System and methods for weak authentication data reinforcement

MC Lee - US Patent 8,713,657, 2014 - Google Patents
Abstract Systems and methods for weak authentication data reinforcement are described. In
some embodiments, authentication data is received in a request to authenticate a user. In …

The development and evaluation of an information security awareness capability model: linking ISO/IEC 27002 controls with awareness importance, capability and …

R Poepjes - 2015 - research.usq.edu.au
This research examines the role that awareness has on the effectiveness of information
security within an organisation. There is a lack of understanding as to what is an appropriate …

Reset and recovery of managed security credentials

DW Hitchcock, BL Campbell - US Patent 9,660,982, 2017 - Google Patents
Disclosed are various embodiments for management func tions relating to security
credentials. Account data, which includes multiple security credentials for multiple network …

Factors for measuring password-based authentication practices

HJ Mattord, Y Levy, S Furnell - Journal of Information Privacy and …, 2014 - Taylor & Francis
Organizations rely on password-based authentication methods to control access to their
Web-based systems. This research study developed a benchmarking instrument intended to …

Authentication manager

JM Johansson - US Patent 11,082,422, 2021 - Google Patents
Disclosed are various embodiments for an authentication manager. In one embodiment, the
authentication manager performs an identity verification on a network site. The …

A spark is enough in a straw world: A study of websites password management in the wild

S Raponi, R Di Pietro - Security and Trust Management: 14th International …, 2018 - Springer
The widespread usage of password authentication in online websites leads to an ever-
increasing concern, especially when considering the possibility for an attacker to recover the …

Managing security credentials

DE Canavor, JM Johannson - US Patent 11,444,936, 2022 - Google Patents
Disclosed are various embodiments for managing security credentials. In one embodiment,
knowledge-based questions are selected in response to failing to receive a valid master …

Supporting learning of an unfamiliar authentication scheme

A Forget, S Chiasson, R Biddle - E-learn: World conference on e …, 2012 - learntechlib.org
Difficulties with plaintext passwords are well-documented. Many alternative authentication
schemes have been proposed, but a key evaluation metric has typically been ignored …

Password Policy Markup Language

M Horsch, M Schlipf, S Haas, J Braun, J Buchmann - 2016 - dl.gi.de
Password-based authentication is the most widely used authentication scheme for granting
access to user accounts on the Internet. Despite this, there exists no standard …

Updating account data for multiple account providers

DW Hitchcock, BL Campbell - US Patent 10,475,018, 2019 - Google Patents
Disclosed are various embodiments for updating account data with multiple account
providers. Account management logic determines that personal information associated with …