Matches 1 - 50 out of 168 1 2 3 4 >


Match Document Document Title
US20140068271 METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION  
This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a...
US20120096279 PROBLEM-BASED ACCOUNT GENERATION  
A method to provide problem-based access to a computing device is disclosed herein. In one embodiment of the invention, such a method includes detecting a problem on a computing device. The method...
US20140052995 DYNAMIC TOKEN SEED KEY INJECTION AND DEFORMATION METHOD  
The present invention discloses a dynamic token seed key injection and deformation method. The method comprises steps of: generating in advance an initial seed key for a token and injecting the...
US20110276495 ONE-TIME USE PASSWORD SYSTEMS AND METHODS  
According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method...
US20110179282 INTEGRITY PROTECTED SMART CARD TRANSACTION  
Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client....
US20100318807 SYSTEM AND METHOD FOR GENERATING A DISGUISED PASSWORD BASED ON A REAL PASSWORD  
A system and method for generating a disguised password are provided. The method presets a real password via an input device, selects one or more characters from the real password as a...
US20150012755 Cryptographic Passcode Reset  
This invention provides a novel method, system, and apparatus allowing an authorized user access to controlled assets when a passcode method malfunctions, such as when a user forgets a password, a...
US20140330726 SMART CARD WITH VERIFICATION MEANS  
The present invention is directed to a smartcard that enables a one-time pin code offline security authentication with a card reader. This is achieved by generating a one-time pin code when the...
US20140365780 SYSTEM AND METHODS FOR ONE-TIME PASSWORD GENERATION ON A MOBILE COMPUTING DEVICE  
A method for a mobile computing device comprises downloading a one-time password initializer from an authentication server, the one-time password initializer configured to generate a...
US20120221862 Multifactor Authentication System and Methodology  
A system is provided for authenticating a user who is accessing a secure network from a client device. The system comprises a software program resident on the client device, wherein said program...
US20150263856 PASSWORD ENCRYPTION FOR CONTROLLING ACCESS TO ELECTRONIC CONTROL UNITS  
A method of providing access to a password-protected electronic control unit (ECU) using encryption includes generating a cryptographic key for the ECU using a master password, a serial number of...
US20120144203 Authenticating a User with Hash-Based PIN Generation  
Systems and methods for authenticating a user of a service are disclosed. A Personal Identification Number (PIN) is generated using a plurality of variables, and a user is authenticated by...
US20150082046 PASSWORD GENERATION AND RETRIEVAL SYSTEM  
The present invention seeks to meet these needs by providing a password generation and retrieval system (PGRS) that generates encrypted passwords with a computer program using an algorithm that...
US20130061057 AUTHENTICATION METHOD AND DEVICE  
The present invention describes a method for authenticating a user of a mobile device by a verification authority, by making use of at least a personal identification number (PIN) and at least one...
US20050235158 Enhanced extension mobility  
In one embodiment, a method for enhanced extension mobility includes accessing user input indicating either a desire of a user to logon at an endpoint in a private mode according to which the...
US20080301462 SYSTEM FOR PROTECTING A USER'S PASSWORD  
The present invention relates to a system for protecting a password. A system for providing a protectable password including a storage device, an input mechanism for entering a protectable...
US20130332741 KEY CAMOUFLAGING USING A MACHINE IDENTIFIER  
A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user...
US20070143624 Client-side captcha ceremony for user verification  
A facility for performing a local human verification ceremony to obtain user verification is provided. Upon determining that user verification is needed to perform an action on a computer system,...
US20140223190 WEB-BASED SECURITY AUTHENTICATION  
A method and system for performing a security authentication. A name of a user, N sequences of digits, and encrypted values respectively corresponding to the digits in the N sequences are...
US20060230283 Changing passwords with failback  
Changing a user's current password for accessing a computer resource, including establishing a provisional password for the user for accessing the computer resource and replacing the user's...
US20070016804 PASSWORD MANAGEMENT SYSTEM  
A password management system is based on a complex password format having two portions, a first portion which stays the same and a second portion which can be regularly updated. The first portion...
US20140164781 SYSTEM AND METHOD FOR GENERATING ONE-TIME PASSWORD FOR INFORMATION HANDLING RESOURCE  
In accordance with embodiments of the present disclosure, a method may include generating a random number to be associated with an information handling resource. The method may also include...
US20070101151 Specifying a set of forbidden passwords  
Various embodiments are described for providing password approval on a device. The password approval includes getting the user password, generating at least one symbolically equivalent password...
US20060179323 Method for substitution of prompts for an encrypting pin device  
After receiving a general display command, an encrypting PIN device recognizes whether the received command corresponds to an expected prompt stored in the device. Afterward, an approved prompt is...
US20110113237 KEY CAMOUFLAGING METHOD USING A MACHINE IDENTIFIER  
A method is provided for generating a human readable passcode to an authorized user including providing a control access datum and a PIN, and generating a unique machine identifier for the user...
US20100241865 One-Time Password System Capable of Defending Against Phishing Attacks  
A one-time password system capable of defending against on-line phishing attacks. The one-time password system is composed mainly of a Java smart card, a pre-end password calculation module, a...
US20060059362 Automated password reset via an interactive voice response system  
A method for resetting Internet access account passwords can include the step of connecting a user with an interactive voice response system (IVR). At least one access account associated with the...
US20060129837 Security device for home network and security configuration method thereof  
A security device for a home network and a security configuration method thereof. The security device for the home network includes a user interface to send at least one request signal that...
US20130151859 KEY AND METHOD FOR ENTERING COMPUTER RELATED PASSWORDS VIA A MNEMONIC COMBINATION  
A key for entering computer related passwords via a mnemonic combination includes an electronic key with a communication means, a computer program, a storage unit, and a user interface. The...
US20080184036 PASSWORD AUTHENTICATION VIA A ONE-TIME KEYBOARD MAP  
A static password is converted into a One-Time Authenticator (OTA) in accordance with a one-time keyboard map. The one-time keyboard map is generated in accordance with a nonce and a secret shared...
US20100185870 Method and System for Managing a Hierarchy of Passwords  
A method and system manage a hierarchy of passwords for users accessing a hierarchy of access control devices. First, a codeword is acquired and a syndrome of the codeword is determined. Next, the...
US20100042848 Personalized I/O Device as Trusted Data Source  
Personalized input/output (I/O) device as trusted credential source is described. According to one exemplary embodiment of the invention, a personalized I/O device used as trusted credential...
US20110055586 Secure PIN Character Retrieval and Setting Using PIN Offset Masking  
Securely disclosing a personal identification number (“PIN”) associated with a financial account to an account holder and receiving a new PIN from the account holder. A PIN reveal application can...
US20080209222 METHOD OF CREATING PASSWORD SCHEMES FOR DEVICES  
A method of creating a password scheme for a mobile device includes partitioning a storage space on the mobile device into a public portion and a secure portion and encrypting access to the secure...
US20140040629 OTP GENERATION USING A CAMOUFLAGED KEY  
A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to...
US20110060913 OTP GENERATION USING A CAMOUFLAGED KEY  
A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to...
US20100115253 METHOD AND SYSTEM FOR SECURELY DISTRIBUTING CONTENT  
A system for securely distributing content is provided. A distribution system includes a content server that distributes content to content clients via a communications link or a tangible medium....
US20100162377 MASS STORAGE DEVICE WITH AUTOMATED CREDENTIALS LOADING  
A portable mass storage device for use in two factor authentication systems and methods. A secure portable mass storage device protects content from being freely copied with security mechanisms...
US20060156026 Password encryption key  
A password-encrypted key (PEK) is generated from a user-supplied password or other identifyting data and then used to encrypt the user's password. The encrypted password is stored in a user record...
US20050108550 Method for administering presence information in a telecommunication and/or data network  
A method for administering presence information in a telecommunication and/or data network, especially for performing a service based on presence information. Administration data for an...
US20050144462 Triple length passwords composed of memorizeable synthetic and natural pronounceable words  
This paper introduces a design of a longer than normal, vastly more secure, password, which is composed of smaller pronounceable words, enabling the password to be easily memorized. The password...
US20100058068 Secure PIN Character Retrieval and Setting  
Disclosing a secure personal identification number (“PIN”) associated with a financial account to an account holder. A PIN reveal application can interact with a hardware security module (“HSM”)...
US20060026438 Anonymous aliases for on-line communications  
Generation of anonymous aliases for on-line communications is described. In response to a user input to generate an anonymous alias, the anonymous alias is generated and associated with an...
US20150149787 CLIENT-BASED AUTHENTICATION  
Apparatus, systems, and methods may operate to invoke multiple authentication mechanisms, by a client node, to encrypt N split-keys using credentials associated with corresponding ones of the...
US20070245149 Method for obtaining meaningless password by inputting meaningful linguistic sentence  
In a method for inputting a long sentence into a conversion function to generate an account password, the long sentence is used as an input seed, and the seed is inputted into a pseudorandom...
US20110099384 STRONG AUTHENTICATION TOKEN USABLE WITH A PLURALITY OF INDEPENDENT APPLICATION PROVIDERS  
The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output...
US20090249066 Method for Safe Operation and A System Thereof  
The present invention relating to computer security field provides a method for safe operation and a system thereof. The method includes: loading the compressed kernel of a safe operating system...
US20050166061 Generation and managenent if customer pin's  
A method for securely generating a PIN comprises generating a number of random binary bits; determining the least significant bits of the number of bits; converting the least significant bits to a...
US20130046993 Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption  
A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated...
US20050149739 PIN verification using cipher block chaining  
A PIN verification apparatus comprises a plurality of cipher blocks linked in a Cipher Block Chain (CBC) and keyed with a secret PIN Verification Key (PVK). A first input block is coupled to a...

Matches 1 - 50 out of 168 1 2 3 4 >