by the device are assignable by the first entity to the second entity, the access rights are able to be administrated by the second entity to the third entity, and the access is obtainable by the third entity using a combination of the access rights and personal identification information to affect the device. | 07-12-2012 |
20120192269 | METHOD FOR REMOTELY CONTROLLING THE EXECUTION OF AT LEAST ONE FUNCTION OF A COMPUTER SYSTEM - A method and a device for remotely controlling the execution of at least one function of a computer system. The method and device are suitable for logging out of a computer application when the user moves a certain distance away from the workstation on which the application is installed. The device includes a mobile identification element ( | 07-26-2012 |
20120260334 | INFORMATION PROCESSING APPARATUS, AUTHENTICATION METHOD, AND COMPUTER PROGRAM - An information processing apparatus includes: a software storing unit that stores software; a storage recognizing unit that recognizes, when a storage having stored therein first authentication information for enabling a function of the software stored in the software storing unit is connected to the information processing apparatus via an interface unit, that the storage is connected and transmits second authentication information uniquely corresponding to the function of the software to be enabled to the storage; and a function managing unit that enables, when the first authentication information and the second authentication information compared by the storage coincide with each other, the function of the software on the basis of a notification informing that the first authentication information and the second authentication information coincide with each other issued by the storage, the storage deleting the first authentication information. | 10-11-2012 |
20120311701 | PROTECTION DEVICE, PROTECTION SOFTWARE, AND PROTECTION METHOD FOR CONTROLLING EXTERNAL DEVICE - A protection device controlling an external device is provided having a mode detector, security data, a data detector, and a controller. The external device operates with operation modes that include a user mode that is used when the external device is operated by a user, and a manufacturer mode that is used when the external device is operated by someone other than the user. The mode detector detects an operation mode of the external device. The security data is input to the protection device. The data detector detects input of the security data. The controller restricts certain functions of the external device when the data detector does not detect input of the security data while the external device is in the manufacturer mode. | 12-06-2012 |
20130036463 | BIOMETRIC-ENABLED SMART CARD - A biometrics-enabled smart card for use in transactional or identity applications (e.g., credit cards and identity cards). The biometric smart card includes a substrate, a biometric sensor capable of reading biometric information through the substrate, and a microprocessor to process, store, and authenticate biometric information. The substrate has a Young's modulus of at least abut 50 GPa and a thickness of up to about 0.5 mm. | 02-07-2013 |
20130061320 | Computer Device with Anti-Tamper Resource Security - A computer device provides an execution environment that supports a plurality of processes. A plurality of key resources are associated with a security application that may perform process elevation to grant privileged access rights to a user process. A security module controls access to the key resources using an access control list. An anti-tamper mechanism creates a protection group as a local security group and adds a deny access control entry to the access control list. The anti-tamper mechanism intercepts the user process and creates a revised access token identifying the user process as a member of the protection group. The security module matches the protection group in the revised access token of the user process against the deny access control entry in the access control list of the key resources thereby restricting access by the user process even though the user process otherwise has privileges to access those resources. | 03-07-2013 |
20130067568 | Resource Access Authorization - Techniques for resource access authorization are described. In one or more implementations, an application identifier is used to control access to user resources by an application. A determination is made whether to allow the application to access the user resources by comparing an application identifier received from an authorization service with a system application identifier for the application obtained from a computing device on which the application is executing. | 03-14-2013 |
20130086675 | INFORMATION PROCESSING APPARATUS AND METHOD OF EXECUTING AN APPLICATION IN THE APPARATUS - An information processing apparatus capable of non-interactively executing an application and an application execution method are disclosed. In response to an issuance request of an access control token, if a user type described in a definition file is included in user types defined in the information processing apparatus, the information processing apparatus issues an access control token in accordance with a user type and executes process by an application, in a case that the user type of the access control token is contained in the user types that have the execution authority for the process by the application. | 04-04-2013 |
20130139251 | ELECTRONIC DEVICE SYSTEM AND ELECTRONIC DEVICE - When a connection device is connected to an SD socket of an electronic device, a process setting unit of the electronic device obtains permission/inhibition information (an output signal) set forth in a permission/inhibition information setting unit of the connection device. Based on the obtained permission/inhibition information, the process setting unit identifies an execution unit whose operation is to be activated among the execution units provided in the electronic device. Then, the process setting unit instructs the identified execution unit to start operation. This realizes operation of execution units in correspondence to the permission/inhibition information. | 05-30-2013 |
20130145459 | Information Processing Device, Control Method and Program - An information processing device, control method and program that suppresses security risks to a minimum. When power is activated, a control component starts by reading a first program from a first memory component and, in observance of the first memory program, it reads the identification information of an authentication device that is mounted to a mounting component, references a table T, and performs authentication processing for the authentication device, with the condition that the count value correspondingly listed for the identification information of the authentication device be larger than a prescribed value and, when authentication processing has succeeded, starts by reading the second program from a second memory component, and in the event that the authentication device continues to be mounted to the mounting component during executing the second program, decreases the table count value corresponding to the unique identification information of the authentication device. | 06-06-2013 |
20130174252 | Secure User Authentication for Bluetooth Enabled Computer Storage Devices - A storage device may be operably coupleable with a host computing device, and the storage device and/or host computing device may be Bluetooth enabled. The storage device may include authentication information. Access to the storage device may be permitted via Bluetooth communication between the Bluetooth enabled device and at least one of the storage device and a host computing device, wherein the Bluetooth enabled device may be within a maximum Bluetooth range of the storage device. The Bluetooth communication may be performed without Bluetooth pairing. | 07-04-2013 |
20130227679 | METHOD FOR ACCESSING AN APPLICATION AND A CORRESPONDING DEVICE - The invention relates to a method for accessing an application. A token includes at least one application that is executable by a device. The token is coupled to the device. The method comprises the following steps. The token sends to the device data for identifying the token and data for authenticating the token. The device analyses whether the token identification data is included within a list of at least one authorized token. Only if the token identification data is included within a list of at least one authorized token, then the device analyses whether the token is authenticated. And only if the device authenticates the token, then the device authorizes to execute the application. The invention also relates to a corresponding device. | 08-29-2013 |
20130298226 | Method and Terminal for Locking/Unlocking Terminal Screen Based on RFID - The disclosure provides a method and a terminal for locking/unlocking a screen of a terminal based on Radio Frequency Identification (RFID). The method includes: the terminal receives locking or unlocking information carrying authentication information from an external electronic tag via an RFID reader; user identity authentication is performed according to the authentication information; and the screen of the terminal is locked or unlocked according to the locking or unlocking information, after the authentication succeeds. With the method and the terminal, user experience can be achieved by waving a mobile phone and the screen can be opened while being unlocked, thus, the user experience of locking/unlocking screen is improved. | 11-07-2013 |
20130312091 | System for Authenticating a User to a Portable Electronic Device Using an Authentication Token Transmitted to a Smart Card Reader - A system includes a mobile unit and a smart card reader. The mobile unit includes a security application that prevents access to functionalities and data stored thereon and further includes an authentication application that securely stores an authentication token. The smart card reader communicatively connects to a smart card. The smart card includes authentication data. The authentication application transmits the authentication token to the smart card reader to verify the smart card. The authentication application shares the authentication token with the security application when the verification is successful. The authentication token indicates to the security application to grant access to the functionalities and the data. | 11-21-2013 |
20140026213 | CARD FOR INTERACTION WITH A COMPUTER - A smart card comprising:
| 01-23-2014 |
20140059676 | SYSTEMS AND METHODS FOR DUAL READER EMULATION - Systems and methods for emulating credentials are disclosed. In some cases, the systems include an access credential reader and an access credential writer. The access credential reader is communicably coupled to the access credential writer. The access credential reader is operable to receive information from an access credential, and to transfer at least a portion of the information to the access credential writer. The access credential writer is operable to transfer at least the portion of the information to an emulation access credential. | 02-27-2014 |
20140101755 | MOBILE WIRELESS COMMUNICATIONS DEVICE PROVIDING SECURITY FEATURES BASED UPON WEARABLE NEAR FIELD COMMUNICATION (NFC) DEVICE AND RELATED METHODS - A system may include at least one wearable near field communication (NFC) device including a carrier capable of being worn adjacent to a hand, a sensor coupled to the carrier and capable of sensing positioning adjacent to the hand, and a first NFC transceiver coupled to the carrier and the sensor. The system may further include a mobile wireless communications device including a second NFC transceiver capable of communicating with the first NFC transceiver, and a processor coupled to the second NFC transceiver and being capable of switching from a security mode to a normal operating mode based upon the sensor sensing positioning adjacent to the hand and the second NEC transceiver establishing NEC communication with the first NEC transceiver. | 04-10-2014 |
20140137235 | Proximity Based Device Security - Devices, systems and methods are disclosed for additional security, functionality, and convenience in the operation of a wireless communication device with the use of a separate proximity security token in communication with the wireless communication device. In exemplary embodiments, the token is carried by the user while device logic is installed on the user's wireless communication device. The device logic along with transceivers allows the device to sense proximity of the token through wireless communication. Given a certain range of the proximity security token, as determined by the wireless signal strength, the device logic determines whether the device is in a locked or unlocked state. If the proximity security token is outside the range, then the device is locked. The proximity security token uses ultra-low power communications for optimal battery life. | 05-15-2014 |
20140137236 | METHOD AND SYSTEM FOR TRANSFERRING REPLICATED INFORMATION FROM SOURCE STORAGE TO DESTINATION STORAGE - Machine implemented method and system for transferring replicated information from a first storage location managed by a storage operating system at a first storage system node and accessible to a client computing system to a second storage location managed by a second storage system node are provided. A resource pool having a plurality of tokens is maintained for authorizing a replication engine to transfer replicated information from the first storage location to the second storage location. The number of available tokens is increased when traffic due to client requests for accessing the first storage location is less than a first threshold level. The number of available tokens is decreased for reducing transfer of information via the replication engine, when latency in responding to the client requests reaches a second threshold value and the traffic due to client requests reaches the first threshold value. | 05-15-2014 |
20140150092 | METHOD AND APPARATUS FOR SECURE CREDENTIAL ENTRY WITHOUT PHYSICAL ENTRY - A method and apparatus are disclosed wherein a portable memory storage device is provided for interfacing with a communications port of the computer system. During operating system start up of the operating system of the computer, fields relating to security of the operating system are prompted for. The portable memory store retrieves from memory therein data for populating said fields and provides same to the computer system mimicking a data entry device other than a portable memory store. | 05-29-2014 |
20140189857 | METHOD, SYSTEM, AND APPARATUS FOR SECURELY OPERATING COMPUTER - The present invention provides a method, system and apparatus for securely operating a computer. The method comprises: obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. By means of the method, current status of an authenticated user who has logged in can be easily learned, and in turn, corresponding security operation is performed; in addition, when a user is performing sensitive operation, it can be confirmed in real time whether the user is an authenticated user who previously logged in, so that security of operating the computer is improved. | 07-03-2014 |
20140215602 | RANGE BASED USER IDENTIFICATION AND PROFILE DETERMINATION - An embodiment includes a main compute node that detects the physical presence of a first user and subsequently loads a profile for the first user. The main compute node may detect the first user's presence based on detecting a first compute node corresponding to the first user. For example, the main compute node may be a desktop computer that detects the presence of the first user's Smart phone, which is nearby the first user. The main compute node may unload the first user's profile when the main compute node no longer detects the first user's presence. Upon detecting a second user's presence, the main computer may load a profile for the second user. The profile may include cookies and/or other identifiers for the second user. The profile may facilitate the second user's navigation of a computing environment (e.g. web pages). Other embodiments are addressed herein. | 07-31-2014 |
20140289844 | Smartcard, Smartcard System and Method for Configuring a Smartcard - According to an aspect of the invention, a smartcard is conceived that comprises at least two pre-installed applications and an application user interface selector, wherein said application user interface selector is arranged to select and configure a specific authentication user interface corresponding to a specific one of the pre-installed applications in dependence on encoded information received from a host application. | 09-25-2014 |
20140289845 | Security Token, Data Processing System and Method of Processing Data - According to an aspect of the invention, a security token is conceived, in particular a smart card, comprising a tactile sensing user interface, wherein said tactile sensing user interface is adapted to capture a stream of position data corresponding to a sequence of positions of a finger engaging with said tactile sensing user interface and representing a stream of input data for a data processing device, said security token being adapted to transmit said stream of position data to a host system for further processing. | 09-25-2014 |
20140317728 | CLOUD KEY DEVICE FOR DATA TRANSMISSION VIA AUDIO INTERFACE - A cloud key device for data transmission via an audio interface has a portable body, designed with a 3D pattern, and is provided with a data transmission end. A data storage chip is set into the portable body to store accounts and passwords. A male audio plug is protruded from the data transmission end, and is electrically connected with the data storage chip such that the stored accounts and passwords could be transmitted via said audio plug. With the cloud key device, the accounts and passwords of the users can be carried conveniently, and said audio plug allows transmission of data by connecting with the standard audio jack of computers and telecom devices, so the accounts and passwords can be directly transmitted to the computers or telecom devices, thus preventing logging by non-keying means, and realizing easier input of de counts and passwords with higher security and applicability. | 10-23-2014 |
20150026799 | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM - An information processing system includes a management unit that manages information of an object that determines at least one of a parent and a child of the object, a receiving unit that receives specification of an authority object that is an object with which authority information is associated and a request of processing that is to be executed by using the authority object, and a determining unit that determines whether to accept the request or not on the basis of results of a comparison between information of an owner object that is an object that approves the authority information and information of an object that is a parent of the authority object. | 01-22-2015 |
20150033330 | COLLECTION AND ANALYSIS OF CUSTOMER DATA FROM APPLICATION PROGRAMMING INTERFACE USAGE - A device may receive a request for analytics information associated with a user device. The device may retrieve application programming interface (API) information associated with the request for analytics information. The API information may include information associated with providing an authorization token and with providing user device information. The device may determine demographic information based on the request for analytics information. The demographic information may be associated with a user of the user device. The device may determine the analytics information based on an analysis of the API information and the demographic information. The device may provide the analytics information. | 01-29-2015 |
20150074800 | MOBILE AUTHENTICATION USING A WEARABLE DEVICE - A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure. | 03-12-2015 |
20150096014 | Function Performing Apparatus and Portable Device - A function performing apparatus includes a function performing unit performing a specific function, a processor, and memory storing computer-readable instructions therein, the computer-readable instructions, when executed by the processor, causing the function performing apparatus to perform, in response to receiving a user authentication information when the user authentication information has been registered in an authentication memory, transitioning a state of the apparatus from a non-permission state to a permission state, registering, in the authentication memory, a device authentication information in association with the user authentication information upon establishing a first connection with a portable device, and transitioning the state of the apparatus from the non-permission state to the permission state when a second connection with the portable device is established and the device authentication information is obtained from the portable device. | 04-02-2015 |
20150096015 | Function Performing Apparatus and Storage Medium - A function performing apparatus includes a function performing unit, an operation unit, a processor and memory. The function performing apparatus receives a first instruction from a portable device, determines whether first authentication information is to be registered in an authentication memory, registers the first authentication information in authentication the memory, transmits the first authentication information, receives a second instruction including the first authentication information from the portable device, changes a state of the function performing apparatus from a non-permission state to a permission state if the second instruction is received while the first authentication information is registered in the authentication memory and changes the state from the non-permission state to the permission state if second authentication information is input to the function performing apparatus by the operation unit while the second authentication information is registered in the authentication memory. | 04-02-2015 |
20150096016 | Processing Apparatus and Storage Medium - A processing apparatus includes a process performing unit, an operation unit, a processor and memory. The processing apparatus receives first identification information from a communication device, acquires second identification information input by the operation unit, determines whether registration of the first and second identification information is permitted, registers registration information in which the first and second identification information are associated, when the first identification information is received after registering the registration information, performs authentication based on the first identification information, and, when the second identification information is acquired after registering the registration information, performs authentication based on the second identification information. In both cases where the authentication has been performed based on the first and second identification information, the process performing unit performs the specific process by using information managed in association with the registration information. | 04-02-2015 |
20150106920 | SYSTEM WITH PHYSICAL DATA AUTHORIZATION - A system for enabling data syncing between a host device and an electronic device includes a first port configured to be coupled to a first electronic device, a second port configured to be coupled to the host device, and a data sync switch coupled to the first port and the second port. The data sync switch is switchable between a first state, in which data communication between the electronic device and the host device is enabled, and a second state, in which data communication between the electronic device and the host device is disabled. The system also includes an authorization device configured to couple to an authorizing physical object and generate an output signal. The data sync switch is in one of the first state and the second state based on the output signal from the authorization device. | 04-16-2015 |
20150121517 | BUNDLE-TO-BUNDLE AUTHENTICATION IN MODULAR SYSTEMS - A bundle-to-bundle authentication process is presented that provides a flexible authentication mechanism to application bundles for accessing the persistence bundle of a modular application and requesting security sensitive data from a database. The modular application comprises a plurality of bundles such as application bundles, connector bundles, persistence bundles, authentication bundles, and so on. During runtime of the modular application, the application bundles and the connector bundles may need access to security protected resources (sensitive data) stored in the database. To access these resources, the application bundles and the connector bundles should authenticate themselves with the persistence bundle. The persistence bundle provides the communication with the database. | 04-30-2015 |
20150128258 | AUTHENTICATION MODE REPORTING - Embodiments relate to systems for, and methods of, reporting authentication failures in a security system that includes a token reader and a host. The authentication failure report may include an identification of the type of authentication failure. | 05-07-2015 |
20150135310 | PERSISTENT AUTHENTICATION USING SENSORS OF A USER-WEARABLE DEVICE - A user-wearable device includes a housing and a band that straps the housing to a portion of a user's body (e.g., wrist). One or more skin contact sensors in and/or on the housing can sense biometric information of a user wearing the device. An authentication module performs or receives results of an authentication determination that compares the sensed biometric information to baseline biometric information to determine whether they match. An on-body detector uses one or more of the sensors to determine whether the device is being worn by a user. After a user is authenticated based on a match between the sensed and baseline biometric information, the authentication module continually concludes that the user is authenticated for at least a period of time, without an additional comparison between sensed and baseline biometric information, if the on-body detector detects that the user-wearable device is still being worn by the user. | 05-14-2015 |
20150143514 | METHODS, APPARATUS, AND SYSTEMS FOR SECURING SIM (SUBSCRIBER IDENTITY MODULE) PERSONALIZATION AND OTHER DATA ON A FIRST PROCESSOR AND SECURE COMMUNICATION OF THE SIM DATA TO A SECOND PROCESSOR - An electronic circuit | 05-21-2015 |
20150150122 | METHOD FOR CONTROLLING SECURITY SYSTEM AND ELECTRONIC DEVICE THEREOF - A first electronic device, a second electronic device and methods for operating the same are provided. The method of the first electronic device includes obtaining wearing status information of a second electronic device which is wearable, and determining a security environment of the first electronic device based on the wearing status information. The method of the second electronic device includes detecting a wearing status of the second electronic device, confirming at least once of a security level and a user profile corresponding to the wearing status, and sending information of the security level or the user profile to a first electronic device. | 05-28-2015 |
20150293563 | MOBILE-COMPUTER SUPPORT APPARATUS - Mobile-computer support apparatus comprises a stand, a dock on the stand for receiving a mobile-computing device such that at least a screen thereof is unobstructed from view, a charging element for charging the mobile-computing device when docked, and a locking mechanism for locking the mobile-computing device to the dock. The locking mechanism includes a retaining element locatable on a housing of the mobile-computing device, so as to be spaced from the screen, and a separate engagement element on or adjacent to the dock which releasably engages the retaining element so that, in use, the mobile-computing device is positively held to the dock. | 10-15-2015 |
20150294102 | METHOD FOR JAVA APPLICATION TO ACCESS INTELLIGENT KEY APPARATUS - A method for a java application to access an intelligent key apparatus. The apparatus comprises: a java application calling a JNI interface; obtaining a corresponding lower level interface function according to a correspondence table of a JNI interface function and the lower level interface function; converting a source parameter list of the JNI interface function into a target parameter list of the corresponding lower level interface function according to the target parameter list of the lower level interface function; calling a lower level interface; accessing an intelligent key apparatus; obtaining a returned result; and returning a value of the returned result to the java application. By means of the method in the present invention, it is not easy to obtain a source code by decompiling a java application, thereby improving the security of the java application accessing an intelligent key apparatus. | 10-15-2015 |
20150339473 | SECURITY APPARATUS SESSION SHARING - An electronic device includes multiple applications that can access a smart card or other security apparatus. A first application that is to use the security apparatus prompts a user for a security string such as a PIN or password. Upon receipt of the PIN or password, the first application unlocks the security apparatus for use. Additionally, the first application receives a token from a security service that interfaces with the security apparatus. The token can be shared by the first application with other applications. For example, the first application can share the token with other trusted applications. The other applications that receive the token can refrain from issuing a prompt for a security string and receiving a response from the user. The token can be used instead of the security string to obtain access to the security apparatus. | 11-26-2015 |
20150347739 | INFORMATION PROCESSING APPARATUS, METHOD FOR CONTROLLING INFORMATION PROCESSING APPARATUS, AND STORAGE MEDIUM - A conventional information processing apparatus which allows simultaneous parallel use by a plurality of users includes a plurality of operation units to receive operations of the respective plurality of users, so that the information processing apparatus can be simultaneously used. Such a configuration is wasteful in terms of equipment, resources, and space. According to an exemplary embodiment of the present invention, an information processing apparatus which allows simultaneous parallel use by a plurality of users includes a single display unit configured to be able to input operation instructions to the information processing apparatus, and a control unit configured to perform display control to display an operation input screen corresponding to a first user and an operation input screen corresponding to a second user on the single display unit in a split display mode or in an alternate display mode. | 12-03-2015 |
20150365237 | USB SECURITY GATEWAY - A USB gateway connected to a plurality of host computers having a USB device port connect to a peripheral device; and a security circuitry. The security circuitry comprises: a pre-qualification microcontroller; a mode select switch connected to the peripheral device port and selectively connecting it to one of: the pre-qualification microcontroller; or to a host selector switch that switches among the plurality of connected host computes. An enumeration and reset detector is connected to the USB peripheral device port to monitor that port and casing the mode select switch to switch back to the pre-qualification microcontroller when the peripheral device is disconnected or reset. The pre-qualification microcontroller is capable of enumerating a connected peripheral device and controlling the gateway according to a table containing lists of: device qualifications, indication of which device can connect to each host, and direction of data flow between host and device. The table of peripheral device qualifications may be field re-programmed. | 12-17-2015 |
20160042169 | Methods and Systems for Determining a User Identity by Analysis of Reflected Radio Frequency Signals Received by an Antenna Array - An exemplary method includes a user identification system associated with a computing device transmitting a radio frequency (“RF”) signal from a transmitting antenna, receiving a plurality of reflected RF signals that are each a reflection of the transmitted RF signal from an external surface of a user, each of the plurality of reflected RF signals received at a separate one of a plurality of sensing antennas, determining an RF signature based on the plurality of reflected RF signals, and determining whether the RF signature matches a reference RF signature. Corresponding methods and systems are also described. | 02-11-2016 |
20160042170 | MOBILE AUTHENTICATION USING A WEARABLE DEVICE - A method of providing a user with an option to access a protected system by satisfying a reduced security measure is disclosed. An attempt by the user to access the protected system is detected. It is detected that a first security token system is within a first proximity to the protected system. Based on the detecting of the attempt by the user to access the protected system and the detecting that the first security token system is within the first proximity, the user is provided with the option to access the protected system by satisfying the reduced security measure. | 02-11-2016 |
20160070893 | ASSET PROTECTION BASED ON REDUNDANTLY ASSOCIATED TRUSTED ENTITLEMENT VERIFICATION - A system and method of managing a plurality of assets by associating a smart card with a compute subsystem by installing a database on the smart card and embedding an identifier of the compute subsystem. The system and method, in turn, may receive a request to access an asset of a compute subsystem; verify that a feature of the database is enabled in response to the request, the feature corresponding to the asset; and grant the access to access the asset upon the verifying of the feature. | 03-10-2016 |
20160085955 | Secure Storing and Offline Transferring of Digitally Transferable Assets - A handheld electronic device enables securely transferring control of a valuable asset associated with a code. The device includes a processor, non-transitory data storage, and a communication component configured to transmit data external to the device. A case houses the components, and is mechanically tamper evident. Software stores within the data storage at least one code, prevents transmission of any code through the communication component without authorization by the user, invalidates the association of a particular code with respect to a particular asset when the software carries out at least one of (i) authorizing transmission of the particular code, and (ii) authenticating a valid transaction using the particular code and authorizing transmission of the digital signature through the communication component. | 03-24-2016 |
20160085956 | TRUSTED DEVICE - A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user. | 03-24-2016 |
20160085977 | TOKEN-BASED SCHEME FOR GRANTING PERMISSIONS - An electronic device comprising: a memory; and at least one processor configured to: install an application by using an installation file associated with the application; grant at least one permission to the application based on a permission setting token that is included in the installation file; and store, in a database, an indication that the application is granted the permission. | 03-24-2016 |
20160098918 | TAMPER DETECTION SYSTEMS AND METHODS FOR INDUSTRIAL & METERING DEVICES NOT REQUIRING A BATTERY - Embodiments of the invention prevent unauthorized access to electronic systems by providing an enclosure with improved intrusion detection around sensitive areas of a secured electronic system. Certain embodiments eliminate the need for constant battery power and yet provide uninterrupted high-security supervision at the device perimeter such that even following a power down event it is possible to determine whether a device has been tampered with, so that appropriate action can be taken. This is especially useful in applications in which batteries are not acceptable. | 04-07-2016 |
20160104006 | METHOD FOR CONTROLLING SECURITY SYSTEM AND ELECTRONIC DEVICE THEREOF - A portable electronic device, a wearable device and methods for operating the same are provided. The portable electronic device includes a display, a communication interface that communicates with a wearable device using wireless short-range communication, and a processor that provides, via the display, a menu for controlling data of the wearable device, receives, via the communication interface, a security status from the wearable device, limits access to at least one item in the menu if the security status corresponds to a first security state, and allows access to the at least one item in the menu if the security status corresponds to a second security state. | 04-14-2016 |
20160117493 | WORKING METHOD OF SMART KEY DEVICE - A working method of a smart key device, in which it includes: power on the smart key device; the smart key device reads Bluetooth module parameters, and determines whether the Bluetooth module parameters are read successfully, if the parameters are read successfully, switch the Bluetooth module to connection state, and execute a next step; if the parameters are not read successfully, execute the next step directly; the smart key device determines whether working voltage is lower than a preset value, if yes, prompt low voltage state, and the device is turned off after a first preset time; if no, the device tests working voltage and waits for an interrupt trigger signal; when the device receives the interrupt trigger signal, enter corresponding interruption according to the interrupt trigger signal, after execute corresponding interrupt processing, exit corresponding interruption and continue to test the working voltage. The present invention can unify interfaces of mobile devices, so as to make mobile payment safer and more convenient. | 04-28-2016 |
20160147985 | IMPLEMENTING EXTENT GRANULARITY AUTHORIZATION PROCESSING IN CAPI ADAPTERS - A method, system and computer program product are provided for implementing block extent granularity authorization processing for a Coherent Accelerator Processor Interface (CAPI) adapter. An Application Client requests authorization to a File from a system processor file system. The file system validates the request, determines the location of each Extent that comprises the File, and requests authorization to each Extent from a System CAPI Authorization manager. The System CAPI Authorization manager requests the CAPI Client manager to assign a Child Client ID and CAPI Server Register range to the requesting Application Client and requests a previously authorized CAPI Parent Client to authorize the Child ID to the list of Extents. The CAPI Parent Client sends a Create Authorizations command to the CAPI Adapter via the Parent's CAPI Server Registers. The CAPI Adapter validates the Parent Authorization Handle and CPI Server Register range for the specific Extent/Command/Resource, and creates an Authorization List by assigning a new Child Authorization Handle for each requested, validated Extent/Command/Resource. The Authorization List and the Child Client ID are returned to the File System. | 05-26-2016 |
20160156472 | Token Authentication for Touch Sensitive Display Devices | 06-02-2016 |
20160156473 | Token Authentication for Touch Sensitive Display Devices | 06-02-2016 |
20160171201 | External Secure Unit | 06-16-2016 |
20160203325 | METHOD FOR PROTECTING AN INTEGRATED CIRCUIT AGAINST UNAUTHORIZED ACCESS | 07-14-2016 |