Multi-use long string authentication keys

    公开(公告)号:US10243740B2

    公开(公告)日:2019-03-26

    申请号:US15604610

    申请日:2017-05-24

    申请人: Terry L. Davis

    发明人: Terry L. Davis

    IPC分类号: H04L9/08 H04L9/32 H04L29/06

    摘要: An authentication system that uses a multi-use long string authentication key to authenticate client device access to protected resources, is presented. The authentication system is based on a shared knowledge of long string authentication key. The authentication key is used as a platform to derive digital signatures for access to protected resources. One or more authentication parameters can be used in combination with the authentication key to derive or validate digital signatures. The one or more authentication parameters can include a key index parameter, a key offset parameter, and a key length parameter. The digital signatures derived from authentication keys can be used to control access to various types of protected resources such as, digital house, a vehicle fob key, a remote garage door opener, a hotel room card key, credit or debit cards magnetic strip or chip, online financial accounts, computer or control systems, or website authentication.

    Multi-use long string authentication keys

    公开(公告)号:US09692598B2

    公开(公告)日:2017-06-27

    申请号:US14821610

    申请日:2015-08-07

    申请人: Terry L. Davis

    发明人: Terry L. Davis

    IPC分类号: H04L9/32 H04L29/06

    摘要: An authentication system that uses a multi-use long string authentication key to authenticate client device access to protected resources, is presented. The authentication system is based on a shared knowledge of long string authentication key. The authentication key is used as a platform to derive digital signatures for access to protected resources. One or more authentication parameters can be used in combination with the authentication key to derive or validate digital signatures. The one or more authentication parameters can include a key index parameter, a key offset parameter, and a key length parameter. The digital signatures derived from authentication keys can be used to control access to various types of protected resources such as, digital house, a vehicle fob key, a remote garage door opener, a hotel room card key, credit or debit cards magnetic strip or chip, online financial accounts, computer or control systems, or website authentication.

    METHODS AND SYSTEMS FOR HIGH SPEED DATA COMMUNICATION
    6.
    发明申请
    METHODS AND SYSTEMS FOR HIGH SPEED DATA COMMUNICATION 有权
    高速数据通信的方法与系统

    公开(公告)号:US20080195259A1

    公开(公告)日:2008-08-14

    申请号:US11672603

    申请日:2007-02-08

    IPC分类号: G06F19/00

    摘要: Methods and systems for transmitting power and digital communication are provided. The method includes communicatively coupling a broadband over power line interface unit to a power conductor of a temporary power cable, communicatively coupling the broadband over power line interface unit to a network access point, electrically coupling the power conductor to a vehicle power receptacle, and transmitting network data between the network and the vehicle, and powering the vehicle simultaneously through the power conductor.

    摘要翻译: 提供了发送功率和数字通信的方法和系统。 该方法包括将电力线接口单元上的宽带通信耦合到临时电力电缆的电力导体,将通过电力线接口单元的宽带通信地耦合到网络接入点,将电力导体电连接到车辆电源插座,以及发送 网络和车辆之间的网络数据,以及通过电源导体同时为车辆供电。

    Collection of value from stored value systems
    7.
    发明授权
    Collection of value from stored value systems 失效
    从储值系统收集价值

    公开(公告)号:US5559887A

    公开(公告)日:1996-09-24

    申请号:US316308

    申请日:1994-09-30

    摘要: A first transfer device receives a first transaction signal from a second transfer device and provides a first certification signal. The second transfer device receives the first certification signal and encrypts it to provide a first encrypted signal. The first transfer device receives the first encrypted signal and encrypts the first certification signal to provide a second encrypted signal. A transaction is verified in accordance with the first and second encrypted signals and stored value is transferred between the first and second transfer devices in accordance with the verifying. A third transfer device, separate from the first and second transfer devices, receives a second transfer signal from a selected one of the first and second transfer devices and provides a second certification signal. The selected transfer device receives the second certification signal and encrypts it to provide a third encrypted signal. The third transfer device receives the third encrypted signal and encrypts the second certification signal to produce a fourth encrypted signal. A transaction is verified in accordance with the third and fourth encrypted signals and stored value is transferred between the first selected transfer device and the third transfer device in accordance with the second verifying.

    摘要翻译: 第一传送设备从第二传送设备接收第一事务信号并提供第一认证信号。 第二传送设备接收第一认证信号并对其进行加密以提供第一加密信号。 第一传送装置接收第一加密信号并加密第一认证信号以提供第二加密信号。 根据第一和第二加密信号验证事务,并且根据验证在第一和第二传送设备之间传送存储的值。 与第一和第二传送设备分离的第三传送设备从第一传送设备和第二传送设备中选择的一个传送设备接收第二传送信号,并提供第二认证信号。 所选择的传送设备接收第二认证信号并将其加密以提供第三加密信号。 第三传送装置接收第三加密信号并加密第二认证信号以产生第四加密信号。 根据第三和第四加密信号验证交易,并且根据第二验证,存储值在第一选择的传送设备和第三传送设备之间传送。

    Shower curtain holder
    8.
    发明授权
    Shower curtain holder 失效
    淋浴窗帘架

    公开(公告)号:US4750243A

    公开(公告)日:1988-06-14

    申请号:US790203

    申请日:1985-10-22

    申请人: Terry L. Davis

    发明人: Terry L. Davis

    IPC分类号: A44C7/00 A47H15/04 A43C11/08

    摘要: An hollow sphere, in accordance with the preferred embodiment of the invention, has a slot formed on a somewhat less than semicircular portion of the great circle that separates the sphere into two hemispheres. A shower curtain grommet support is spaced inwardly of said slot to engage a shower curtain grommet and support a portion of the curtain. A pair of diametrically aligned small circles in the plane of hemispherical separation enables the holder to move freely on a shower curtain rod.

    摘要翻译: 根据本发明的优选实施例的中空球具有形成在将圆球分成两个半球的大圆的略小于半圆形部分上的狭槽。 浴帘垫圈支撑件与所述狭槽的内部间隔开以接合淋浴帘密封垫并支撑帘幕的一部分。 在半球形分离平面中的一对直径对齐的小圆圈使得支架能够在浴帘杆上自由移动。

    Methods and systems for high speed data communication
    9.
    发明授权
    Methods and systems for high speed data communication 有权
    用于高速数据通信的方法和系统

    公开(公告)号:US07893557B2

    公开(公告)日:2011-02-22

    申请号:US11672603

    申请日:2007-02-08

    IPC分类号: G06F19/00

    摘要: Methods and systems for transmitting power and digital communication are provided. The method includes communicatively coupling a broadband over power line interface unit to a power conductor of a temporary power cable, communicatively coupling the broadband over power line interface unit to a network access point, electrically coupling the power conductor to a vehicle power receptacle, and transmitting network data between the network and the vehicle, and powering the vehicle simultaneously through the power conductor.

    摘要翻译: 提供了发送功率和数字通信的方法和系统。 该方法包括将电力线接口单元上的宽带通信耦合到临时电力电缆的电力导体,将通过电力线接口单元的宽带通信地耦合到网络接入点,将电力导体电连接到车辆电源插座,以及发送 网络和车辆之间的网络数据,以及通过电源导体同时为车辆供电。

    Transaction authentication over independent network
    10.
    发明申请
    Transaction authentication over independent network 审中-公开
    独立网络进行事务认证

    公开(公告)号:US20090106138A1

    公开(公告)日:2009-04-23

    申请号:US12288660

    申请日:2008-10-22

    IPC分类号: G06Q20/00

    摘要: A method of authenticating an online transaction over a first network uses 2-factor authentication of the user to defeat hacker attacks. A communication device is registered for use with the method. The communication device is configured to receive messages over a second network independent of the first network. The user is authenticated over the first network using a first factor, such as a username and password, and then initiates the transaction. A request to execute the transaction is received and a one-time password is obtained to be used as a second factor of authentication. The one-time password and details describing the transaction are sent to the communication device over the second network. The one-time password is received from the user over the first network to complete the second factor of authentication.

    摘要翻译: 通过第一网络认证在线交易的方法使用用户的双因素认证来击败黑客攻击。 登记通信装置与该方法一起使用。 通信设备被配置为在独立于第一网络的第二网络上接收消息。 使用第一个因素(如用户名和密码)通过第一个网络对用户进行身份验证,然后启动该事务。 接收到执行交易的请求,并且获得一次性密码以用作第二认证因素。 描述交易的一次性密码和细节通过第二个网络发送到通信设备。 通过第一个网络从用户接收一次性密码,以完成第二个认证因素。