-
公开(公告)号:US20250068719A1
公开(公告)日:2025-02-27
申请号:US18930751
申请日:2024-10-29
Applicant: DrFirst.com, Inc.
Inventor: James F. Chen , Chen Qian
Abstract: The present teaching relates to managing identity information of a person at an identity center. In one example, the person associated with a first set of identity attributes that are verified to be associated with the person. Upon the person being associated with the first set of identity attributes, the person is linked with a first user account at a source site. A consent is received from the person to share one or more attributes of the first user account at the source application with an attribute consumer. The sharing of one or more attributes of the first user account from the source entity to the receiving entity is facilitated in accordance with the received consent.
-
公开(公告)号:US20250068717A1
公开(公告)日:2025-02-27
申请号:US18942907
申请日:2024-11-11
Applicant: HAVENTEC PTY LTD
Inventor: Ric B. RICHARDSON
Abstract: There is disclosed a method of authenticating a user with respect to more than one digital device; said user having an account on a server; said method comprising: a. the user effecting a login sequence and an authenticating sequence on a first digital device as referenced and recorded on the server thereby to authenticate the user with respect to the first digital device; b. the user subsequently effecting a login sequence on a second digital device; the second digital device communicating the user login sequence to the server; c. the server communicating an option to the second digital device to utilise the first digital device to effect authentication of the user with respect to the second digital device; d. on receipt of a request from the second digital device to effect authentication by use of the first digital device: i. the server issuing a temporary unique ID to the second digital device; ii. the server sending an authentication request to the first digital device; iii. the authentication request including transmission of the temporary unique ID issued to the second digital device; iv. communicating the temporary unique ID from the first digital device to the user thereby to permit the user to determine whether to agree to the authentication request; v. the user communicating agreement or otherwise by communication effected from the first digital device to the server. Also disclosed is an apparatus for effecting authentication of at least a second device with respect to a server environment where authentication of a first device has been effected; the apparatus including: a. a memory storing at least a first log-in identifier and an associated authenticating data item; b. a processor which generates a temporary identifier as a first step in effecting authentication of at least the second device; c. a transmitter which transmits the temporary identifier to the at least a second device and to the first device; d. a comparison device which compares the temporary identifier of the first device and of the second device and makes a decision based on the comparison as to whether to permit the server to authenticate the second device with respect to the server environment.
-
公开(公告)号:US12238102B2
公开(公告)日:2025-02-25
申请号:US17359313
申请日:2021-06-25
Applicant: Illumina, Inc.
Inventor: Prabhu Palanisamy
Abstract: Cloud provider accounts can be integrated into a software-as-a-service platform. Configuration options can be provided to support various levels of granularity so that different cloud provider accounts can be provided to different tenants, workgroups, users, applications, and the like. From a user perspective, the fact that data is being stored at a cloud provider account can be transparent in that the same features and authentication process can be supported across different cloud provider types. In practice, limited temporary derived credentials can be generated from underlying credentials to provide fine-grained control of access to cloud provider account resources while avoiding administrative overhead.
-
公开(公告)号:US12223074B2
公开(公告)日:2025-02-11
申请号:US17900458
申请日:2022-08-31
Applicant: Palo Alto Research Center Incorporated
Inventor: Marc E. Mosko
Abstract: A system and method are provided to facilitate securing windows discretionary access control. During operation, the system determines a Windows domain model including capability assignments of principals on resources, wherein a respective capability assignment comprises a permission of a respective principal to a respective resource and wherein a respective principal comprises a user or a group of users. The system specifies desired effective permissions of each principal to each resource. The system generates, based on the specified desired effective permissions, access control entries for the respective principal to the respective resource. The system generates, based on the specified desired effective permissions, group memberships indicating which users belong to which groups.
-
公开(公告)号:US12223069B1
公开(公告)日:2025-02-11
申请号:US17331474
申请日:2021-05-26
Applicant: SMART EYE TECHNOLOGY, INC.
Inventor: Dexter A. Caffey
Abstract: The present invention allows for the creation of a biometrically secure environment that allows viewing, editing and sharing of confidential documents, or the like, in public places, without worrying that someone will see the contents. The invention provides privacy, for example for the purposes of reading documents, in a public environment while having the confidence that you are the only one able to read the document. Privacy may be achieved through methods of identification using biometric features, such as: face, iris or voice recognition. Verification that a real person is viewing the document may also be achieved by pulse recognition. In one embodiment, the screen will shut down when more than one person looks directly at the screen. In different embodiments, the present invention may use voice recognition, print behavior, iris scan, finger print, face verification, etc. A control panel and dashboard may be used, and liveness check or activity audit may be performed. In further embodiments, a document may be securely shared with groups of recipients; a user may be authenticated while video chatting; voice commands may be used to upload, share, send, and open documents; commands may be provided to allow for documents to be read out loud; documents that are shared during screen sharing during a video conference session may be logged; and documents may be scanned and uploaded into the system.
-
公开(公告)号:US12207087B2
公开(公告)日:2025-01-21
申请号:US17646363
申请日:2021-12-29
Applicant: DERRY TECHNOLOGICAL SERVICES, INC.
Inventor: Patrick Joseph Hynds , Duane Leo Laflotte
Abstract: Techniques for securing data in a storage device are disclosed. The storage device includes one or more authentication components including one or more of a biometric reader, a positioning system, and a wireless receiver. The storage device further includes a security subsystem configured to secure data using multiple authentication factors obtained using the one or more authentication components.
-
公开(公告)号:US12206662B2
公开(公告)日:2025-01-21
申请号:US17811178
申请日:2022-07-07
Applicant: BROTHER KOGYO KABUSHIKI KAISHA
Inventor: Kentaro Arai
Abstract: A server may receive, from a terminal device, a change instruction for changing a password of a communication device different from the server and the terminal device. The server may, in a case where the change instruction is received from the terminal device, send first authentication information to the terminal device. The first authentication information may be inputted to the communication device by a user of the terminal device after the first authentication information has been sent to the terminal device. The server may, in a case where the first authentication information is inputted to the communication device, receive the first authentication information from the communication device. The server may, in a case where the first authentication information is received from the communication device, send a change permission notification to the communication device. The change permission notification may be a notification to permit the communication device to change the password.
-
公开(公告)号:US12204636B2
公开(公告)日:2025-01-21
申请号:US18109415
申请日:2023-02-14
Inventor: Qiyun Su
Abstract: A method for temporary password management, including: obtaining a first temporary password entered by a user; matching the first temporary password with temporary passwords in a valid temporary password pool; if the matching succeeds, performing an unlocking operation; moving a second temporary password from the valid temporary password pool to an invalid temporary password pool, the second temporary password being a temporary password matching the first temporary password in the valid temporary password pool; when a temporary password having a storage time exceeding a first time length threshold exists in the invalid temporary password pool, moving the temporary password in the invalid temporary password pool having a storage time exceeding the first time length threshold back to the valid temporary password pool.
-
公开(公告)号:US12182238B2
公开(公告)日:2024-12-31
申请号:US17045780
申请日:2018-06-12
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Peter Seiler , Adolfo Adolfo Gomez , Connor Jam Watkins
Abstract: An enhanced reality system that includes a plurality of sensors to detect relative positions of a user's body and changes in positions of the plurality of sensors over time and a controller to: receive data from the sensors and determine a gesture made by the user; and an authentication module to, when executed by the controller translate the gesture into a passcode and authorize access to digital content based on verification of the passcode.
-
公开(公告)号:US12177207B2
公开(公告)日:2024-12-24
申请号:US17356487
申请日:2021-06-23
Applicant: Apple Inc.
Inventor: Jay S. Coggin , Daniel C. Klingler , Kyle C. Brogle , Johannes P. Schmidt , Eric A. Allamanche , Thomas Alsina , Bob Bradley , Alex T. Nelson , Rudolph Van Der Merwe , Joseph M. Triscari , Keun Sup Lee , Pedro Mari , Aaron M. Elder , Richard M. Powell
Abstract: The embodiments set forth a technique for enabling a computing device to securely configure a peripheral computing device. According to some embodiments, the method can include the steps of (1) approving a request received from the peripheral computing device to engage in a setup procedure for the peripheral computing device, (2) receiving, from the peripheral computing device: (i) an audio signal that encodes a password and timing information, and (ii) a light signal. Additionally, the method can involve, in response to identifying that the timing information correlates with the light signal: (3) extracting the password from the audio signal, and (4) establishing a communication link with the peripheral computing device based on the password. In turn, the method can involve (5) providing configuration information to the peripheral computing device over the communication link.
-
-
-
-
-
-
-
-
-