Controlling a soft token running within an electronic apparatus
    1.
    发明授权
    Controlling a soft token running within an electronic apparatus 有权
    控制在电子设备内运行的软令牌

    公开(公告)号:US08875263B1

    公开(公告)日:2014-10-28

    申请号:US13434272

    申请日:2012-03-29

    摘要: A technique controls a soft token running within an electronic apparatus. The technique involves providing an initial series of authentication codes based on a first set of machine states. The initial series of authentication codes is provided from the electronic apparatus to a server through a forward channel to authenticate a user. The technique further involves receiving a command from the server through a reverse channel between the electronic apparatus and the server. The reverse channel provides communications in a direction opposite to that of the forward channel. The technique further involves changing the first set of machine states to a second set of machine states in response to the command, and providing a new series of authentication codes based on the second set of machine states. The new series of authentication codes is provided from the electronic apparatus to the server through the forward channel for user authentication.

    摘要翻译: 技术控制在电子设备内运行的软令牌。 该技术涉及提供基于第一组机器状态的初始系列认证码。 通过前向信道从电子设备向服务器提供初始系列认证码,以认证用户。 该技术还涉及通过电子设备和服务器之间的反向信道从服务器接收命令。 反向信道在与正向信道相反的方向上提供通信。 该技术还涉及响应于该命令将第一组机器状态改变到第二组机器状态,并且基于第二组机器状态提供新的一系列认证代码。 新的认证码系列通过前向信道从电子设备提供给服务器,用于用户认证。

    Soft token posture assessment
    2.
    发明授权
    Soft token posture assessment 有权
    软令牌姿势评估

    公开(公告)号:US08683563B1

    公开(公告)日:2014-03-25

    申请号:US13435616

    申请日:2012-03-30

    IPC分类号: G06F7/04

    摘要: An improved technique for assessing the security status of a device on which a soft token is run collects device posture information from the device running the soft token and initiates transmission of the device posture information to a server to be used in assessing whether the device has been subjected to malicious activity. The device posture information may relate to the software status, hardware status, and/or environmental context of the device. In some examples, the device posture information is transmitted to the server directly. In other examples, the device posture information is transmitted to the server via auxiliary bits embedded in passcodes displayed to the user, which the user may read and transfer to the server as part of authentication requests. The server may apply the device posture information in a number of areas, including, for example, authentication management, risk assessment, and/or security analytics.

    摘要翻译: 用于评估其上运行软令牌的设备的安全状态的改进技术从运行软令牌的设备收集设备姿态信息,并且发起设备姿态信息传输到服务器以用于评估设备是否已经被 遭受恶意活动。 设备姿态信息可以涉及设备的软件状态,硬件状态和/或环境上下文。 在一些示例中,设备姿态信息被直接发送到服务器。 在其他示例中,设备姿态信息通过嵌入在显示给用户的密码中的辅助位发送到服务器,用户可以作为认证请求的一部分读取和传送到服务器。 服务器可以在多个区域中应用设备姿态信息,包括例如认证管理,风险评估和/或安全分析。

    Detecting soft token copies
    3.
    发明授权
    Detecting soft token copies 有权
    检测软令牌副本

    公开(公告)号:US08752156B1

    公开(公告)日:2014-06-10

    申请号:US13435848

    申请日:2012-03-30

    IPC分类号: H04L29/06

    摘要: A technique for detecting unauthorized copies of a soft token that runs on a mobile device includes generating a set of random bits on the mobile device and providing samples of the set of random bits, as well as token codes from the soft token, for delivery to a server during authentication requests. The server acquires the set of random bits of the mobile device, or learns the set of random bits over the course of multiple login attempts. Thereafter, the server predicts values of the samples of the set of random bits and tests actual samples arriving in connection with subsequent authentication requests. Mismatches between predicted samples and received samples indicate discrepancies between the random bits of the device providing the samples and the random bits of the mobile device, and thus indicate unauthorized soft token copies.

    摘要翻译: 用于检测在移动设备上运行的软令牌的未授权复制的技术包括在移动设备上生成一组随机比特,并提供该组随机比特的样本以及来自该软令牌的令牌代码,用于递送到 认证请求期间的服务器。 服务器获取移动设备的一组随机比特,或者在多次登录尝试过程中学习一组随机比特。 此后,服务器预测该组随机比特的样本的值并测试结合后续认证请求到达的实际样本。 预测样本和接收到的样本之间的不匹配指示提供样本的设备的随机比特与移动设备的随机比特之间的差异,并且因此指示未授权的软令牌副本。

    Providing authentication codes which include token codes and biometric factors
    5.
    发明授权
    Providing authentication codes which include token codes and biometric factors 有权
    提供包括令牌代码和生物特征因子的认证码

    公开(公告)号:US08752146B1

    公开(公告)日:2014-06-10

    申请号:US13434280

    申请日:2012-03-29

    摘要: A technique provides authentication codes to authenticate a user to an authentication server. The technique involves generating, by an electronic apparatus (e.g., a smart phone, a tablet, a laptop, etc.), token codes from a cryptographic key. The technique further involves obtaining biometric measurements from a user, and outputting composite passcodes as the authentication codes. The composite passcodes include the token codes and biometric factors based on the biometric measurements. Additionally, the token codes and the biometric factors of the composite passcodes operate as authentication inputs to user authentication operations performed by the authentication server. In some arrangements, the biometric factors are results of facial recognition (e.g., via a camera), voice recognition (e.g., via a microphone), gate recognition (e.g., via an accelerometer), touch recognition and/or typing recognition (e.g., via a touchscreen or keyboard), combinations thereof, etc.

    摘要翻译: 一种技术提供认证码以将用户认证给认证服务器。 该技术涉及通过电子设备(例如,智能电话,平板电脑,笔记本电脑等)从加密密钥生成令牌代码。 该技术还涉及从用户获取生物测量,并输出复合密码作为认证码。 复合密码包括基于生物特征测量的令牌代码和生物特征因子。 此外,复合密码的令牌代码和生物特征因子作为认证服务器执行的用户认证操作的认证输入。 在一些布置中,生物特征因子是面部识别(例如,经由相机),语音识别(例如,经由麦克风),门识别(例如,经由加速度计),触摸识别和/或打字识别(例如, 通过触摸屏或键盘),其组合等

    Scheduling soft token data transmission
    6.
    发明授权
    Scheduling soft token data transmission 有权
    调度软令牌数据传输

    公开(公告)号:US08683570B1

    公开(公告)日:2014-03-25

    申请号:US13435611

    申请日:2012-03-30

    IPC分类号: H04L29/06 G06F21/35

    摘要: An improved technique provides scheduled data transfer between a mobile device and a server. The mobile device combines token codes generated by a soft token with sequences of auxiliary bits and displays the combinations to users as passcodes. Users may then copy the passcodes to their computers for authenticating to a server on a remote network. As the passcodes include both token codes and sequences of auxiliary bits, a communication channel is established whereby the auxiliary bits as well as the soft token codes are transmitted from the mobile device to the server.

    摘要翻译: 改进的技术提供了移动设备和服务器之间的调度数据传输。 移动设备将由软令牌产生的令牌代码与辅助位序列组合,并将用户的组合显示为密码。 然后,用户可以将密码复制到其计算机,以便对远程网络上的服务器进行身份验证。 由于密码包括令牌码和辅助比特序列,所以建立通信信道,由此辅助比特以及软令牌码从移动设备发送到服务器。

    Graph-based approach to deterring persistent security threats
    8.
    发明授权
    Graph-based approach to deterring persistent security threats 有权
    以图为基础的方法来阻止持续的安全威胁

    公开(公告)号:US08813234B1

    公开(公告)日:2014-08-19

    申请号:US13171759

    申请日:2011-06-29

    IPC分类号: G06F21/00

    摘要: A processing device comprises a processor coupled to a memory and implements a graph-based approach to protection of a system comprising information technology infrastructure from a persistent security threat. Attack-escalation states of the persistent security threat are assigned to respective nodes in a graph, and defensive costs for preventing transitions between pairs of the nodes are assigned to respective edges in the graph. A minimum cut of the graph is computed, and a defensive strategy is determined based on the minimum cut. The system comprising information technology infrastructure subject to the persistent security threat is configured in accordance with the defensive strategy in order to deter the persistent security threat.

    摘要翻译: 处理设备包括处理器,其耦合到存储器并且实现基于图的方法以保护包括信息技术基础设施的系统免受持久的安全威胁。 持续性安全威胁的攻击升级状态被分配给图中的相应节点,并且用于防止节点对之间的转换的防御成本被分配给图中的相应边缘。 计算图的最小值,并根据最小值确定防御策略。 包含受到持续安全威胁的信息技术基础架构的系统是根据防御策略配置的,以便阻止持续的安全威胁。

    Techniques for detecting malware on a mobile device
    9.
    发明授权
    Techniques for detecting malware on a mobile device 有权
    在移动设备上检测恶意软件的技术

    公开(公告)号:US08904525B1

    公开(公告)日:2014-12-02

    申请号:US13536355

    申请日:2012-06-28

    IPC分类号: G06F12/14 G06F21/56

    摘要: A technique to detect malware on a mobile device which stores a virtual machine image involves establishing a connection from an electronic malware detection apparatus to the mobile device, the electronic malware detection apparatus being external to the mobile device. The technique further involves transferring mobile device data from the mobile device to the electronic malware detection apparatus through the connection to form a copy of the virtual machine image within the electronic malware detection apparatus. The technique further involves performing, by the electronic detection apparatus, a set of malware detection operations on the copy of the virtual machine image to determine whether the mobile device is infected with malware.

    摘要翻译: 一种用于检测存储虚拟机图像的移动设备上的恶意软件的技术涉及建立从电子恶意软件检测设备到移动设备的连接,电子恶意软件检测设备在移动设备外部。 该技术还涉及通过连接将移动设备数据从移动设备传送到电子恶意软件检测设备,以在电子恶意软件检测设备内形成虚拟机映像的副本。 该技术还包括通过电子检测设备对虚拟机映像的副本执行一组恶意软件检测操作,以确定移动设备是否被恶意软件感染。

    Authentication token with controlled release of authentication information based on client attestation

    公开(公告)号:US09659177B1

    公开(公告)日:2017-05-23

    申请号:US13625465

    申请日:2012-09-24

    IPC分类号: G06F3/00 G06F21/57

    摘要: An authentication token configured to generate authentication information comprises an attestation module. The attestation module of the authentication token is configured to receive an attestation generated by an attestation module of a client, to perform a check on the received attestation, and to release the authentication information to a designated entity if the check indicates that the attestation is valid. The designated entity may comprise the client itself or another entity that participates in an authentication process involving at least one of the authentication token and the client. The authentication token in performing the check on the attestation received from the client may determine if the received attestation conforms to a predetermined policy. The attestation may comprise a platform attestation generated by the client for a given instantiated software stack of the client.