Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

61results about How to "Improve user security" patented technology

Method of ciphering data transmission in a radio system

The invention relates to a method of ciphering data transmission in a radio system, and to a user equipment using the method, and to a radio network subsystem using the method. The method includes the steps of: (602) generating a ciphering key; (604A) producing a ciphering mask in a ciphering algorithm using the ciphering key as an input parameter; (604B) using a logical channel specific parameter or a transport channel specific parameter as an additional input parameter to the ciphering algorithm; and (606) producing ciphered data by applying the ciphering mask to plain data.
Owner:NOKIA TECHNOLOGLES OY

Security for electronic transactions and user authentication

System and method for generating, disseminating, controlling, and processing limited-life security codes used to authenticate users, particularly for electronic financial transactions, such as payment transactions or interacting with automated teller machines and the like. Providing a user with a single security code usable across multiple accounts or other secured systems is contemplated, each security code having a limited lifetime (e.g., one day). In a particular example of the present invention, a plurality of similarly situated users (each needing authenticated access to a plurality of accounts or other secured systems using the security code) are each assigned a set or group of respective security codes. In a preferred example, each security code is a random number from a random number generator. The respective security codes for each user correspond to a respective security code validity period of limited duration. Thus, a table or matrix that associates the plurality of users with the respective sets of randomly selected security codes (each having their respective validity periods) is generated, and that matrix is provided to the respective entities (such as banks, payment processors, computer networks generally, etc.) to which each user requires secured access. In parallel, at least a current security code (for example, for the current validity period) is provided to each user, and this is how the respective entities being accessed can track which code from which user is currently valid.
Owner:TENDER ARMOR LLC

Safety Rotary Operator Assembly

A rotary operator assembly (1A) includes a grip member (4), a spindle member (6A), and an operator body member (8). The spindle member (6A) is attached to the operator body member (8), being rotatable with respect to the operator body member (8) about an operative axis of rotation (A). The grip member (4) is movably coupled to the spindle member (6A) and the operator body member (8) and is translatable between a first translational position and a second translational position with respect to the operator body member (8). The grip member (4) and the operator body member (8) include cooperating means for blocking rotation of the grip member (4) with respect to the operator body member (8) about the operative axis of rotation in the first position and for allowing rotation of the grip member (4) with respect to the operator body member (8) about the operative axis of rotation in the second position from a first angular position to a second angular position. The grip member (4) is configured to operably couple with the spindle member (6A) in at least the second translational position, and the grip member (4) comprises at least one portion cooperating with at least one portion of the spindle member (6A) for preventing translation of the grip member (4) between the first translational position and the second translational position in the first angular position.
Owner:EWAC HLDG

User data protection method in server apparatus, server apparatus and computer program

A user data protection method in which a management server includes an address replacement table having correspondence relation of memory addresses of a memory assigned to a virtual server and memory addresses of a memory assigned to a virtualization mechanism which is different from that at usual time, comprising the steps of: making, when an event occurs, the virtual server send virtual server identifier information for identifying the virtual server to the management server; making the management server detect the event; making the management server specify the virtual server in which the event occurs in accordance with the virtual server identifier information; sending the address replacement table to the virtualization mechanism of the physical server including the specified virtual server; and changing the correspondence relation of the memory addresses of the virtual server and the memory addresses of the virtualization mechanism on the basis of the address replacement table.
Owner:TAMAKI MASARU +3

Hierarchical trusted code for content protection in computers

An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other modules that they are willing to trust. A secure loader loads a security manager that oversees a number of content-providing modules for manipulating the content. A memory manager assigns permissions to various pages of the secure memory. The memory has rings of different security. The security model can be extended to program modules and other devices on the computer's bus, such as DMA controllers and peripherals.
Owner:MICROSOFT TECH LICENSING LLC

Transaction device with noise signal encryption

A transaction device adds or injects a random noise component into signals representing (x,y) coordinate signals associated with user interface with an input screen associated with the device. The noise component can be generated by converting to analog the output of a random number generator, and then adding the noise component to the x-axis and / or y-axis component of the (x,y) coordinate signal. Alternatively the noise component can be injected into the x-axis and / or y-axis operating potential for the input screen. The result is a masking of the original (x,y) positional information. The randomly generated number is only available internal to the device. The device can use this number to de-crypt the true (x,y) signals, which signals can then be re-encrypted before transmitting from the device.
Owner:SYMBOL TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products