Patent application number | Description | Published |
20100187135 | Bag with Leak Resistant Features - A bag with flexible sidewalls defining an interior volume is provided with leak resistant features that function to absorb and retain liquids. These features include an absorbent-adhesive mixture that may be made from an adhesive and absorbent agents such as a super absorbent polymer. The absorbent-adhesive mixture can be applied on an inner surface of the flexible sidewalls in a location where it is likely to encounter liquids. The leak resistant features can also include a substrate that may be made from a non-woven material that is also applied to the inner surface of the sidewall and can be bonded to the sidewall by the absorbent-adhesive. In various embodiments, the bag can also include odor neutralizing features and/or configured with stretchable sidewalls. | 07-29-2010 |
20110139657 | Absorbent Article Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Article - An absorbent article is disclosed having a topsheet, a backsheet joined with the topsheet, an absorbent core disposed between the topsheet and the backsheet, and a synthetic superabsorbent polymer derived from a first renewable resource via at least one intermediate compound, wherein said superabsorbent polymer exhibits a defined Saline Flow Conductivity value and Absorption Against Pressure value. Alternately, an absorbent article is disclosed having a synthetic polyolefin derived from a first renewable resource via at least one intermediate compound. The synthetic polyolefin exhibits defined performance characteristics making the polyolefin particularly useful in certain components of the absorbent article. Methods for making the aforementioned absorbent articles are also disclosed. | 06-16-2011 |
20110139658 | Absorbent Article Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Article - An absorbent article is disclosed having a topsheet, a backsheet joined with the topsheet, an absorbent core disposed between the topsheet and the backsheet, and a synthetic superabsorbent polymer derived from a first renewable resource via at least one intermediate compound, wherein said superabsorbent polymer exhibits a defined Saline Flow Conductivity value and Absorption Against Pressure value. Alternately, an absorbent article is disclosed having a synthetic polyolefin derived from a first renewable resource via at least one intermediate compound. The synthetic polyolefin exhibits defined performance characteristics making the polyolefin particularly useful in certain components of the absorbent article. Methods for making the aforementioned absorbent articles are also disclosed. | 06-16-2011 |
20110139659 | Absorbent Article Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Article - An absorbent article is disclosed having a topsheet, a backsheet joined with the topsheet, an absorbent core disposed between the topsheet and the backsheet, and a synthetic superabsorbent polymer derived from a first renewable resource via at least one intermediate compound, wherein said superabsorbent polymer exhibits a defined Saline Flow Conductivity value and Absorption Against Pressure value. Alternately, an absorbent article is disclosed having a synthetic polyolefin derived from a first renewable resource via at least one intermediate compound. The synthetic polyolefin exhibits defined performance characteristics making the polyolefin particularly useful in certain components of the absorbent article. Methods for making the aforementioned absorbent articles are also disclosed. | 06-16-2011 |
20110139662 | Absorbent Article Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Article - An absorbent article is disclosed having a topsheet, a backsheet joined with the topsheet, an absorbent core disposed between the topsheet and the backsheet, and a synthetic superabsorbent polymer derived from a first renewable resource via at least one intermediate compound, wherein said superabsorbent polymer exhibits a defined Saline Flow Conductivity value and Absorption Against Pressure value. Alternately, an absorbent article is disclosed having a synthetic polyolefin derived from a first renewable resource via at least one inteimediate compound. The synthetic polyolefin exhibits defined performance characteristics making the polyolefin particularly useful in certain components of the absorbent article. Methods for making the aforementioned absorbent articles are also disclosed. | 06-16-2011 |
20110152812 | Absorbent Article Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Article - An absorbent article is disclosed having a topsheet, a backsheet joined with the topsheet, an absorbent core disposed between the topsheet and the backsheet, and a synthetic superabsorbent polymer derived from a first renewable resource via at least one intermediate compound, wherein said superabsorbent polymer exhibits a defined Saline Flow Conductivity value and Absorption Against Pressure value. Alternately, an absorbent article is disclosed having a synthetic polyolefin derived from a first renewable resource via at least one intermediate compound. The synthetic polyolefin exhibits defined performance characteristics making the polyolefin particularly useful in certain components of the absorbent article. Methods for making the aforementioned absorbent articles are also disclosed. | 06-23-2011 |
20120152794 | Sustainable Wipes Products And Methods Of Forming Same - A wipes product includes a wipes container filled with at least one wipe substrate. The wipes container is formed at least partially from a first polymer and the first polymer is synthetic and at least partially derived from a renewable resource via a first intermediate monomeric compound. The wipes container includes a lid and a base such that at least one of the lid and the base comprises a bio-based content of about 10% to about 100% using ASTM D6866-10, method B. Methods of forming a wipes product are also provided. | 06-21-2012 |
20120272468 | Oral Care Device Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Device - An oral care device is disclosed including a body. The body is formed at least partially from a first polymer and the first polymer is synthetic and at least partially derived from a renewable resource via a first intermediate monomeric compound. The body includes one or more components such that at least one component of the body has a bio-based content of about 10% to about 100% using ASTM D6866-10, method B. Methods of forming oral care devices are also provided. | 11-01-2012 |
20130313149 | Absorbent Article Comprising A Synthetic Polymer Derived From A Renewable Resource And Methods Of Producing Said Article - An absorbent article is disclosed having a topsheet, a backsheet joined with the topsheet, an absorbent core disposed between the topsheet and the backsheet, and a synthetic superabsorbent polymer derived from a first renewable resource via at least one intermediate compound, wherein said superabsorbent polymer exhibits a defined Saline Flow Conductivity value and Absorption Against Pressure value. Alternately, an absorbent article is disclosed having a synthetic polyolefin derived from a first renewable resource via at least one intermediate compound. The synthetic polyolefin exhibits defined performance characteristics making the polyolefin particularly useful in certain components of the absorbent article. Methods for making the aforementioned absorbent articles are also disclosed. | 11-28-2013 |
20130333327 | Sustainable Wipes Products And Methods Of Forming Same - A wipes product includes a wipes container filled with at least one wipe substrate. The wipes container is formed at least partially from a first polymer and the first polymer is synthetic and at least partially derived from a renewable resource via a first intermediate monomeric compound. The wipes container includes a lid and a base such that at least one of the lid and the base comprises a bio-based content of about 10% to about 100% using ASTM D6866-10, method B. Methods of forming a wipes product are also provided. | 12-19-2013 |
Patent application number | Description | Published |
20090165109 | CONTROLLED AND CLIENT-SIDE AUTHENTICATION MODULE - A computerized method of accessing a secure resource using an application associated with a user's computing device is provided. The application is programmed, in part, to monitor user browsing activity and wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key. The method includes the application detecting a user attempt to log into a secure resource, the application scanning in-process browser processes to identify a browser process that is in a login state, the application associating the browser process in a login state with one of the trusted sites, the application initiating a new browser session with the trusted site using the associated predefined URL, the application obtaining a login password from the user, the application supplying to the trusted site the associated security key and login password, and the user's computer displaying subsequent browsing activity. | 06-25-2009 |
20110060913 | OTP GENERATION USING A CAMOUFLAGED KEY - A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP. | 03-10-2011 |
20110113237 | KEY CAMOUFLAGING METHOD USING A MACHINE IDENTIFIER - A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user machine. The method further includes modifying the controlled access datum, encrypting the controlled access datum using the PIN and/or a unique machine identifier to camouflage the datum, and generating a passcode using the camouflaged datum and the PIN and/or the unique machine identifier. A mobile user device may be used to execute the method in one embodiment. The passcode may be used to obtain transaction authorization and/or access to a secured system or secured data. The unique machine identifier may be defined by a machine effective speed calibration derived from information collected from and unique to the user machine. | 05-12-2011 |
20110202984 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 08-18-2011 |
20120066504 | METHODS, APPARATUS AND SYSTEMS FOR SECURING USER-ASSOCIATED PASSWORDS USED FOR IDENTITY AUTHENTICATION - Methods, apparatus and systems for securing user-associated passwords used in transactions are disclosed. The methods include a user computing device receiving a user-associated password such as a PIN from a user, where the user-associated password is operable to authenticate an identity of a user. The user-associated password may be received in response to the user receiving a request for the user-associated password from a third party such as a merchant. The user computing device may generate a temporary password such as a one-time password, dynamic password, or the like, and encrypt the user-associated password using the temporary password. The encrypted user-associated password may then be communicated to the third party in lieu of the user-associated password received by the user. | 03-15-2012 |
20120233675 | AUTHENTICATION WITH MASSIVELY PRE-GENERATED ONE-TIME PASSWORDS - Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from time to time. It utilizes recent availability of data storage capacity not previously exploited in this arena. Also disclosed is the means to initialize and modify the system (all principals) in a secure manner, and the means to store the OTP production means on a device in a secure manner, even if the device has no built-in protected storage. | 09-13-2012 |
20130332741 | KEY CAMOUFLAGING USING A MACHINE IDENTIFIER - A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user machine. The method further includes modifying the controlled access datum, encrypting the controlled access datum using the PIN and/or a unique machine identifier to camouflage the datum, and generating a passcode using the camouflaged datum and the PIN and/or the unique machine identifier. A mobile user device may be used to execute the method in one embodiment. The passcode may be used to obtain transaction authorization and/or access to a secured system or secured data. The unique machine identifier may be defined by a machine effective speed calibration derived from information collected from and unique to the user machine. | 12-12-2013 |
20140068271 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 03-06-2014 |
Patent application number | Description | Published |
20090138944 | METHOD AND APPARATUS FOR CAMOUFLAGING OF DATA, INFORMATION AND FUNCTIONAL TRANSFORMATIONS - A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a generalized camouflaging technique. The secured object need not be stored in the system, not even in encrypted form. Instead, the technique employs a composition function that regenerates the secured object when one inputs a valid password (which may be any computer-representable information held by a user). By regenerating the secured object each time a valid password is entered, there is no need to store the secured object. If one inputs an invalid password, the technique may generate an incorrect object, such that the user is unable to distinguish this incorrect object from the secured object. If the user tries to use the incorrect object, the user can be exposed as unauthorized, without the user's knowledge that he has been exposed. | 05-28-2009 |
20130214043 | ENCODED PICTURE IDENTIFICATION - An identification device includes a computer readable code. The computer readable code includes data relating to one or more pictures of a person and identity data for the person. The computer readable code is readable by a device reader, and the device reader is configured to interpret the computer readable code and to display the picture of the person using the computer readable code data relating to the picture of the person. | 08-22-2013 |
20130326604 | RHYTHM-BASED AUTHENTICATION - Provided herein are systems and methods for using rhythm to provide user authentication. Use of the systems and methods herein include converting rhythm information associated with (e.g., input by) an authorized user to a first vector that includes a representation of the rhythm information. An access attempt is then made on the computing system whereupon additional rhythm information associated with the access attempt is received and converted into to a second vector. The first vector is then compared to the second vector to determine if the access attempt is allowed. | 12-05-2013 |
20140040629 | OTP GENERATION USING A CAMOUFLAGED KEY - A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP. | 02-06-2014 |
20150019442 | PRE-GENERATION OF SESSION KEYS FOR ELECTRONIC TRANSACTIONS AND DEVICES THAT PRE-GENERATE SESSION KEYS FOR ELECTRONIC TRANSACTIONS - Methods and devices for pre-generating session keys for securing transactions are provided. A plurality of session cryptographic keys are generated from a master cryptographic key and a respective plurality of possible values of a transaction counter. The session cryptographic keys are encrypted to provide a plurality of encrypted session cryptographic keys, which are stored in the user terminal. The master cryptographic key is deleted from the user terminal after the session keys are generated. To secure a transaction, a cryptogram is generated based on one of the encrypted session cryptographic keys and transaction data for the transaction, and the cryptogram is transmitted to a transaction terminal. The transaction counter is updated, and the encrypted session cryptographic key is deleted from the user terminal. | 01-15-2015 |