Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Prevent unauthorized" patented technology

Apparatus and method to electromagnetically shield portable consumer devices

An apparatus and method is provided to shield contactless portable electronic consumer devices such as radio frequency identification devices (RFID), tokens, mini-cards, key fobs, cellular phones, smartcards, etc. from wireless interrogation. In one embodiment, a contactless portable consumer device which includes a first antenna is shielded from unauthorized wireless interrogation with a radio frequency (RF) shield. The RF shield includes electrically conductive, non-ferromagnetic material and is configured to prevent unauthorized data transfer between a second antenna external to the portable consumer device and the first antenna.
Owner:VISA USA INC (US)

Systems and methods for domain restriction with remote authentication

A process for combining domain restriction and remote authentication may include receiving a token from a plug-in application to conduct a transaction associated with a user of a communicating device. The process may include sending an authentication request to a remote access control sever to authenticate the user, and receiving, from the remote access control server, an authentication tracking value that the remote access control server used in generation of an authentication cryptogram. The process may also include generating, using the authentication tracking value, a domain restriction cryptogram that is used for domain restriction of the token, and sending, to the plug-in application, the domain restriction cryptogram.
Owner:VISA INT SERVICE ASSOC

Apparatus and method to electromagnetically shield portable consumer devices

An apparatus and method is provided to shield contactless portable electronic consumer devices such as radio frequency identification devices (RFID), tokens, mini-cards, key fobs, cellular phones, smartcards, etc. from wireless interrogation. In one embodiment, a contactless portable consumer device which includes a first antenna is shielded from unauthorized wireless interrogation with a radio frequency (RF) shield. The RF shield includes electrically conductive, non-ferromagnetic material and is configured to prevent unauthorized data transfer between a second antenna external to the portable consumer device and the first antenna.
Owner:VISA USA INC (US)

System and method for software activation and license tracking

System and method for software activation and further tracking of its states on an end-user computing device (computer) was developed to provide software developers a flexible and secure tool for software distribution and gathering statistics of usage of software activation. The method consists of the following logical steps: (a) obtaining an acquisition confirmation; (b) requesting for a license; (c) issuing and delivering the license to End User; (d) verification of license on the User's computer; (e) storing the license on the User's computer; (f) periodic tracking of activation state, (g) another action with the User's license.
Owner:MACPAW WAY LTD

Method and apparatus for setting up network for IP communication in mobile terminal

A method is provided for setting up a network for Internet Protocol (IP) communication between mobile terminals. A first mobile terminal determines a second mobile terminal that will communicate with the first mobile terminal. The first mobile terminal generates network setup information of the first mobile terminal for the IP communication and performs network setup using the network setup information. The first mobile terminal generates a network setup message including network setup information of the second mobile terminal, and sends the network setup message to the second mobile terminal.
Owner:SAMSUNG ELECTRONICS CO LTD

System and method for software activation and license tracking

System and method for software activation and further tracking of its states on an end-user computing device (computer) was developed to provide software developers a flexible and secure tool for software distribution and gathering statistics of usage of software activation. The method consists of the following logical steps: (a) obtaining an acquisition confirmation; (b) requesting for a license; (c) issuing and delivering the license to End User, the license being secured with a private key by a server, and the private key is not stored at the client; (d) verification of license on the User's computer; (e) storing the license on the User's computer; (f) periodic tracking of activation state, (g) another action with the User's license, wherein the verifying the license comprises validating, at the client associated with the application, the license received from the server without any modifications, and saving the license to the client.
Owner:MACPAW WAY LTD

Computed radiography license method and system

A method for licensing a system for obtaining an X-ray image of a subject. The system employs flexible information carrier plates for computed radiography, which are exposed to X-rays and then scanned in a scanner. A license media is provided with a RFID transponder, which stores in its memory identification information referring to the system components as well as information referring to an amount of valid licenses available for use of the system components. When the identification information stored in the memory of the license media RFID transponder matches the identification information transmitted to the scanner by a processing and acquisition station the carrier plates are scanned automatically.
Owner:CARESTREAM DENTAL TECH TOPCO LTD

Computer data protecting method

This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.
Owner:FANG KO CHENG

Privacy-aware content protection system

A method for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content is disclosed. The method includes: transmitting the following to a rendering device of a user: the content, first software that is operative to receive the content and to associate keys with the content, identification information (ID) that is associated with the user, and second software that comprises a player for rendering the content, receiving the following information from the rendering device during rendering of the content: a number representation X which comprises a number representation in bits of a result obtained from encrypting together a number representation of a present time interval and the ID, both encrypted with a public key of a key pair generated at the rendering device, and a number representation which comprises a number representation in bits of a share (SH) of a private key of the key pair generated at the rendering device, and detecting an attempt to render the content at overlapping time periods on more rendering devices than permitted by the license associated with the content based on a determination that number representations X received from separate rendering devices are identical, and number representations Y received from the separate rendering devices and paired with the number representations X received from the separate rendering devices are different. Related apparatus and methods are also disclosed.
Owner:SYNAMEDIA LTD

Method, system and device for broadband access network multicast control

The embodiment of the invention discloses a system, a method and equipment for broadband access network multicast control. The system comprises an access control subsystem and a user subsystem, wherein the access control subsystem is used for generating multicast encryption keywords, sending the multicast encryption keywords to the user subsystem, encrypting multicast frames sent to the user subsystem through the multicast encryption keywords after receiving a subscription request sent by the user subsystem and sending the encrypted multicast frames to the user subsystem; and the user subsystem is used for sending the subscription request to the access control subsystem to request the multicast frames and decrypting the received multicast frames encrypted by the access control subsystem according to the received multicast encryption keywords sent by the access control subsystem. In radio type (shared media) access applications, only authorized users of the invention can use multicast service data to prevent illegal users from using the multicast services, and improve the security of multicast authority control.
Owner:HUAWEI TECH CO LTD

Computer data protecting method

This computer data protection method of the present invention requires a user to enter a correct password for modifying any data. If wrong passwords are typed, this method forbids modification of any program modules. Further, if any program module is detected having unauthenticated modification, that program module is deleted and an original image of that program module is loaded to recover normal operation of the operation system. Additionally, a common password is also provided in the protection method. Some special function can use this common password to pass the detection of this method to perform any modification.
Owner:FANG KO CHENG

Application uninstall preventing method and equipment

The invention discloses application uninstall preventing equipment which is resident in a mobile terminal to prevent a target application from being uninstalled from the mobile terminal. The application uninstall equipment comprises a view loader, an uninstall processor and an uninstall event monitor, wherein the view loader is suitable for creating a view and enabling the view to be located at the uppermost portion of a screen of the mobile terminal, the uninstall processor is used for removing the view, presenting an uninstall interface for receiving password input on the screen of the mobile terminal and removing the uninstall interface and enabling the uninstall operation of the target application to go on when a received password is matched with a preset password, and the uninstall event monitor is suitable for monitoring operating events of uninstalling the target application and indicating the view loader to create the view and then activating the uninstall processor later when the operation of uninstalling the target application is monitored. The invention further discloses a corresponding application uninstall preventing method and the mobile terminal including the application uninstall preventing equipment.
Owner:北京宝利明威软件股份有限公司

Privacy-aware content protection system

A method for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content is disclosed. The method includes: transmitting the following to a rendering device of a user: the content, first software that is operative to receive the content and to associate keys with the content, identification information (ID) that is associated with the user, and second software that comprises a player for rendering the content, receiving the following information from the rendering device during rendering of the content: a number representation X which comprises a number representation in bits of a result obtained from encrypting together a number representation of a present time interval and the ID, both encrypted with a public key of a key pair generated at the rendering device, and a number representation which comprises a number representation in bits of a share (SH) of a private key of the key pair generated at the rendering device, and detecting an attempt to render the content at overlapping time periods on more rendering devices than permitted by the license associated with the content based on a determination that number representations X received from separate rendering devices are identical, and number representations Y received from the separate rendering devices and paired with the number representations X received from the separate rendering devices are different. Related apparatus and methods are also disclosed.
Owner:SYNAMEDIA LTD

Distributed subscriber management system

A distributed subscriber management system and method that controls access to a network preventing unauthorized traffic through the access network and providing centralized access control between user networks are disclosed. The controlled access is provided through the use of one of several technologies including user authentication, using PAP, CHAP, RADIUS, TACACS+. The method includes the steps of receiving a connection request from a user located on one of the User Networks; interrogating the user for userid and password information; encrypting the userid and password information; transmitting the encrypted information, via the access network, to an authentication server attached to one of a plurality of external networks; decrypting the information at the authentication server; and transmitting an authentication message from the authentication server of the external network to the access control node via the access network. Additionally, the method includes the step of challenging all data leaving the access control node.
Owner:WSOU INVESTMENTS LLC

Electronic voting system and method of preventing unauthorized use of ballot cards therein

InactiveUS6997383B2Prevent unauthorized usePreventing unauthorized useVoting apparatusData processing applicationsReal-time computing
An electronic voting system includes a ballot card, accepting apparatus, and at least one voting apparatus. The accepting apparatus issues a ballot card in accordance with a vote acceptance request. The voting apparatus performs voting processing in accordance with a vote request using the ballot card. The accepting apparatus includes an acceptance time recording section which records the acceptance time on the ballot card when issuing the ballot card. The voting apparatus includes a timeout detecting section and unauthorized use warning display section. Before performing voting processing upon reception of a vote request, the timeout detecting section determines whether or not a preset timeout time has elapsed from the acceptance time recorded on the ballot card to the time of voting. The unauthorized use warning display section outputs a warning message when the timeout detecting section determines that the timeout time has elapsed.
Owner:NEC CORP

Protective module for data transmission port

A protective module for a data transmission port includes a plugging element and an unlocking element. The plugging element includes an extension portion and an end portion. The extension portion is inserted into the data transmission port. The end portion obstructs an opening of the data transmission port and is made of a first magnetically attracting material. The unlocking element includes an attraction portion adapted to attract the end portion and made of a second magnetically attracting material. The end portion of the plugging element escapes from the data transmission port as a result of magnetic attraction between the end portion of the plugging element and the unlocking element as soon as the unlocking element approaches the plugging element plugged into the data transmission port. Therefore, the protective module prevents external devices from getting connected to the data transmission port and prevents dust intrusion.
Owner:HSING CHAU INDAL

Redisplay Computing with Integrated Data Filtering

ActiveUS20200177627A1Prevent infiltration and exfiltrationMinimize abilityDigital data protectionTransmissionGraphicsEngineering
A method, system and computer-usable medium for redisplaying data at a remote access client system from a secure computing environment. The redisplaying data includes receiving a request form the remote access client system for data, inspecting the request for potential unauthorized or malicious retransmission. Modifying the data, by filtering audio data or transforming graphical data prior to sending the requested data is performed to prevent the unauthorized or malicious retransmission.
Owner:FORCEPOINT LLC

Record medium, record medium manufacturing device, computer readable record medium on which program is recorded, and data presentation device

A record medium comprises an original data obtained by superimposing a presentation target data, to which an error correction encoding is performed and an identification information.
Owner:KK TOSHIBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products