Movatterモバイル変換


[0]ホーム

URL:


US20010002487A1 - System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record - Google Patents

System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
Download PDF

Info

Publication number
US20010002487A1
US20010002487A1US09/730,649US73064900AUS2001002487A1US 20010002487 A1US20010002487 A1US 20010002487A1US 73064900 AUS73064900 AUS 73064900AUS 2001002487 A1US2001002487 A1US 2001002487A1
Authority
US
United States
Prior art keywords
key
secured
passport
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/730,649
Other versions
US6408389B2 (en
Inventor
David Grawrock
Shawn Lohstroh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CA Inc
Original Assignee
Symantec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Symantec CorpfiledCriticalSymantec Corp
Priority to US09/730,649priorityCriticalpatent/US6408389B2/en
Publication of US20010002487A1publicationCriticalpatent/US20010002487A1/en
Application grantedgrantedCritical
Publication of US6408389B2publicationCriticalpatent/US6408389B2/en
Anticipated expirationlegal-statusCritical
Assigned to CA, INC.reassignmentCA, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SYMANTEC CORPORATION
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system is disclosed for controlling intelligible access to secured files by means of a user-memorized password in combination with a user-associated passport record. The passport record takes on two forms, one when it is physically secured within the workstation and a different second form when the passport record is in-transit. Log-in privileges are granted after a presented passport record passes a number of tests including digital signature authentication, and the ability to extract two different encrypted keys from the passport record. The in-transit record does not carry one of those two keys.

Description

Claims (34)

What is claimed is:
1. A machine system for maintaining confidential digital information generally in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a password and a passport, said machine system comprising:
(a) a passport generator for generating within a first station an in-station passport, wherein the in-station passport includes:
(a.1) a first secured key derived from a first password of a first authorized user; and
(a.2) a second secured key that is different from the first secured key; and
(b) a passport exporter for generating within the first station an exportable passport, wherein said exportable passport includes a copy of the first secured key but does not include a copy of the second secured key.
2. A machine system according to
claim 1
wherein said passport generator includes:
(a.3) random number generating means for producing a substantially random first bit sequence defining a plaintext version of said first secured key;
(a.4) a hasher for receiving said first password and producing therefrom a hashed password signal; and
(a.5) a first encrypting unit for receiving as inputs, the hashed password signal and the first bit sequence, for carrying out a first encrypting operation on its received inputs, and for responsively outputting the first secured key.
3. A machine system according to
claim 2
wherein said passport generator further includes:
(a.6) a private key supplier for supplying a second bit sequence defining a plaintext version of said second secured key; and
(a.7) a second encrypting unit for receiving as inputs, the first bit sequence and the second bit sequence, for carrying out a second encrypting operation on its received inputs, and for responsively outputting the second secured key.
4. A machine system according to
claim 3
wherein said passport generator further includes:
(a.8) a public key supplier for supplying a third bit sequence representing a public key of the first user; and
(a.9) a third encrypting unit for receiving as inputs, the first bit sequence and the third bit sequence, for carrying out a third encrypting operation on its received inputs, and for responsively outputting a third secured key; and further wherein:
the in-station passport includes a copy of the third secured key; and
the exportable passport does not include a copy of the third secured key.
5. A machine system according to
claim 4
wherein:
(a.5a) said first encrypting operation is a symmetric encryption (SE) using the first bit sequence as a data-input and using the hashed password signal as a key-input;
(a.7a) said second encrypting operation is a symmetric encryption (SE) using the first bit sequence as a key-input and using the second bit sequence as a data-input; and
(a.9a) said third encrypting operation is an asymmetric encryption (AE) using the using the first bit sequence as a data-input and using the public key of the first user as a key-input.
6. A machine system according to
claim 1
further comprising:
(c) first data conveyance means for conveying first data representing said encrypted form of the confidential digital information; and
(d) second data conveyance means for conveying second data representing the exportable passport.
7. A machine system according to
claim 6
wherein:
(c.1) said first data conveyance means records the first data into a portable memory means; and
(d.1) said second data conveyance means transmits the second data by way of a conveyance channel that does not include said first portable memory means.
8. A machine system for maintaining confidential digital information generally in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a password and a passport, said machine system comprising:
(a) a passport inspector for receiving a user password supplied at a given station, for locating an in-station passport associated with the user, and for verifying correlation between the user-supplied password and the user-associated in-station passport; wherein the in-station passport includes:
(a.1) a first secured key derived from a valid password of the passport-associated user;
(a.2) a second secured key covered by a plaintext version of the first secured key; and
(a.3) a third secured key that is different from the first secured key; and wherein the correlation verification carried out by the passport inspector includes:
(a.4) generating a first attempt signal by attempting to uncover the first secured key with the user-submitted password;
(a.5) generating a second attempt signal by attempting to uncover the second secured key with the first attempt signal;
(a.6) generating a third attempt signal by attempting to uncover the third secured key; and
(a.7) performing format checking on each of the second attempt signal and the third attempt signal.
9. A machine-implemented method for maintaining confidential digital information generally in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a password and a passport, said method comprising the steps of:
(a) receiving a user password supplied at a given station;
(b) fetching an in-station passport associated with the user, wherein the in-station passport includes:
(b.1) a first secured key derived from a valid password of the passport-associated user;
(b.2) a second secured key covered by a plaintext version of the first secured key; and
(b.3) a third secured key that is different from the first secured key; and
(c) verifying correlation between the user-supplied password and the user-associated in-station passport, wherein said correlation verification includes:
(c.1) generating a first attempt signal by attempting to uncover the first secured key with the user-submitted password;
(c.2) generating a second attempt signal by attempting to uncover the second secured key with the first attempt signal;
(c.3) generating a third attempt signal by attempting to uncover the third secured key; and
(c.4) performing format checking on each of the second attempt signal and the third attempt signal.
10. A machine-readable memory for use in a machine system that maintains confidential digital information generally in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a user-associated password and a user-associated passport said machine-readable memory storing a passport data structure comprising:
(a) a first secured key derived from a valid password of the passport-associated user;
(b) a second secured key covered by a plaintext version of the first secured key; and
(c) a third secured key that is different from the first secured key.
11. A machine-implemented method for providing intelligible access to algorithmically-secured data in response to an access request, wherein the access request includes submission of a password and submission of an identification of a requesting user, said method comprising the steps of:
(a) finding a machine-readable passport associated with the submitted identification, wherein said passport includes:
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user;
(a.3) a third field containing a second secured key covered by a plaintext version of the first secured key; and
(a.4) a fourth field containing a third secured key that is different from the first secured key;
(b) using the submitted password to attempt decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key;
(c) using the putative first uncovering to attempt decryption of the second secured key, said attempt producing a putative second uncovering of the second secured key; and
(d) using the putative first uncovering to attempt decryption of the third secured key, said attempt producing a putative third uncovering of the third secured key.
12. A machine-implemented method according to
claim 11
wherein:
(c.1) said attempted decryption of the second secured key provides a respective indication of whether or not the attempted decryption was successful; and
(d.1) said attempted decryption of the third secured key provides a respective indication of whether or not the attempted decryption was successful; said method further comprising the step of:
(e) requiring respective indications of decryption success from the attempted decryptions of the second and third secured keys before providing intelligible access to algorithmically-secured data in response to said access request.
13. A machine-implemented method according to
claim 11
wherein:
(a.3a) a correctly decrypted version of said second secured key has a prespecified format that indicates correct decryption thereof; and
(a.4a) a correctly decrypted version of said third secured key has a prespecified format that indicates correct decryption thereof;
said method further comprising the step of:
(e) testing the format of each of the putative second uncovering and the putative third uncovering for an indication of correct decryption.
14. A machine-instructing device for instructing a prespecified, instructable machine to carry out a method for providing intelligible access to algorithmically-secured data in response to an access request, wherein the access request includes submission of a password and submission of an identification of a requesting user, said instruction-defined method comprising the steps of:
(a) finding a machine-readable passport associated with the submitted identification, wherein said passport includes:
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user;
(a.3) a third field containing a second secured key covered by a plaintext version of the first secured key; and
(a.4) a fourth field containing a third secured key that is different from the first secured key;
(b) using the submitted password to attempt decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key;
(c) using the putative first uncovering to attempt decryption of the second secured key, said attempt producing a putative second uncovering of the second secured key; and
(d) using the putative first uncovering to attempt decryption of the third secured key, said attempt producing a putative third uncovering of the third secured key.
15. A machine-implemented method for providing intelligible access to algorithmically-secured data in response to an access request submitted at a first location, wherein the access request includes submission of a password and submission of an identification of a requesting user, said method comprising the steps of:
(a) finding a machine-readable passport associated with the submitted identification, wherein said passport includes:
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user;
(a.3) a third field containing a second secured key covered by a plaintext version of the first secured key;
(a.4) a fourth field that is either blank or contains irrelevant data; and
(a.5) a fifth field containing a digital signature covering at least said first through fourth fields;
(b) using the digital signature to authenticate the signature-covered contents of the found passport.
16. A machine-implemented method according to
claim 15
wherein:
(a.6) the found passport further includes a sixth field containing a public key of the passport-associated user;
(a.5a) the digital signature of said fifth field further covers the sixth field; and
(b.1) the public key of the sixth field is applied the digital signature of the fifth field in said step (b) of authenticating the signature-covered contents of the found passport.
17. A machine-implemented method according to
claim 16
wherein:
(a.7) the found passport further includes a seventh field containing an indication that the found passport originated at a location other than the first location;
(a.8) the found passport further includes an eighth field that is either blank or contains irrelevant data; and
(a.5b) the digital signature of said fifth field further covers the seventh and eighth fields.
18. A machine-implemented method according to
claim 17
further comprising, if the signature-covered contents of the found passport are successfully authenticated by the digital signature, the additional steps of:
(c) generating a new key at the first location;
(d) overwriting the eighth field with an encrypted version of the new key, said encrypted version of the new key being covered by the public key of the passport-associated user;
(e) overwriting the fourth field with an encrypted version of a location-specific key, said location-specific key being specific to the first location, said encrypted version of the location specific key being covered by the new key.
19. A machine-implemented method according to
claim 18
further comprising, after said steps of overwriting the fourth and eighth fields, the additional step of:
(f) overwriting the fifth field with a new digital signature covering all other fields of the overwritten passport.
20. A machine-implemented method for providing intelligible access to algorithmically-secured data in response to an access request submitted at a first location, wherein the access request includes submission of a password and submission of an identification of a requesting user at the first location, and further wherein a user-associated passport required for servicing the access request is physically secured in a second location, said method comprising the steps carried out at the second location of:
(a) finding the passport associated with the submitted identification, wherein said passport includes:
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user;
(a.3) a third field containing a second secured key covered by a plaintext version of the first secured key;
(a.4) a fourth field containing a third secured key that is different from the first secured key, said third secured key being covered by either a plaintext version the first secured key or by an alternate key;
(a.5) a fifth field containing a secured copy of the alternate key, said secured copy of the alternate key being covered by the public key of the passport-associated user; and
(a.6) a sixth field containing a digital signature covering at least said first through fifth fields;
(b) copying the found passport;
(c) clearing the fourth and fifth fields of the passport copy;
(d) overwriting the sixth field of the passport copy with a new digital signature covering all other fields of the cleared passport copy; and
(e) exporting the cleared and resigned passport copy out of the second location.
21. A machine-implemented method for providing intelligible access to algorithmically-secured data stored at a first location in response to an access request submitted at the first location, wherein the access request includes submission of a password and submission of an identification of a requesting user at the first location, and further wherein a user-associated passport said method comprising the steps carried out at the first location of:
(a) finding a passport associated with the submitted identification, wherein said passport includes:
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user; and
(a.3) a third field containing a secured copy of a prespecified bit sequence, said secured copy of the prespecified bit sequence being covered by a plaintext version of the first secured key;
(b) using the submitted password to attempt decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key;
(c) using the putative first uncovering to attempt decryption of the secured copy of a prespecified bit sequence, said attempt producing a putative second uncovering of the prespecified bit sequence; and
(d) comparing the putative second uncovering against the prespecified bit sequence.
22. A manufactured passport signal structured for operable use by a machine system that maintains confidential digital information in encrypted form while allowing for intelligible access to such confidential information by users who are authorized for access by a combination of a user-associated password and a user-associated passport , said manufactured passport signal defining for each of an associated one or more authorized users, a passport data structure comprising:
(a) a first field containing a first secured-by-encryption key, where said first secured key is covered by a first covering signal derived from a valid password of the passport-associated user;
(b) a second field containing a second secured-by-encryption key, where said second secured key is covered by a plaintext version of the first secured key; and
(c) a third field that is blank or is filled with irrelevant information,
(c.1) where said third field can be overwritten to contain a third secured-by-encryption key that is different from the first secured key in situations where the corresponding passport data structure is physically-secured within said machine system; and
(d) where said machine system requires local presence of a physically-secured, in-system version of the corresponding passport data structure and a verified local uncovering from said in-system version of the corresponding passport data structure of the secured keys in the second and third fields of the in-system version before the machine system locally grants to a requesting user, intelligible access to corresponding confidential information.
23. The manufactured passport signal of
claim 22
wherein said passport data structure further comprises:
(e) a fourth field storing a digital signature that covers data contained in at least the first, second and third fields.
24. A manufactured passport signal according to
claim 23
and further characterized as being transmitted over an unsecured communications network.
25. A manufactured instruction signal structured for instructing a prespecified, instructable machine to carry out a method for providing intelligible access to algorithmically-secured data in response to an access request, wherein the access request includes submission of a password and submission of an identification of a requesting user, said instruction-defined method comprising:
(a) finding a machine-readable passport associated with the submitted identification, wherein said passport includes:
(a.1) a first field having a user identification matching the submitted identification and associating the passport with a corresponding user;
(a.2) a second field containing a first secured key derived from a valid password of the passport-associated user;
(a.3) a third field containing a second secured key covered by a plaintext version of the first secured key; and
(a.4) a fourth field containing a third secured key that is different from the first secured key; and
(a.5) a fifth field containing a fourth secured key, where a plaintext version of the fourth secured key covers the third secured key of the fourth field;
(b) using the submitted password to attempt decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key;
(c) using the putative first uncovering to attempt decryption of the second secured key, said attempt producing a putative second uncovering of the second secured key; and
(d) attempting to generate a plaintext version of the third secured key by using the fourth field in combination with at least the second field.
26. The manufactured instruction signal of
claim 25
wherein said step (d) further uses the third field and the fifth field for attempting to generate the plaintext version of the third secured key.
27. The manufactured instruction signal of
claim 25
and further wherein said passport further includes:
(a.6) a sixth field storing an origination flag that indicates whether the plaintext version of the first secured key originated locally or was imported; and wherein said instruction-defined method performs the steps of:
(d.1) in response to the origination flag indicating that first secured key originated locally, using the putative first uncovering to attempt decryption of the third secured key; and
(d.2) in response to the origination flag indicating that first secured key did not originate locally, using the putative first uncovering in combination with an attempted uncovering of the second secured key and an attempted uncovering of the fourth secured key to attempt decryption of the third secured key.
28. The manufactured instruction signal of
claim 25
and further wherein said instruction-defined method does not require involvement by a system administrator or another, like-privileged user in addition to involvement by the requesting user for providing said intelligible access to the algorithmically-secured data if the machine-readable passport is found to be physically secured within a local workstation of the requesting user and pre-authenticated within said local workstation.
29. The manufactured instruction signal of
claim 28
and further wherein said instruction-defined method does require involvement by a system administrator or another, like-privileged user in addition to involvement by the requesting user for providing said intelligible access to the algorithmically-secured data if the machine-readable passport is to be formed by importing an in-transit version of the passport into a physically secured area within the local workstation of the requesting user, where the corresponding fourth field and fifth field of the in-transit version are each blank or filled with irrelevant information, and the system administrator or other, like-privileged user has to release a plaintext version of the third secured key for use in filling in the fourth field of the machine-readable passport during its formation.
30. The manufactured instruction signal of
claim 25
and further wherein said instruction-defined method does not require involvement by a system administrator or another, like-privileged user in addition to involvement by the requesting user for changing the valid password of the requesting user if the machine-readable passport is found to be physically secured within a local workstation of the requesting user and pre-authenticated within said local workstation.
31. A manufactured signal structured for loading into a prespecified, programmable machine and thereby causing the machine to carry out a method for providing intelligible access to algorithmically-secured data in response to an access request, wherein the machine has a physically secured storage, wherein the access request includes submission of a user identification, and submission of a putative password of a user identified by said user identification, where said access-providing method comprises:
(a) obtaining from said physically secured storage, a machine-readable passport that is associated with the submitted identification, wherein said passport includes:
(a.1) a first field containing data of a first algorithmically-secured key, which data is derived from a valid password of a passport-associated user and from a plaintext version of the first secured key;
(a.2) a second field containing data of a second algorithmically-secured key that is covered by said plaintext version of the first secured key; and
(a.3) a third field containing data of a third algorithmically-secured key that is different from the first algorithmically-secured key; and
(a.4) a fourth field containing data of a fourth algorithmically-secured key,
(a.3a) where the third secured key of the third field is covered by a plaintext version of the fourth secured key;
(b) using the submitted, putative password to attempt a decryption of the first secured key, said attempt producing a putative first uncovering of the first secured key from the data of said first field;
(c) using the putative first uncovering to attempt a further decryption of the second secured key, said further attempt producing a putative second uncovering of the second secured key from the data of said second field; and
(d) attempting to generate a plaintext version of the third secured key by trying to decrypt the data of said fourth field while using at least the putative first uncovering for forming a decryption key for decrypting the data of said fourth field.
32. The manufactured signal of
claim 31
and further wherein said access-providing method allows one or more of a system administrator and other like-privileged users to erase said identification-associated passport from the physically secured storage either autocratically or by vote and to thereby block the passport-associated user from gaining intelligible access to the algorithmically-secured data by way of said machine .
33. The manufactured signal of
claim 31
and further wherein said passport includes:
(a.5) a fifth field containing an algorithmically-secured data string that is produced by using the first algorithmically-secured key to cover a plaintext version of said algorithmically-secured data string; and said access-providing method includes the steps of:
(e) attempting to generate the plaintext version of the algorithmically-secured data string by trying to decrypt the data of said fifth field while using the putative first uncovering as a decryption key; and
(f) checking the generated plaintext version of the data string for correctness, and if the check fails, denying entry into the machine based on said obtained passport and the supplied user identification, and the submitted putative password.
34. A manufactured instruction signal adapted for instructing a prespecified, instructable machine to carry out a machine-implemented method for protecting algorithmically-secured data from being intelligibly accessed by other than authorized users, where an access request includes submission of a putative password of an authorized user, and submission of a putative identification of the same authorized user to a request-servicing station that has physically secured, storage and processing facilities, where said instructed method comprises:
(a) requiring presentation within said physically secured, storage facilities of the request-servicing station, of an authenticated passport record associated with a user identified by the putative identification, where the presented passport record includes:
(a.1) a first field containing data of a first algorithmically-secured key, where said first secured key is derived from a valid password of the passport-associated user and from a first counterpart-plaintext key that is temporarily originated in either the physically secured facilities of the request-servicing station or in physically secured facilities of a like, external station;
(a.2) a second field containing data of a second algorithmically-secured key, where said second secured key is derived from a second counterpart and private key of the passport-associated user and from said first counterpart-plaintext key;
(a.3) a third field containing data of a third algorithmically-secured key, where said third secured key is derived from a public key of the passport-associated user and from a third counterpart-plaintext key that is temporarily created in the physically secured facilities of the request-servicing station, where the third counterpart-plaintext key may be the same as the first counterpart-plaintext key if both of the first and third counterpart-plaintext keys originate in the physically secured facilities of the request-servicing station;
(a.4) a fourth field containing data of a fourth algorithmically-secured key, where said fourth secured key is derived from a fourth counterpart and private key of the request-servicing station and from said third counterpart-plaintext key;
(b) requiring use of the data of said fourth field and use of the data of at least of said first field for reproducing in the physically secured facilities of the request-servicing station, said fourth counterpart and private key of the request-servicing station; and
(c) requiring use of the data of said second field and use of the data of said first field for reproducing in the physically secured facilities of the request-servicing station, said second counterpart and private key of the passport-associated user.
US09/730,6491997-05-282000-12-05System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport recordExpired - LifetimeUS6408389B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US09/730,649US6408389B2 (en)1997-05-282000-12-05System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US08/864,297US6081893A (en)1997-05-281997-05-28System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US09/564,672US6339828B1 (en)1997-05-282000-05-03System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US09/730,649US6408389B2 (en)1997-05-282000-12-05System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US09/564,672DivisionUS6339828B1 (en)1997-05-282000-05-03System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

Publications (2)

Publication NumberPublication Date
US20010002487A1true US20010002487A1 (en)2001-05-31
US6408389B2 US6408389B2 (en)2002-06-18

Family

ID=25342950

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US08/864,297Expired - LifetimeUS6081893A (en)1997-05-281997-05-28System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US09/564,672Expired - LifetimeUS6339828B1 (en)1997-05-282000-05-03System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US09/730,649Expired - LifetimeUS6408389B2 (en)1997-05-282000-12-05System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US08/864,297Expired - LifetimeUS6081893A (en)1997-05-281997-05-28System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US09/564,672Expired - LifetimeUS6339828B1 (en)1997-05-282000-05-03System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

Country Status (1)

CountryLink
US (3)US6081893A (en)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030226040A1 (en)*2002-06-032003-12-04International Business Machines CorporationControlling access to data stored on a storage device of a trusted computing platform system
US20040129776A1 (en)*2002-09-262004-07-08Samsung Electronics Co., Ltd.Security monitor apparatus and method using smart card
US20050044402A1 (en)*1995-10-242005-02-24Phil LibinLogging access attempts to an area
US20060053125A1 (en)*2002-10-022006-03-09Bank One CorporationSystem and method for network-based project management
US20070008128A1 (en)*2003-08-252007-01-11Honda Motor Co., Ltd.Information communication system, and physical distribution system using the information communication system
US20070186106A1 (en)*2006-01-262007-08-09Ting David MSystems and methods for multi-factor authentication
US20080010202A1 (en)*2001-08-132008-01-10First Usa Bank, N.A.System and method for funding a collective account by use of an electronic tag
US20080022393A1 (en)*2006-06-202008-01-24Lenovo (Singapore) Pte. Ltd.Computer access control using password reset
US20090125725A1 (en)*2007-11-092009-05-14Samsung Electronics Co. Ltd.External memory access device and method of accessing external memory
US20090210720A1 (en)*2008-02-202009-08-20Tatung CompanyMethod for generating one-time password
US20100124331A1 (en)*2008-11-182010-05-20Qualcomm IncorpratedSpectrum authorization and related communications methods and apparatus
US20100189251A1 (en)*2009-01-232010-07-29Edward CurrenSecurity Enhanced Data Platform
US7801816B2 (en)2001-05-232010-09-21Jp Morgan Chase Bank, N.A.System and method for currency selectable stored value instrument
US7801799B1 (en)1998-11-172010-09-21Jpmorgan Chase Bank, N.A.Customer activated multi-value (CAM) card
US7805368B2 (en)1998-06-222010-09-28Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US7809595B2 (en)2002-09-172010-10-05Jpmorgan Chase Bank, NaSystem and method for managing risks associated with outside service providers
US7809642B1 (en)1998-06-222010-10-05Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US20100299534A1 (en)*2009-05-222010-11-25Samsung Electronics Co., Ltd.Data storage device and data storage system
US7860789B2 (en)2001-07-242010-12-28Jpmorgan Chase Bank, N.A.Multiple account advanced payment card and method of routing card transactions
US7899753B1 (en)2002-03-252011-03-01Jpmorgan Chase Bank, N.ASystems and methods for time variable financial authentication
US7966496B2 (en)1999-07-022011-06-21Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US20110167010A1 (en)*2008-09-122011-07-07Andrea SopperaControl of supply networks and verification of items
US7987501B2 (en)2001-12-042011-07-26Jpmorgan Chase Bank, N.A.System and method for single session sign-on
US20110252234A1 (en)*2010-04-072011-10-13Apple Inc.System and method for file-level data protection
US8145549B2 (en)2003-05-302012-03-27Jpmorgan Chase Bank, N.A.System and method for offering risk-based interest rates in a credit instutment
US8160960B1 (en)2001-06-072012-04-17Jpmorgan Chase Bank, N.A.System and method for rapid updating of credit information
US8185940B2 (en)2001-07-122012-05-22Jpmorgan Chase Bank, N.A.System and method for providing discriminated content to network users
US8301493B2 (en)2002-11-052012-10-30Jpmorgan Chase Bank, N.A.System and method for providing incentives to consumers to share information
US8447672B2 (en)2005-05-272013-05-21Jp Morgan Chase Bank, N.A.Universal payment protection
US20130275764A1 (en)*2005-12-212013-10-17International Business Machines CorporationControl of access to a secondary system
US8589680B2 (en)2010-04-072013-11-19Apple Inc.System and method for synchronizing encrypted data on a device having file-level content protection
US8751391B2 (en)2002-03-292014-06-10Jpmorgan Chase Bank, N.A.System and process for performing purchase transactions using tokens
US8793160B2 (en)1999-12-072014-07-29Steve SoremSystem and method for processing transactions
US8849716B1 (en)2001-04-202014-09-30Jpmorgan Chase Bank, N.A.System and method for preventing identity theft or misuse by restricting access
US9479340B1 (en)*2015-03-302016-10-25Amazon Technologies, Inc.Controlling use of encryption keys
US9674162B1 (en)2015-03-132017-06-06Amazon Technologies, Inc.Updating encrypted cryptographic key pair
US9893885B1 (en)2015-03-132018-02-13Amazon Technologies, Inc.Updating cryptographic key pair
US9912476B2 (en)2010-04-072018-03-06Apple Inc.System and method for content protection based on a combination of a user PIN and a device specific identifier
US10003467B1 (en)2015-03-302018-06-19Amazon Technologies, Inc.Controlling digital certificate use
US10176317B2 (en)*2013-12-252019-01-08Beijing Qihoo Technology Company LimitedMethod and apparatus for managing super user password on smart mobile terminal
US10282536B1 (en)2002-03-292019-05-07Jpmorgan Chase Bank, N.A.Method and system for performing purchase and other transactions using tokens with multiple chips
US10726417B1 (en)2002-03-252020-07-28Jpmorgan Chase Bank, N.A.Systems and methods for multifactor authentication

Families Citing this family (115)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10361802B1 (en)1999-02-012019-07-23Blanding Hovenweep, LlcAdaptive pattern recognition based control system and method
US6081893A (en)*1997-05-282000-06-27Symantec CorporationSystem for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
JP3060996B2 (en)*1997-05-302000-07-10日本電気株式会社 Wireless data communication device
US8963681B2 (en)1997-10-272015-02-24Direct Source International, LlcOperating control system for electronic equipment
JP3351318B2 (en)*1997-11-072002-11-25株式会社日立製作所 Computer system monitoring method
US6775778B1 (en)*1998-05-292004-08-10Texas Instruments IncorporatedSecure computing device having boot read only memory verification of program code
US6928547B2 (en)*1998-07-062005-08-09Saflink CorporationSystem and method for authenticating users in a computer network
US7110984B1 (en)*1998-08-132006-09-19International Business Machines CorporationUpdating usage conditions in lieu of download digital rights management protected content
US6470453B1 (en)*1998-09-172002-10-22Cisco Technology, Inc.Validating connections to a network system
EP1026641B1 (en)*1999-02-012013-04-24International Business Machines CorporationMethod and system for establishing a trustworthy connection between a user and a terminal
US6393420B1 (en)*1999-06-032002-05-21International Business Machines CorporationSecuring Web server source documents and executables
US6671407B1 (en)*1999-10-192003-12-30Microsoft CorporationSystem and method for hashing digital images
WO2001033477A2 (en)1999-11-042001-05-10Jpmorgan Chase BankSystem and method for automated financial project management
US7321864B1 (en)1999-11-042008-01-22Jpmorgan Chase Bank, N.A.System and method for providing funding approval associated with a project based on a document collection
US6704868B1 (en)*1999-11-122004-03-09International Business Machines CorporationMethod for associating a pass phase with a secured public/private key pair
US6718468B1 (en)*1999-11-122004-04-06International Business Machines CorporationMethod for associating a password with a secured public/private key pair
US10275780B1 (en)1999-11-242019-04-30Jpmorgan Chase Bank, N.A.Method and apparatus for sending a rebate via electronic mail over the internet
US8571975B1 (en)1999-11-242013-10-29Jpmorgan Chase Bank, N.A.System and method for sending money via E-mail over the internet
DE10048939B4 (en)*1999-12-112010-08-19International Business Machines Corp. Conditional suppression of verification of a cardholder
US6968449B1 (en)*1999-12-152005-11-22Microsoft CorporationMethods and arrangements for providing a mark-up language based graphical user interface for user identification to an operating system
US7174454B2 (en)2002-11-192007-02-06America Online, Inc.System and method for establishing historical usage-based hardware trust
US7426530B1 (en)2000-06-122008-09-16Jpmorgan Chase Bank, N.A.System and method for providing customers with seamless entry to a remote server
US10185936B2 (en)2000-06-222019-01-22Jpmorgan Chase Bank, N.A.Method and system for processing internet payments
US7587368B2 (en)2000-07-062009-09-08David Paul FelsherInformation record infrastructure, system and method
US7222233B1 (en)*2000-09-142007-05-22At&T Corp.Method for secure remote backup
US8335855B2 (en)2001-09-192012-12-18Jpmorgan Chase Bank, N.A.System and method for portal infrastructure tracking
US7246263B2 (en)2000-09-202007-07-17Jpmorgan Chase BankSystem and method for portal infrastructure tracking
US6819219B1 (en)2000-10-132004-11-16International Business Machines CorporationMethod for biometric-based authentication in wireless communication for access control
FR2822002B1 (en)*2001-03-122003-06-06France Telecom CRYPTOGRAPHIC AUTHENTICATION BY EPHEMER MODULES
US7181017B1 (en)2001-03-232007-02-20David FelsherSystem and method for secure three-party communications
US7426730B2 (en)*2001-04-192008-09-16Wre-Hol LlcMethod and system for generalized and adaptive transaction processing between uniform information services and applications
US7702801B1 (en)*2001-04-192010-04-20Advanced Micro Devices, Inc.Determining logon status in a broadband network system and automatically restoring logon connectivity
US7020775B2 (en)2001-04-242006-03-28Microsoft CorporationDerivation and quantization of robust non-local characteristics for blind watermarking
US6973574B2 (en)*2001-04-242005-12-06Microsoft Corp.Recognizer of audio-content in digital signals
US6996273B2 (en)*2001-04-242006-02-07Microsoft CorporationRobust recognizer of perceptually similar content
US6975743B2 (en)*2001-04-242005-12-13Microsoft CorporationRobust and stealthy video watermarking into regions of successive frames
US7356188B2 (en)*2001-04-242008-04-08Microsoft CorporationRecognizer of text-based work
US7114078B2 (en)*2001-08-312006-09-26Qualcomm IncorporatedMethod and apparatus for storage of usernames, passwords and associated network addresses in portable memory
HK1038152A2 (en)*2001-09-102002-02-15何嘉威A method of digital signature
US7103576B2 (en)2001-09-212006-09-05First Usa Bank, NaSystem for providing cardless payment
US20040015243A1 (en)*2001-09-282004-01-22Dwyane MercrediBiometric authentication
AU2002363138A1 (en)2001-11-012003-05-12First Usa Bank, N.A.System and method for establishing or modifying an account with user selectable terms
US7194762B2 (en)*2001-11-302007-03-20Lenovo (Singapore) Pte. Ltd.Method of creating password list for remote authentication to services
US7092915B2 (en)*2002-01-072006-08-15International Business Machines CorporationPDA password management tool
US7941533B2 (en)2002-02-192011-05-10Jpmorgan Chase Bank, N.A.System and method for single sign-on session management without central server
US20040015702A1 (en)*2002-03-012004-01-22Dwayne MercrediUser login delegation
US7174017B2 (en)*2002-03-042007-02-06Lenovo Singapore Pte, LtdDecryption system for encrypted audio
US7353383B2 (en)2002-03-182008-04-01Jpmorgan Chase Bank, N.A.System and method for single session sign-on with cryptography
US7475260B2 (en)*2002-05-092009-01-06International Business Machines CorporationMethod and apparatus for protecting sensitive information in a log file
US20030221110A1 (en)*2002-05-232003-11-27Anton KryvoruchkoMethod of disposable command encoding (DCE) for security and anonymity protection in information system operations
US7246324B2 (en)2002-05-232007-07-17Jpmorgan Chase BankMethod and system for data capture with hidden applets
US7143174B2 (en)2002-06-122006-11-28The Jpmorgan Chase Bank, N.A.Method and system for delayed cookie transmission in a client-server architecture
US7444302B2 (en)*2002-06-142008-10-28Ellie Mae, Inc.Online system for fulfilling loan applications from loan originators
US7472171B2 (en)2002-06-212008-12-30Jpmorgan Chase Bank, National AssociationMethod and system for determining receipt of a delayed cookie in a client-server architecture
US7290144B1 (en)*2002-06-212007-10-30Paul Thomas KitajAccess-control method for software modules and programmable electronic device therefor
US7095873B2 (en)*2002-06-282006-08-22Microsoft CorporationWatermarking via quantization of statistics of overlapping regions
US7006703B2 (en)2002-06-282006-02-28Microsoft CorporationContent recognizer via probabilistic mirror distribution
US7472089B2 (en)*2002-08-152008-12-30Ellie Mae, Inc.Loan origination system interface for online loan application processing
US6938167B2 (en)*2002-12-182005-08-30America Online, Inc.Using trusted communication channel to combat user name/password theft
US7272231B2 (en)*2003-01-272007-09-18International Business Machines CorporationEncrypting data for access by multiple users
US9818136B1 (en)2003-02-052017-11-14Steven M. HoffbergSystem and method for determining contingent relevance
US20040158746A1 (en)*2003-02-072004-08-12Limin HuAutomatic log-in processing and password management system for multiple target web sites
US7376838B2 (en)2003-07-172008-05-20Jp Morgan Chase BankMethod for controlled and audited access to privileged accounts on computer systems
US7454783B2 (en)*2003-08-082008-11-18Metapass, Inc.System, method, and apparatus for automatic login
AU2004305800A1 (en)*2003-09-122005-03-31Emc CorporationSystem and method providing disconnected authentication
US7290278B2 (en)2003-10-022007-10-30Aol Llc, A Delaware Limited Liability CompanyIdentity based service system
US8190893B2 (en)2003-10-272012-05-29Jp Morgan Chase BankPortable security transaction protocol
US7421696B2 (en)2003-12-222008-09-02Jp Morgan Chase BankMethods and systems for managing successful completion of a network of processes
US7831832B2 (en)*2004-01-062010-11-09Microsoft CorporationDigital goods representation based upon matrix invariances
US20050165690A1 (en)*2004-01-232005-07-28Microsoft CorporationWatermarking via quantization of rational statistics of regions
US20050165684A1 (en)*2004-01-282005-07-28Saflink CorporationElectronic transaction verification system
US7770014B2 (en)*2004-04-302010-08-03Microsoft CorporationRandomized signal transforms and their applications
US7370166B1 (en)*2004-04-302008-05-06Lexar Media, Inc.Secure portable storage device
US20060069753A1 (en)*2004-06-182006-03-30Limin HuAutomatic web-based client-server application program update system
US8990254B2 (en)2004-07-022015-03-24Ellie Mae, Inc.Loan origination software system for processing mortgage loans over a distributed network
US8284942B2 (en)*2004-08-242012-10-09Microsoft CorporationPersisting private/public key pairs in password-encrypted files for transportation to local cryptographic store
US7552341B2 (en)*2004-09-012009-06-23Microsoft CorporationLicensing the use of software on a particular CPU
US20060059422A1 (en)*2004-09-162006-03-16Ting-Hu WuDesktop application implemented with web paradigm
EP1805929B1 (en)*2004-10-292010-08-11Thomson LicensingSecure authenticated channel
US20060101023A1 (en)*2004-11-052006-05-11Ellie Mae, Inc.Universal computing paradigm with single-code base utilizing a flexible distributed computing architecture
US20060130140A1 (en)*2004-12-142006-06-15International Business Machines CorporationSystem and method for protecting a server against denial of service attacks
US20060136741A1 (en)*2004-12-162006-06-22Saflink CorporationTwo factor token identification
US20060291700A1 (en)*2005-06-082006-12-28Ogram Mark EInternet signature verification system
US8185877B1 (en)2005-06-222012-05-22Jpmorgan Chase Bank, N.A.System and method for testing applications
US8583926B1 (en)2005-09-192013-11-12Jpmorgan Chase Bank, N.A.System and method for anti-phishing authentication
US8874477B2 (en)2005-10-042014-10-28Steven Mark HoffbergMultifactorial optimization system and method
US20070273684A1 (en)*2006-05-242007-11-29International Business Machines CorporationStorage media
US9106740B2 (en)*2006-06-232015-08-11The Invention Science Fund I, LlcTransferable device with alterable usage functionality
US8290509B2 (en)2006-06-232012-10-16The Invention Science Fund I, LlcDeactivation system and method for a transferable device
US8793490B1 (en)2006-07-142014-07-29Jpmorgan Chase Bank, N.A.Systems and methods for multifactor authentication
US8307217B2 (en)*2007-02-022012-11-06Lee Lane WTrusted storage
US8473735B1 (en)2007-05-172013-06-25Jpmorgan ChaseSystems and methods for managing digital certificates
US9672333B2 (en)2007-05-252017-06-06Adobe Systems IncorporatedTrusted storage
US8046827B2 (en)*2007-06-122011-10-25Francisco CorellaAccess control of interaction context of application
US7975292B2 (en)*2007-06-122011-07-05Francisco CorellaSecure password reset for application
US8600798B1 (en)2007-09-212013-12-03Ellie Mae, Inc.Loan screening
US8353015B2 (en)2008-01-092013-01-08Microsoft CorporationTrusted internet identity
US8321682B1 (en)2008-01-242012-11-27Jpmorgan Chase Bank, N.A.System and method for generating and managing administrator passwords
US8402522B1 (en)2008-04-172013-03-19Morgan StanleySystem and method for managing services and jobs running under production IDs without exposing passwords for the production IDs to humans
US20100228987A1 (en)*2009-03-062010-09-09Sony CorporationSystem and method for securing information using remote access control and data encryption
US9608826B2 (en)2009-06-292017-03-28Jpmorgan Chase Bank, N.A.System and method for partner key management
US8549314B2 (en)2010-04-292013-10-01King Saud UniversityPassword generation methods and systems
CN102063479A (en)*2010-12-222011-05-18北京中电普华信息技术有限公司Method and system for controlling data access right
US9471772B2 (en)2011-06-012016-10-18Paypal, Inc.Password check by decomposing password
US9146881B2 (en)*2011-06-032015-09-29Commandhub, Inc.Mobile data vault
US9218462B2 (en)*2012-04-252015-12-22Hewlett Packard Enterprise Development LpAuthentication using lights-out management credentials
US9419957B1 (en)2013-03-152016-08-16Jpmorgan Chase Bank, N.A.Confidence-based authentication
US9305172B2 (en)*2013-03-152016-04-05Mcafee, Inc.Multi-ring encryption approach to securing a payload using hardware modules
US9692753B2 (en)2014-01-172017-06-27Safecard, LlcPassword encode card system and method
US10148726B1 (en)2014-01-242018-12-04Jpmorgan Chase Bank, N.A.Initiating operating system commands based on browser cookies
US9590956B1 (en)2015-12-182017-03-07Wickr Inc.Decentralized authoritative messaging
CN108171078B (en)*2017-12-272021-08-31中国信息安全测评中心 A data preservation method and device for a third-party cloud platform evaluation system
US11645381B2 (en)*2020-12-112023-05-09International Business Machines CorporationUser configured one-time password
US12238101B2 (en)*2021-03-092025-02-25Oracle International CorporationCustomizing authentication and handling pre and post authentication in identity cloud service
CN114124529B (en)*2021-11-232024-03-29国网山东省电力公司电力科学研究院 Method and device for encryption/decryption of grid-connected test data, data processing method and device

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5485519A (en)*1991-06-071996-01-16Security Dynamics Technologies, Inc.Enhanced security for a secure token code
JP2862030B2 (en)*1991-06-131999-02-24三菱電機株式会社 Encryption method
US5710817A (en)*1992-08-251998-01-20Icl Systems AbMethod and device for preventing unauthorized access to a computer system
FR2704341B1 (en)*1993-04-221995-06-02Bull Cp8 Device for protecting the keys of a smart card.
NZ296340A (en)*1994-10-282000-01-28Surety Technologies IncDigital identification and authentication of documents by creating repository of hash values based on documents
US5604801A (en)*1995-02-031997-02-18International Business Machines CorporationPublic key data communications system under control of a portable security device
US5666416A (en)*1995-10-241997-09-09Micali; SilvioCertificate revocation system
US5608801A (en)*1995-11-161997-03-04Bell Communications Research, Inc.Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions
US5719941A (en)*1996-01-121998-02-17Microsoft CorporationMethod for changing passwords on a remote computer
US5835595A (en)*1996-09-041998-11-10At&T CorpMethod and apparatus for crytographically protecting data
US5796827A (en)*1996-11-141998-08-18International Business Machines CorporationSystem and method for near-field human-body coupling for encrypted communication with identification cards
US6081893A (en)*1997-05-282000-06-27Symantec CorporationSystem for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

Cited By (76)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8261319B2 (en)*1995-10-242012-09-04Corestreet, Ltd.Logging access attempts to an area
US20050044402A1 (en)*1995-10-242005-02-24Phil LibinLogging access attempts to an area
US20130120109A1 (en)*1995-10-242013-05-16Phil LibinLogging access attempts to an area
US9158288B2 (en)*1995-10-242015-10-13Assa Abloy AbLogging access attempts to an area
US7818253B2 (en)1998-06-222010-10-19Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US7809643B2 (en)1998-06-222010-10-05Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US7809642B1 (en)1998-06-222010-10-05Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US7805368B2 (en)1998-06-222010-09-28Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US8005756B2 (en)1998-06-222011-08-23Jpmorgan Chase Bank, N.A.Debit purchasing of stored value card for use by and/or delivery to others
US7801799B1 (en)1998-11-172010-09-21Jpmorgan Chase Bank, N.A.Customer activated multi-value (CAM) card
US8590008B1 (en)1999-07-022013-11-19Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US7966496B2 (en)1999-07-022011-06-21Jpmorgan Chase Bank, N.A.System and method for single sign on process for websites with multiple applications and services
US8793160B2 (en)1999-12-072014-07-29Steve SoremSystem and method for processing transactions
US10380374B2 (en)2001-04-202019-08-13Jpmorgan Chase Bank, N.A.System and method for preventing identity theft or misuse by restricting access
US8849716B1 (en)2001-04-202014-09-30Jpmorgan Chase Bank, N.A.System and method for preventing identity theft or misuse by restricting access
US7801816B2 (en)2001-05-232010-09-21Jp Morgan Chase Bank, N.A.System and method for currency selectable stored value instrument
US8160960B1 (en)2001-06-072012-04-17Jpmorgan Chase Bank, N.A.System and method for rapid updating of credit information
US8185940B2 (en)2001-07-122012-05-22Jpmorgan Chase Bank, N.A.System and method for providing discriminated content to network users
US8515868B2 (en)2001-07-242013-08-20Jpmorgan Chase Bank, N.A.Multiple account advanced payment card and method of routing card transactions
US7890422B1 (en)2001-07-242011-02-15Jpmorgan Chase Bank, N.A.Multiple account advanced payment card and method of routing card transactions
US7860789B2 (en)2001-07-242010-12-28Jpmorgan Chase Bank, N.A.Multiple account advanced payment card and method of routing card transactions
US8751383B2 (en)2001-07-242014-06-10Jpmorgan Chase Bank, N.A.Multiple account advanced payment card and method of routing card transactions
US8020754B2 (en)2001-08-132011-09-20Jpmorgan Chase Bank, N.A.System and method for funding a collective account by use of an electronic tag
US20080010202A1 (en)*2001-08-132008-01-10First Usa Bank, N.A.System and method for funding a collective account by use of an electronic tag
US7987501B2 (en)2001-12-042011-07-26Jpmorgan Chase Bank, N.A.System and method for single session sign-on
US8707410B2 (en)2001-12-042014-04-22Jpmorgan Chase Bank, N.A.System and method for single session sign-on
US9240089B2 (en)2002-03-252016-01-19Jpmorgan Chase Bank, N.A.Systems and methods for time variable financial authentication
US7899753B1 (en)2002-03-252011-03-01Jpmorgan Chase Bank, N.ASystems and methods for time variable financial authentication
US10726417B1 (en)2002-03-252020-07-28Jpmorgan Chase Bank, N.A.Systems and methods for multifactor authentication
US8751391B2 (en)2002-03-292014-06-10Jpmorgan Chase Bank, N.A.System and process for performing purchase transactions using tokens
US10282536B1 (en)2002-03-292019-05-07Jpmorgan Chase Bank, N.A.Method and system for performing purchase and other transactions using tokens with multiple chips
US20030226040A1 (en)*2002-06-032003-12-04International Business Machines CorporationControlling access to data stored on a storage device of a trusted computing platform system
US7809595B2 (en)2002-09-172010-10-05Jpmorgan Chase Bank, NaSystem and method for managing risks associated with outside service providers
US7392941B2 (en)*2002-09-262008-07-01Samsung Electronics Co., Ltd.Security monitor apparatus and method using smart card
US20040129776A1 (en)*2002-09-262004-07-08Samsung Electronics Co., Ltd.Security monitor apparatus and method using smart card
US7756816B2 (en)2002-10-022010-07-13Jpmorgan Chase Bank, N.A.System and method for network-based project management
US20060053125A1 (en)*2002-10-022006-03-09Bank One CorporationSystem and method for network-based project management
US8301493B2 (en)2002-11-052012-10-30Jpmorgan Chase Bank, N.A.System and method for providing incentives to consumers to share information
US8306907B2 (en)2003-05-302012-11-06Jpmorgan Chase Bank N.A.System and method for offering risk-based interest rates in a credit instrument
US8145549B2 (en)2003-05-302012-03-27Jpmorgan Chase Bank, N.A.System and method for offering risk-based interest rates in a credit instutment
US20070008128A1 (en)*2003-08-252007-01-11Honda Motor Co., Ltd.Information communication system, and physical distribution system using the information communication system
US8447672B2 (en)2005-05-272013-05-21Jp Morgan Chase Bank, N.A.Universal payment protection
US8447670B1 (en)2005-05-272013-05-21Jp Morgan Chase Bank, N.A.Universal payment protection
US8473395B1 (en)2005-05-272013-06-25Jpmorgan Chase Bank, NaUniversal payment protection
US9577990B2 (en)2005-12-212017-02-21International Business Machines CorporationControl of access to a secondary system
US9087180B2 (en)*2005-12-212015-07-21International Business Machines CorporationControl of access to a secondary system
US20130275764A1 (en)*2005-12-212013-10-17International Business Machines CorporationControl of access to a secondary system
US20070186106A1 (en)*2006-01-262007-08-09Ting David MSystems and methods for multi-factor authentication
US9118656B2 (en)2006-01-262015-08-25Imprivata, Inc.Systems and methods for multi-factor authentication
US7774829B2 (en)*2006-06-202010-08-10Lenovo (Singapore) Pte. Ltd.Computer access control using password reset
US20080022393A1 (en)*2006-06-202008-01-24Lenovo (Singapore) Pte. Ltd.Computer access control using password reset
US20090125725A1 (en)*2007-11-092009-05-14Samsung Electronics Co. Ltd.External memory access device and method of accessing external memory
US8200989B2 (en)*2007-11-092012-06-12Samsung Electronics Co., Ltd.External memory access device and method of accessing external memory
US20090210720A1 (en)*2008-02-202009-08-20Tatung CompanyMethod for generating one-time password
US8660914B2 (en)2008-09-122014-02-25British Telecommunications PlcControl of supply networks and verification of items
US20110167010A1 (en)*2008-09-122011-07-07Andrea SopperaControl of supply networks and verification of items
US20100124331A1 (en)*2008-11-182010-05-20Qualcomm IncorpratedSpectrum authorization and related communications methods and apparatus
US8848914B2 (en)*2008-11-182014-09-30Qualcomm IncorporatedSpectrum authorization and related communications methods and apparatus
US8161527B2 (en)*2009-01-232012-04-17Edward CurrenSecurity Enhanced Data Platform
US20100189251A1 (en)*2009-01-232010-07-29Edward CurrenSecurity Enhanced Data Platform
US20100299534A1 (en)*2009-05-222010-11-25Samsung Electronics Co., Ltd.Data storage device and data storage system
US8589680B2 (en)2010-04-072013-11-19Apple Inc.System and method for synchronizing encrypted data on a device having file-level content protection
US8756419B2 (en)2010-04-072014-06-17Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US11263020B2 (en)2010-04-072022-03-01Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US8510552B2 (en)*2010-04-072013-08-13Apple Inc.System and method for file-level data protection
US9912476B2 (en)2010-04-072018-03-06Apple Inc.System and method for content protection based on a combination of a user PIN and a device specific identifier
US20110252234A1 (en)*2010-04-072011-10-13Apple Inc.System and method for file-level data protection
US10025597B2 (en)2010-04-072018-07-17Apple Inc.System and method for wiping encrypted data on a device having file-level content protection
US10348497B2 (en)2010-04-072019-07-09Apple Inc.System and method for content protection based on a combination of a user pin and a device specific identifier
US10176317B2 (en)*2013-12-252019-01-08Beijing Qihoo Technology Company LimitedMethod and apparatus for managing super user password on smart mobile terminal
US10154013B1 (en)2015-03-132018-12-11Amazon Technologies, Inc.Updating encrypted cryptographic key
US9893885B1 (en)2015-03-132018-02-13Amazon Technologies, Inc.Updating cryptographic key pair
US9674162B1 (en)2015-03-132017-06-06Amazon Technologies, Inc.Updating encrypted cryptographic key pair
US9479340B1 (en)*2015-03-302016-10-25Amazon Technologies, Inc.Controlling use of encryption keys
US10116645B1 (en)2015-03-302018-10-30Amazon Technologies, Inc.Controlling use of encryption keys
US10003467B1 (en)2015-03-302018-06-19Amazon Technologies, Inc.Controlling digital certificate use

Also Published As

Publication numberPublication date
US6081893A (en)2000-06-27
US6408389B2 (en)2002-06-18
US6339828B1 (en)2002-01-15

Similar Documents

PublicationPublication DateTitle
US6081893A (en)System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US6044155A (en)Method and system for securely archiving core data secrets
US6389535B1 (en)Cryptographic protection of core data secrets
US6968456B1 (en)Method and system for providing a tamper-proof storage of an audit trail in a database
US6230272B1 (en)System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
US6671804B1 (en)Method and apparatus for supporting authorities in a public key infrastructure
US7526654B2 (en)Method and system for detecting a secure state of a computer system
US5745573A (en)System and method for controlling access to a user secret
US6134327A (en)Method and apparatus for creating communities of trust in a secure communication system
CA2341784C (en)Method to deploy a pki transaction in a web browser
US5774552A (en)Method and apparatus for retrieving X.509 certificates from an X.500 directory
US5237614A (en)Integrated network security system
US5872848A (en)Method and apparatus for witnessed authentication of electronic documents
US6745327B1 (en)Electronic certificate signature program
US6334118B1 (en)Software rental system and method for renting software
US7844832B2 (en)System and method for data source authentication and protection system using biometrics for openly exchanged computer files
KR100702499B1 (en) Message Integrity Assurance Systems, Methods, and Recording Media
US20080162943A1 (en)Biometric security system and method
US8566952B1 (en)System and method for encrypting data and providing controlled access to encrypted data with limited additional access
US6215872B1 (en)Method for creating communities of trust in a secure communication system
KR20010052105A (en)Cryptographic key generation using biometric data
US5878143A (en)Secure transmission of sensitive information over a public/insecure communications medium
US7076062B1 (en)Methods and arrangements for using a signature generating device for encryption-based authentication
US20080098214A1 (en)Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media
US20030196090A1 (en)Digital signature system

Legal Events

DateCodeTitleDescription
STCFInformation on status: patent grant

Free format text:PATENTED CASE

CCCertificate of correction
FPAYFee payment

Year of fee payment:4

FEPPFee payment procedure

Free format text:PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAYFee payment

Year of fee payment:8

FPAYFee payment

Year of fee payment:12

ASAssignment

Owner name:CA, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYMANTEC CORPORATION;REEL/FRAME:051144/0918

Effective date:20191104


[8]ページ先頭

©2009-2025 Movatter.jp