Movatterモバイル変換


[0]ホーム

URL:


US20150172272A1 - Distributed storage of password data - Google Patents

Distributed storage of password data
Download PDF

Info

Publication number
US20150172272A1
US20150172272A1US14/132,948US201314132948AUS2015172272A1US 20150172272 A1US20150172272 A1US 20150172272A1US 201314132948 AUS201314132948 AUS 201314132948AUS 2015172272 A1US2015172272 A1US 2015172272A1
Authority
US
United States
Prior art keywords
password
processing device
salt
hash
data set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/132,948
Other versions
US9077710B1 (en
Inventor
David Levner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SABAKI Corp
Original Assignee
SABAKI Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SABAKI CorpfiledCriticalSABAKI Corp
Priority to US14/132,948priorityCriticalpatent/US9077710B1/en
Assigned to SABAKI CORPORATIONreassignmentSABAKI CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: LEVNER, DAVID, MR.
Assigned to SABAKI CORPORATIONreassignmentSABAKI CORPORATIONCORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S STATE IS NEW YORK, NOT NASA. PREVIOUSLY RECORDED ON REEL 031811 FRAME 0923. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE'S STATE IS NEW YORK. SEE FIRST 9 LINES OF ORIGINAL ASSIGNMENT ATTACHED HEREWITH..Assignors: LEVNER, DAVID, MR.
Priority to PCT/US2014/061399prioritypatent/WO2015105557A2/en
Publication of US20150172272A1publicationCriticalpatent/US20150172272A1/en
Application grantedgrantedCritical
Publication of US9077710B1publicationCriticalpatent/US9077710B1/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

To better protect passwords used for authentication or for generating cryptographic keys, methods and apparatuses may store password data on multiple storage devices. For each password, each subset of multiple distinct subsets of a data set may be sufficient to authenticate a trial password or generate a cryptographic key. A first subset enables a quick method for authenticating the trial password or generating the cryptographic key. The first subset may be stored in a distributed manner to make it more difficult to steal. If the first subset is unavailable, then a second subset, which is stored centrally, may be used to authenticate the trial password or generate the cryptographic key, but with a method that is an order of magnitude slower than the quick method. Brute force and dictionary attacks based on the second subset may take much longer than such attacks based on the quick method.

Description

Claims (16)

I claim as my invention:
1. A processing device implemented method for generating and storing a data set for a password, and for either authenticating a trial password, or for attempting to generate a cryptographic key, the method comprising:
performing a first method; and
performing either a second method or a third method, wherein:
the first method comprises:
generating the data set, based at least partly, on the password, the data set including at least two distinct subsets, each of the two distinct subsets being sufficient either to perform a password authentication process or to generate a cryptographic key, storing a plurality of data elements of the data set on a first storage device, at least one of the plurality of data elements stored on the first storage device is included in a first subset of the data set, and
storing at least one other data element of the data set on a second storage device, at least one of the at least one other data element is included in the first subset of the data set;
the second method comprises:
either
authenticating the trial password, based on the first subset, when the first subset is available,
or
attempting to generate the cryptographic key, based, at least partly, on the first subset and the trial password, when the first subset is available; and
the third method comprises:
either
authenticating the trial password, based on a second subset of the data set, when the second subset is available,
or
attempting to generate the cryptographic key, based, at least partly, on a second subset of the cryptographic key data set and the trial password, when the second subset is available;
wherein:
each of the first method, the second method and the third method are performed by at least one respective processing device,
the first subset is different from the second subset,
the second method is different from the third method, and
the second method is at least twice as fast as the third method.
2. The processing device implemented method ofclaim 1, wherein:
the second storage device is not permanently connected to any of the at least one processing device that performs the second method.
3. The processing device implemented method ofclaim 1, wherein the second storage device is a removable storage device.
4. The processing device implemented method ofclaim 1, wherein:
the first method further comprises:
applying a one-way function to a combination, based on one or more of the at least one other data element that belongs to the first subset of the data set, to produce a first hash which is included in the data set, and
storing the first hash on the first storage device;
the second method further comprises:
providing the first hash and the one or more of the at least one other data element to one or more processing devices of the at least one processing device that performs the second method,
applying the one-way function to the combination to produce a second hash, and
either failing to authenticate the trial password, or failing to generate the cryptographic key, when the first hash is different from the second hash.
5. The processing device implemented method ofclaim 2, wherein:
the data set comprises a first salt, a second salt, a first hash and a second hash,
the first subset comprises the first hash and the first salt,
the second subset comprises the second hash and the second salt,
the first hash, the second hash and the second salt are stored on the first storage device,
the first salt is stored on the second storage device, and
the processing device implemented method further comprises:
obtaining, by the any of the at least one processing device that performs the second method, the first salt, if available;
obtaining the trial password by the any of the at least one processing device that performs the second method or any of the at least one processing device that performs the third method;
when the first salt is available, obtaining the first hash and performing the second method; and
when the first salt is unavailable, obtaining the second hash and the second salt and performing the third method.
6. The processing device implemented method ofclaim 2, wherein:
the data set comprises a salt, a first hash and a second hash,
the first subset comprises the salt and the first hash,
the second subset comprises the salt and the second hash,
the salt and the second hash are stored on the first storage device,
the first hash is stored on the second storage device, and
the processing device implemented method further comprises:
obtaining, by the any of the at least one processing device that performs the second method, the first hash, if available;
obtaining the trial password by the any of the at least one processing device that performs the second method or any of the at least one processing device that performs the third method;
when the first hash is available, obtaining the salt and performing the second method; and
when the first hash is unavailable, obtaining the salt and the second hash and performing the third method.
7. The processing device implemented method ofclaim 2, wherein:
the data set comprises a first salt, a second salt and a hash,
the first subset comprises the second salt and the hash,
the second subset comprises the first salt and the hash,
the first salt and the hash are stored on the first storage device,
the second salt is stored on the second storage device, and
the processing device implemented method further comprises:
obtaining, by the any of the at least one processing device that performs the second method, the second salt, if available;
obtaining the trial password by the any of the at least one processing device that performs the second method or any of the at least one processing device that performs the third method;
when the second salt is available, obtaining the hash and performing the second method; and
when the second salt is unavailable, obtaining the second salt and the hash and performing the third method.
8. The processing device implemented method ofclaim 2, wherein:
the data set comprises a complete salt, a partial salt and a hash,
the partial salt includes only some of the bits that represent a value of the complete salt,
the first subset comprises the complete salt and the hash,
the second subset comprises the partial salt and the hash,
the partial salt and the hash are stored on the first storage device,
the complete salt is stored on the second storage device, and
the processing device implemented method further comprises:
obtaining, by the any of the at least one processing device that performs the second method, the complete salt, if available;
obtaining the trial password by the any of the at least one processing device that performs the second method or any of the at least one processing device that performs the third method;
when the complete salt is available, obtaining the hash and performing the second method; and
when the complete salt is unavailable, obtaining the partial salt and the hash and performing the third method.
9. The processing device implemented method ofclaim 7, further comprising:
generating the second salt by an iterative process; and
terminating the iterative process based, at least partly, on at least one randomly generated number.
10. The processing device implemented method ofclaim 2, wherein:
the data set comprises a first set of coefficients of a polynomial equation and a numerical solution to the polynomial equation,
a second set of coefficients of the polynomial equation are derivable from the password,
the first set of coefficients and the second set of coefficients are disjoint and the union of the two sets contains all coefficients of the polynomial equation,
the first subset comprises the first set of coefficients and the numerical solution,
the second subset comprises the first set of coefficients,
the first set of coefficients of the polynomial equation are stored on the first storage device,
the numerical solution to the polynomial equation is stored on the second storage device, and
the processing device implemented method further comprises:
obtaining, by the any of the at least one processing device that performs the second method, the numerical solution, if available;
obtaining the trial password by the any of the at least one processing device that performs the second method or any of the at least one processing device that performs the third method;
deriving the second set of coefficients from the trial password by the any of the at least one processing device that performs either the second method or the third method;
obtaining the first set of coefficients by the any of the at least one processing device that performs either the second method or the third method;
when the numerical solution is available, performing the second method; and
when the numerical solution is unavailable, performing the third method.
11. The processing device implemented method ofclaim 2, further comprising:
generating the cryptographic key from a combination including at least one data element of the plurality of data elements of the data set stored on the first storage device and one or more data elements of the at least one other data element of the data set stored on the second storage device.
12. The processing device implemented method ofclaim 11 wherein the combination further includes the trial password.
13. A processing device implemented method for either authenticating a password or generating a cryptographic key, the method comprising:
obtaining a trial password;
obtaining a subset of a data set wherein at least one data element of the data set was generated by a first iterative process, termination of the first iterative process being based, at least partly, on at least one randomly generated number; and
performing a calculation, based, at least partly, on the trial password, the calculation comprising a second iterative process that, during each iteration, performs calculations which are mathematically equivalent to calculations performed by the first iterative process, during a respective iteration of the first iterative process; wherein:
either
the second iterative process terminates successfully, indicating successful authentication of the password or successful generation of the cryptographic key, if at least one data element, that the second iterative process generates during an iteration, matches the at least one data element of the data set that was generated by the first iterative process;
or
the second iterative process terminates without success, indicating either unsuccessful authentication of the password or a failure to generate the cryptographic key, based on a calculation that includes at least one item from a group of items consisting of a number of iterations already performed, a time elapsed from a start of the second iterative process, and at least one random number, and
the method is performed by at least one processing device.
14. At least one processing device, each of the at least one processing device comprising:
at least one processor; and
at least one memory connected to one or more respective processors of the at least one processor, the at least one memory having instructions stored therein for the one or more respective processors of the at least one processor to perform a method for generating and storing a data set for a password, and either the data set is for authenticating a trial password or the data set is for generating a cryptographic key, the method comprising:
performing a first method; and
performing either a second method or a third method; wherein:
the first method comprises:
generating the data set, based at least partly, on the password, the data set including at least two distinct subsets that are each sufficient to perform either a password authentication process or a cryptographic key generation process;
storing a plurality of data elements of the data set on a first storage device, at least one of the plurality of data elements stored on the first storage device is included in a first subset of the data set; and
storing at least one other data element of the data set on a second storage device, at least one of the at least one other data element is included in the first subset of the data set;
the second method comprises:
either authenticating the trial password, or generating the cryptographic key, based on the first subset, when the first subset is available; and
the third method comprises:
either authenticating the trial password, or generating the cryptographic key, based on a second subset of the data set, when the second subset is available; wherein:
the first subset is different from the second subset,
the second method is different from the third method, and
the second method is at least twice as fast as the third method.
15. The at least one processing device ofclaim 14, wherein
the second storage device is not permanently connected to the at least one processing device.
16. The at least one processing device ofclaim 14, wherein
the second storage device is a removable storage device.
US14/132,9482013-12-182013-12-18Distributed storage of password dataExpired - Fee RelatedUS9077710B1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/132,948US9077710B1 (en)2013-12-182013-12-18Distributed storage of password data
PCT/US2014/061399WO2015105557A2 (en)2013-12-182014-10-20Distributed storage of password data

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US14/132,948US9077710B1 (en)2013-12-182013-12-18Distributed storage of password data

Publications (2)

Publication NumberPublication Date
US20150172272A1true US20150172272A1 (en)2015-06-18
US9077710B1 US9077710B1 (en)2015-07-07

Family

ID=53369900

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US14/132,948Expired - Fee RelatedUS9077710B1 (en)2013-12-182013-12-18Distributed storage of password data

Country Status (2)

CountryLink
US (1)US9077710B1 (en)
WO (1)WO2015105557A2 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9246686B1 (en)*2014-06-172016-01-26Amazon Technologies, Inc.Salt value service
US9277049B1 (en)*2013-03-072016-03-01Serdar Artun DanisSystems and methods for caller ID and call destination authentication
US9374221B1 (en)*2013-12-202016-06-21Emc CorporationDistributed protection of credential stores utilizing multiple keys derived from a master key
US9536067B1 (en)*2014-01-012017-01-03Bryant Christopher LeePassword submission without additional user input
US20170111168A1 (en)*2015-09-022017-04-20International Business Machines CorporationBluesalt security
US9660980B1 (en)*2014-04-212017-05-23Google Inc.Methods and systems of authenticating a password
US20170171185A1 (en)*2015-12-112017-06-15International Business Machines CorporationServer-assisted authentication
US20170201550A1 (en)*2016-01-102017-07-13Apple Inc.Credential storage across multiple devices
US20170214712A1 (en)*2016-01-252017-07-27Aol Inc.Compromised password detection based on abuse and attempted abuse
US10025918B2 (en)*2014-06-122018-07-17Thomson LicensingApparatus and method for password authentication
CN109302284A (en)*2018-09-282019-02-01北京金山安全软件有限公司Hardware wallet
US20190303561A1 (en)*2018-04-022019-10-03International Business Machines CorporationProducing volatile password hashing algorithm salts from hardware random number generators
US20200120081A1 (en)*2018-10-112020-04-16Ca, Inc.User authentication based on biometric passwords
US10790967B1 (en)*2019-11-182020-09-29Capital One Services, LlcServer side authentication
US11093591B1 (en)*2018-02-212021-08-17Wells Fargo Bank, N.A.Identity verification
US11138158B2 (en)2019-05-202021-10-05Callplex, Inc.Binding a local data storage device to remote data storage
US11144620B2 (en)*2018-06-262021-10-12Counseling and Development, Inc.Systems and methods for establishing connections in a network following secure verification of interested parties
US20220045848A1 (en)*2020-08-072022-02-10Charter Communications Operating, LlcPassword security hardware module
IT202000029357A1 (en)*2020-12-012022-06-01F&F S R L METHOD, SYSTEM, DEVICE AND USE FOR THE PROTECTION OF A USER ACCOUNT WITH A VARIABLE PASSWORD FOR EACH ACCOUNT BUT IMMUTABLE FOR THE USER
US20220330016A1 (en)*2020-04-032022-10-13Nxp B.V.Client privacy preserving session resumption
US20230082633A1 (en)*2021-09-132023-03-16Cloud Linux Software Inc.Systems and methods for rapid password compromise evalution
US20240372841A1 (en)*2018-12-042024-11-07Journey.aiReceiving information through a zero-knowledge data management network

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9552245B1 (en)*2014-10-282017-01-24Intuit Inc.Resolving errors that arise while accessing online user accounts
JP5985590B2 (en)*2014-11-262016-09-06京セラドキュメントソリューションズ株式会社 Authentication apparatus and authentication method
US9984247B2 (en)*2015-11-192018-05-29International Business Machines CorporationPassword theft protection for controlling access to computer software
US11323247B2 (en)*2017-10-272022-05-03Quantropi Inc.Methods and systems for secure data communication

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030204724A1 (en)*2002-04-302003-10-30Microsoft CorporationMethods for remotely changing a communications password
US20110202773A1 (en)*2010-02-182011-08-18Lahouari GhoutiMethod of generating a password protocol using elliptic polynomial cryptography
US20130125221A1 (en)*2007-06-012013-05-16Sunil AgrawalSystem and Method for Secure Password-Based Authentication

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6079021A (en)1997-06-022000-06-20Digital Equipment CorporationMethod and apparatus for strengthening passwords for protection of computer systems
HUP0203134A2 (en)*2000-02-212003-01-28Trek 2000 Int LtdA portable data storage device
US6959394B1 (en)*2000-09-292005-10-25Intel CorporationSplitting knowledge of a password
US7228417B2 (en)*2002-02-262007-06-05America Online, Inc.Simple secure login with multiple-authentication providers
US7073068B2 (en)2002-05-242006-07-04Lucent Technologies Inc.Method and apparatus for distributing shares of a password for use in multi-server password authentication
US20080209226A1 (en)*2007-02-282008-08-28Microsoft CorporationUser Authentication Via Biometric Hashing
US8769637B2 (en)*2007-03-232014-07-01Sap AgIterated password hash systems and methods for preserving password entropy
US8254571B1 (en)2007-12-212012-08-28Voltage Security, Inc.Cryptographic system with halting key derivation function capabilities
KR100957121B1 (en)*2008-02-222010-05-13성균관대학교산학협력단 Key distribution method and certificate server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030204724A1 (en)*2002-04-302003-10-30Microsoft CorporationMethods for remotely changing a communications password
US20130125221A1 (en)*2007-06-012013-05-16Sunil AgrawalSystem and Method for Secure Password-Based Authentication
US20110202773A1 (en)*2010-02-182011-08-18Lahouari GhoutiMethod of generating a password protocol using elliptic polynomial cryptography

Cited By (41)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9277049B1 (en)*2013-03-072016-03-01Serdar Artun DanisSystems and methods for caller ID and call destination authentication
US9374221B1 (en)*2013-12-202016-06-21Emc CorporationDistributed protection of credential stores utilizing multiple keys derived from a master key
US9536067B1 (en)*2014-01-012017-01-03Bryant Christopher LeePassword submission without additional user input
US9660980B1 (en)*2014-04-212017-05-23Google Inc.Methods and systems of authenticating a password
US10025918B2 (en)*2014-06-122018-07-17Thomson LicensingApparatus and method for password authentication
US9246686B1 (en)*2014-06-172016-01-26Amazon Technologies, Inc.Salt value service
US9692596B2 (en)*2015-09-022017-06-27International Business Machines CorporationBluesalt security
US20170111169A1 (en)*2015-09-022017-04-20International Business Machines CorporationBluesalt security
US9698982B2 (en)*2015-09-022017-07-04International Business Machines CorporationBluesalt security
US9736122B2 (en)2015-09-022017-08-15International Business Machines CorporationBluesalt security
US20170111168A1 (en)*2015-09-022017-04-20International Business Machines CorporationBluesalt security
US20170171185A1 (en)*2015-12-112017-06-15International Business Machines CorporationServer-assisted authentication
US10091190B2 (en)*2015-12-112018-10-02International Business Machines CorporationServer-assisted authentication
US20170201550A1 (en)*2016-01-102017-07-13Apple Inc.Credential storage across multiple devices
US20170214712A1 (en)*2016-01-252017-07-27Aol Inc.Compromised password detection based on abuse and attempted abuse
US10270801B2 (en)*2016-01-252019-04-23Oath Inc.Compromised password detection based on abuse and attempted abuse
US10530807B2 (en)*2016-01-252020-01-07Oath Inc.Compromised password detection based on abuse and attempted abuse
US11609975B1 (en)2018-02-212023-03-21Wells Fargo Bank, N.A.Identity verification
US11093591B1 (en)*2018-02-212021-08-17Wells Fargo Bank, N.A.Identity verification
US10776480B2 (en)*2018-04-022020-09-15International Business Machines CorporationProducing volatile password hashing algorithm salts from hardware random number generators
US20190303561A1 (en)*2018-04-022019-10-03International Business Machines CorporationProducing volatile password hashing algorithm salts from hardware random number generators
US11907344B2 (en)2018-06-262024-02-20Counseling and Development, Inc.Systems and methods for establishing connections in a network for matched parties
US11144620B2 (en)*2018-06-262021-10-12Counseling and Development, Inc.Systems and methods for establishing connections in a network following secure verification of interested parties
US11734398B2 (en)2018-06-262023-08-22Counseling and Development, Inc.Systems and methods for establishing connections in a network following secure verification of interested parties
CN109302284A (en)*2018-09-282019-02-01北京金山安全软件有限公司Hardware wallet
US20200120081A1 (en)*2018-10-112020-04-16Ca, Inc.User authentication based on biometric passwords
US12363081B2 (en)*2018-12-042025-07-15Journey.aiReceiving information through a zero-knowledge data management network
US20240372841A1 (en)*2018-12-042024-11-07Journey.aiReceiving information through a zero-knowledge data management network
US11138158B2 (en)2019-05-202021-10-05Callplex, Inc.Binding a local data storage device to remote data storage
US11606192B2 (en)*2019-11-182023-03-14Capital One Services, LlcServer side authentication
WO2021101871A1 (en)*2019-11-182021-05-27Capital One Services, LlcServer side authentication
US12081650B2 (en)*2019-11-182024-09-03Capital One Services, LlcServer side authentication
US20210152333A1 (en)*2019-11-182021-05-20Capital One Services, LlcServer Side Authentication
US10790967B1 (en)*2019-11-182020-09-29Capital One Services, LlcServer side authentication
US20220330016A1 (en)*2020-04-032022-10-13Nxp B.V.Client privacy preserving session resumption
US11770700B2 (en)*2020-04-032023-09-26Nxp B.V.Client privacy preserving session resumption
US20220045848A1 (en)*2020-08-072022-02-10Charter Communications Operating, LlcPassword security hardware module
US12184765B2 (en)*2020-08-072024-12-31Charter Communications Operating, LlcPassword security hardware module
IT202000029357A1 (en)*2020-12-012022-06-01F&F S R L METHOD, SYSTEM, DEVICE AND USE FOR THE PROTECTION OF A USER ACCOUNT WITH A VARIABLE PASSWORD FOR EACH ACCOUNT BUT IMMUTABLE FOR THE USER
US20230082633A1 (en)*2021-09-132023-03-16Cloud Linux Software Inc.Systems and methods for rapid password compromise evalution
US12101315B2 (en)*2021-09-132024-09-24Cloud Linux Software Inc.Systems and methods for rapid password compromise evaluation

Also Published As

Publication numberPublication date
US9077710B1 (en)2015-07-07
WO2015105557A3 (en)2015-11-05
WO2015105557A2 (en)2015-07-16

Similar Documents

PublicationPublication DateTitle
US9077710B1 (en)Distributed storage of password data
JP3230238U (en) A system for securely storing electronic data
Huang et al.A generic framework for three-factor authentication: Preserving security and privacy in distributed systems
EP3824592B1 (en)Public-private key pair protected password manager
KR102493744B1 (en) Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server
Halderman et al.A convenient method for securely managing passwords
US9009484B2 (en)Method and system for securing communication
Blocki et al.Designing proof of human-work puzzles for cryptocurrency and beyond
Amin et al.Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems
US8918849B2 (en)Secure user credential control
US20090150991A1 (en)Password generation
CN103929311B (en) A challenging dynamic password authentication method based on brainwave waveform characteristics
Jiang et al.An anonymous and efficient remote biometrics user authentication scheme in a multi server environment
CN107733933A (en)A kind of double factor identity authentication method and system based on biological identification technology
Al Kabir et al.An overview of the present and future of user authentication
Han et al.A secure two-factor authentication key exchange scheme
Singamaneni et al.An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security
Andola et al.An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
Fernando et al.Challenges and opportunities in password management: a review of current solutions
US20220263818A1 (en)Using a service worker to present a third-party cryptographic credential
McCarneyPassword managers: Comparative evaluation, design, implementation and empirical analysis
Syahreen et al.A Systematic Review on Multi-Factor Authentication Framework.
CN101510875A (en)Identification authentication method based on N-dimension sphere
Adhatrao et al.A secure method for signing in using quick response codes with mobile authentication
van OorschotUser authentication—passwords, biometrics and alternatives

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SABAKI CORPORATION, NATIONAL AERONAUTICS AND SPACE

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEVNER, DAVID, MR.;REEL/FRAME:031811/0923

Effective date:20131217

Owner name:SABAKI CORPORATION, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LEVNER, DAVID, MR.;REEL/FRAME:031811/0923

Effective date:20131217

ASAssignment

Owner name:SABAKI CORPORATION, NEW YORK

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE'S STATE IS NEW YORK, NOT NASA. PREVIOUSLY RECORDED ON REEL 031811 FRAME 0923. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE'S STATE IS NEW YORK. SEE FIRST 9 LINES OF ORIGINAL ASSIGNMENT ATTACHED HEREWITH.;ASSIGNOR:LEVNER, DAVID, MR.;REEL/FRAME:031866/0209

Effective date:20131217

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, MICRO ENTITY (ORIGINAL EVENT CODE: M3551); ENTITY STATUS OF PATENT OWNER: MICROENTITY

Year of fee payment:4

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: MICROENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: MICROENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20230707


[8]ページ先頭

©2009-2025 Movatter.jp