System and method providing disconnected authentication

A Nanopoulos, K Ackerman, P Bowness… - US Patent …, 2015 - Google Patents
In a system for disconnected authentication, Verification records corresponding to given
authentication token outputs over a predetermined period of time, sequence of events …

Method and system for verifying and updating the configuration of an access device during authentication

JS Edgett, B Nelson, JR Vollbrecht, RD Albert… - US Patent …, 2009 - Google Patents
(57) ABSTRACT A system and method is provided to Verify configuration of a client access
device requesting access to a network by estab lishing a communications link between a …

Method and system for securely authenticating network access credentials for users

RD Albert, JS Edgett, S Sunder… - US Patent …, 2011 - Google Patents
5,991.292 A 1 1/1999 Focsaneanu et al. 2003/0131264 A1* 7/2003 Huffet al......................
T13/202 6,023,470 A 2/2000 Lee et al. 2003/0158960 A1 8/2003 Engberg 6,023,502. A …

Methods, apparatus and computer programs performing a mutual challenge-response authentication protocol using operating system capabilities

M Astley, N Young - US Patent App. 10/007,859, 2003 - Google Patents
(57) ABSTRACT A client-Server authentication method for use where a Server process has
access to a repository Storing cipher-protected client passwords. The method includes …

System and methods for maintaining and distributing personal security devices

W Duane, P Röstin - US Patent 7,111,172, 2006 - Google Patents
US7111172B1 - System and methods for maintaining and distributing personal security
devices - Google Patents US7111172B1 - System and methods for maintaining and distributing …

Information security architecture for encrypting documents for remote access while maintaining access control

D Giroux, J Sharko - US Patent 6,978,376, 2005 - Google Patents
(57) ABSTRACT A method of controlling distribution of a Segment of encrypted electronic
information is presented. A key Server receives a protected copy of a decryption key for the …

Password encryption key

D Utin - US Patent 8,447,990, 2013 - Google Patents
A password-encrypted key (PEK) is generated from a user-supplied password or other
identifying data and then used to encrypt the user's password. The encrypted password is …

System and method for conducting a secure interactive communication session

M Wenocur, R Baldwin, D Illowsky - US Patent App. 09/912,855, 2002 - Google Patents
G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY
ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR …

Method and apparatus for secure password transmission and password changes

M Peyravian, N Zunic - US Patent 6,826,686, 2004 - Google Patents
In a networking environment, it is often the case that users interact with local application
programs. The local applica tion programs may exchange data with remote application …

Authentication and authorization protocol for secure web-based access to a protected resource

HM Hinton, M Vandenwauver - US Patent 7,478,434, 2009 - Google Patents
1. Technical Field The present invention relates generally to techniques for enabling users
on the Internet to securely access resources in various locations. More speci? cally, the …