RESET-TOLERANT AUTHENTICATION DEVICE
    1.
    发明申请
    RESET-TOLERANT AUTHENTICATION DEVICE 有权
    复位认证设备

    公开(公告)号:US20080320555A1

    公开(公告)日:2008-12-25

    申请号:US11766301

    申请日:2007-06-21

    IPC分类号: G06F7/04

    CPC分类号: G06F21/34

    摘要: An authentication device comprises a processor having a reset input, a trigger source coupled to the reset input of the processor, and interface circuitry for outputting codes generated by the processor. The trigger source may comprise, for example, a trigger button having an associated switch that when actuated supplies a reset to the reset input. The processor is configured to analyze a given reset applied to the reset input to determine if the reset is an inadvertent reset or a reset generated by the trigger source. The processor generates a code responsive to the reset if the reset is determined to be a reset generated by the trigger source. The code may be supplied to a host device which communicates the code to an authentication server for authentication.

    摘要翻译: 认证装置包括具有复位输入的处理器,耦合到处理器的复位输入的触发源,以及用于输出由处理器产生的代码的接口电路。 触发源可以包括例如具有关联开关的触发按钮,当被致动时,触发源将复位提供给复位输入。 处理器被配置为分析施加到复位输入的给定复位以确定复位是否是无意的复位或由触发源产生的复位。 如果复位被确定为由触发源产生的复位,则处理器产生响应于复位的代码。 该代码可以被提供给将代码传送给认证服务器进行认证的主机设备。

    Reset-tolerant authentication device
    2.
    发明授权
    Reset-tolerant authentication device 有权
    容错认证设备

    公开(公告)号:US08046596B2

    公开(公告)日:2011-10-25

    申请号:US11766301

    申请日:2007-06-21

    IPC分类号: G06F1/32

    CPC分类号: G06F21/34

    摘要: An authentication device comprises a processor having a reset input, a trigger source coupled to the reset input of the processor, and interface circuitry for outputting codes generated by the processor. The trigger source may comprise, for example, a trigger button having an associated switch that when actuated supplies a reset to the reset input. The processor is configured to analyze a given reset applied to the reset input to determine if the reset is an inadvertent reset or a reset generated by the trigger source. The processor generates a code responsive to the reset if the reset is determined to be a reset generated by the trigger source. The code may be supplied to a host device which communicates the code to an authentication server for authentication.

    摘要翻译: 认证装置包括具有复位输入的处理器,耦合到处理器的复位输入的触发源,以及用于输出由处理器产生的代码的接口电路。 触发源可以包括例如具有关联开关的触发按钮,当被致动时,触发源将复位提供给复位输入。 处理器被配置为分析施加到复位输入的给定复位以确定复位是否是无意的复位或由触发源产生的复位。 如果复位被确定为由触发源产生的复位,则处理器产生响应于复位的代码。 该代码可以被提供给将代码传送给认证服务器进行认证的主机设备。

    Secure seed provisioning
    4.
    发明授权
    Secure seed provisioning 有权
    安全种子配置

    公开(公告)号:US08060750B2

    公开(公告)日:2011-11-15

    申请号:US11824434

    申请日:2007-06-29

    IPC分类号: G06F21/00

    摘要: A technique is utilized in the configuration and seeding of security tokens at third party facilities, particularly at facilities of a configuration agent, such that a token can be configured without the configuration agent having security-defeating knowledge about the token. Such a technique allows a third party to provision a token with a seed, but in such a way that the third party will not know, or be able to construct, the seed after the seed provisioning process is complete. The seed may include, by way of example, a symmetric key or other secret shared by two or more entities. In some arrangements, a method is used for secure seed provisioning. Data is derived from inherent randomness in a token or other authentication device. Based on the data, the token or other authentication device is provisioned with a seed.

    摘要翻译: 在第三方设施,特别是在配置代理的设施处,配置和种子安全令牌的技术被使用,使得可以配置令牌,而没有配置代理具有关于令牌的安全性破坏的知识。 这种技术允许第三方提供具有种子的令牌,但是使得第三方在种子提供处理完成之后将不知道或能够构建种子。 作为示例,种子可以包括由两个或多个实体共享的对称密钥或其他秘密。 在一些安排中,一种方法用于安全种子供应。 数据来源于令牌或其他认证设备中的固有随机性。 基于这些数据,令牌或其他认证设备被提供一个种子。

    Authentication involving authentication operations which cross reference authentication factors
    5.
    发明授权
    Authentication involving authentication operations which cross reference authentication factors 有权
    涉及认证操作的认证交叉参考认证因素

    公开(公告)号:US08925058B1

    公开(公告)日:2014-12-30

    申请号:US13434257

    申请日:2012-03-29

    IPC分类号: G06F7/04 G06F15/16

    摘要: A technique of authenticating a person involves obtaining, during a current authentication session to authenticate the person, a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input. The technique further involves performing an authentication operation which cross references the first authentication factor with the second authentication factor. The technique further involves outputting, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter. Such authentication, which cross references authentication factors to leverage off of their interdependency, provides stronger authentication than conventional naïve authentication.

    摘要翻译: 认证人的技术涉及在当前身份认证会话期间从人员获得第一认证因子和从人员获得第二认证因素,所述第一和第二认证因素中的至少一个是生物特征输入。 该技术还涉及执行认证操作,该认证操作以第二认证因素交叉引用第一认证因素。 该技术还包括作为认证操作的结果,输出一个认证结果信号,该认证结果信号指示认证操作是否已经确定当前认证会话中的人可能是合法的或冒牌者。 这种认证交叉引用认证因素以利用其相互依赖性,提供比传统初始认证更强大的认证。

    Generating authentication codes
    6.
    发明授权
    Generating authentication codes 有权
    生成验证码

    公开(公告)号:US08756666B1

    公开(公告)日:2014-06-17

    申请号:US12241166

    申请日:2008-09-30

    IPC分类号: G06F21/00

    CPC分类号: G06F21/34

    摘要: Authentication codes associated with an entity are generated. A stored secret associated with an entity is retrieved. At a first point in time, a first dynamic value associated with a first time interval is determined. A first authentication code based on the first dynamic value is determined. At a second point in time, a second dynamic value associated with a second time interval is determined. A second authentication code based on the second dynamic value is determined. The first and second authentication codes are derived from the stored secret and the amount of time between the first and second points in time is different from the length of the first time interval.

    摘要翻译: 生成与实体相关联的认证码。 检索与实体相关联的存储秘密。 在第一时间点,确定与第一时间间隔相关联的第一动态值。 确定基于第一动态值的第一认证码。 在第二时间点,确定与第二时间间隔相关联的第二动态值。 确定基于第二动态值的第二认证码。 从所存储的秘密导出第一和第二认证码,并且第一和第二时间点之间的时间量与第一时间间隔的长度不同。

    Automatically estimating clock offset
    7.
    发明授权
    Automatically estimating clock offset 有权
    自动估计时钟偏移

    公开(公告)号:US08560837B1

    公开(公告)日:2013-10-15

    申请号:US12826935

    申请日:2010-06-30

    申请人: William M. Duane

    发明人: William M. Duane

    摘要: A method, system, and program product for use in estimating clock offset in a security environment, the security environment comprising a token generator comprising a token generator clock and an Authenticator comprising an Authenticator clock, the method comprising recording a plurality of delta values; wherein each value of the plurality of delta values corresponds to a difference between the token generator clock and the Authenticator clock, wherein the token generator clock and the Authenticator clock are not communicatively coupled, and fitting the plurality of delta values to a function.

    摘要翻译: 一种用于估计安全环境中的时钟偏移的方法,系统和程序产品,所述安全环境包括包括令牌发生器时钟的令牌发生器和包括认证器时钟的认证器,所述方法包括:记录多个增量值; 其中所述多个Δ值的每个值对应于所述令牌生成器时钟和所述认证器时钟之间的差异,其中所述令牌生成器时钟和所述认证器时钟不被通信耦合,并且将所述多个增量值拟合到功能。

    Controlling access to a computerized resource based on authentication using pulse data
    8.
    发明授权
    Controlling access to a computerized resource based on authentication using pulse data 有权
    基于使用脉冲数据的认证来控制对计算机资源的访问

    公开(公告)号:US08902045B1

    公开(公告)日:2014-12-02

    申请号:US13336573

    申请日:2011-12-23

    IPC分类号: G08B21/00

    摘要: A technique performs an authentication operation using pulse and facial data from a user. The technique involves obtaining current pulse data from a user, and performing a comparison between the current pulse data from the user and expected pulse data for the user. The technique further involves generating an authentication result based on the comparison between the current pulse data and the expected pulse data. The authentication result may control user access to a computerized resource. Since such a technique uses pulse data, a perpetrator cannot simply submit a static image of a subject's face to circumvent the authentication process. In some arrangements, the technique involves obtaining videos of human faces and deriving cardiac pulse rates from the videos. For such arrangements, a standard webcam can be used to capture the videos. Moreover, such techniques are capable of factoring in circadian rhythms and/or aging adjustments to detect and thwart video replay attacks.

    摘要翻译: 一种技术使用来自用户的脉冲和面部数据进行认证操作。 该技术涉及从用户获取当前脉冲数据,并且执行来自用户的当前脉冲数据与用户的预期脉冲数据之间的比较。 该技术还涉及基于当前脉冲数据与预期脉冲数据之间的比较产生认证结果。 认证结果可以控制用户对计算机资源的访问。 由于这种技术使用脉冲数据,所以犯罪者不能简单地提交被摄体脸部的静态图像以绕过认证过程。 在某些安排中,该技术涉及从视频获得人脸视频和导出心脏脉搏率。 对于这样的安排,可以使用标准网络摄像头来捕获视频。 此外,这些技术能够考虑昼夜节奏和/或老化调整以检测和阻止视频重播攻击。

    Soft token posture assessment
    9.
    发明授权
    Soft token posture assessment 有权
    软令牌姿势评估

    公开(公告)号:US08683563B1

    公开(公告)日:2014-03-25

    申请号:US13435616

    申请日:2012-03-30

    IPC分类号: G06F7/04

    摘要: An improved technique for assessing the security status of a device on which a soft token is run collects device posture information from the device running the soft token and initiates transmission of the device posture information to a server to be used in assessing whether the device has been subjected to malicious activity. The device posture information may relate to the software status, hardware status, and/or environmental context of the device. In some examples, the device posture information is transmitted to the server directly. In other examples, the device posture information is transmitted to the server via auxiliary bits embedded in passcodes displayed to the user, which the user may read and transfer to the server as part of authentication requests. The server may apply the device posture information in a number of areas, including, for example, authentication management, risk assessment, and/or security analytics.

    摘要翻译: 用于评估其上运行软令牌的设备的安全状态的改进技术从运行软令牌的设备收集设备姿态信息,并且发起设备姿态信息传输到服务器以用于评估设备是否已经被 遭受恶意活动。 设备姿态信息可以涉及设备的软件状态,硬件状态和/或环境上下文。 在一些示例中,设备姿态信息被直接发送到服务器。 在其他示例中,设备姿态信息通过嵌入在显示给用户的密码中的辅助位发送到服务器,用户可以作为认证请求的一部分读取和传送到服务器。 服务器可以在多个区域中应用设备姿态信息,包括例如认证管理,风险评估和/或安全分析。

    Agile OTP generation
    10.
    发明授权
    Agile OTP generation 有权
    敏捷OTP生成

    公开(公告)号:US08312519B1

    公开(公告)日:2012-11-13

    申请号:US12895130

    申请日:2010-09-30

    IPC分类号: G06F7/04 H04L9/00

    摘要: A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator algorithm and a validator, the method comprising generating a OTP at the token generator according to a variance technique; wherein the variance technique is selected from a set of variance techniques, receiving the OTP at a validator, determining, at the validator, the variance technique used by the token generator to generate the OTP, and determining whether to validate the OTP based on the OTP and variance technique.

    摘要翻译: 一种用于在安全环境中敏捷生成一次密码(OTP)的方法,系统和装置,所述安全环境具有包括令牌生成器算法和验证器的令牌生成器,所述方法包括根据令牌生成器根据 方差技术; 其中所述方差技术从一组方差技术中选择,在验证器处接收所述OTP,在所述验证器处确定所述令牌生成器用于生成所述OTP的方差技术,以及基于所述OTP确定是否验证所述OTP 和方差技术。