G06F21/31

Quick-logon for computing device

Methods and systems for verifying a user's identity on a computing device using two-factor authentication are described. More particularly, the system can use a personal identification number input by a user, together with one or more of a secure browsing feature, a device fingerprint, and a token generator to authenticate the user on the computer.

INTERNET ACCESS AUTHENTICATION METHOD AND CLIENT, AND COMPUTER STORAGE MEDIUM
20180014194 · 2018-01-11 ·

The present disclosure discloses an Internet access authentication method and client, and a computer storage medium. The Internet access authentication method includes establishing a network connection to a subnetwork; displaying, in a browser, a login page specified by a wireless access point, a network application icon used for Internet access being displayed on the login page; receiving an operation on the network application icon, and authenticating first data by sending the first data to a network server, the first data comprising: a gateway address, a wireless access point address, and a device address; and making a network connection when authentication on the first data succeeds.

Method and apparatus of active identity verification based on gaze path analysis

Disclosed herein are a method and apparatus for active identification based on gaze path analysis. The method may include extracting the face image of a user, extracting the gaze path of the user based on the face image, verifying the identity of the user based on the gaze path, and determining whether the face image is authentic.

Method and apparatus of active identity verification based on gaze path analysis

Disclosed herein are a method and apparatus for active identification based on gaze path analysis. The method may include extracting the face image of a user, extracting the gaze path of the user based on the face image, verifying the identity of the user based on the gaze path, and determining whether the face image is authentic.

AUTOMATICALLY ALTERING AND ENCRYPTING PASSWORDS IN SYSTEMS

In an approach for changing a password. Aspects of an embodiment of the present invention include an approach for changing a password, wherein the approach includes a processor identifies a resource protected by a password. A processor discovers at least one information source containing information relevant to a process for changing the password of the resource. A processor constructs a set of procedures to change the password using the information relevant to the process for changing the password. A processor alters the password of the resource according to the constructed set of procedures.

SHARED SYSTEM AND TERMINAL DEVICE
20180011618 · 2018-01-11 ·

A shared system comprises a terminal device and a server. The terminal device comprises a display unit configured to segment a display area and display different contents in different segmented areas. The server receives, from the terminal device, the resolution information of a first segmented area which is one of the segmented areas of the terminal device, generates, according to the resolution information received, a screen on which data can be viewed or edited, and sends the screen in such a manner that the generates screen can be displayed in the first segmented area of the terminal device.

SYSTEMS AND METHODS EVALUATING PASSWORD COMPLEXITY AND STRENGTH
20180012014 · 2018-01-11 ·

A password evaluation engine used to evaluate a user's password that redefines the concepts of password complexity and password strength is discussed. Password complexity may be calculated by the evaluation engine so as to take into account the amount of knowledge possessed by a potential attacker, seeking to crack the password, of the rules corresponding to a rule set used for generating the password. A determination of password strength by the evaluation engine may consider a potential attacker's computational resources, the protection function used to protect/store a password and the amount of time available to the attacker to crack the password with respect to an identified search space based on the attacker's knowledge. Embodiments also enable a password strength estimator to be evaluated and policy recommendations to be generated for an entity's password policy requirements.

SYSTEMS AND METHODS EVALUATING PASSWORD COMPLEXITY AND STRENGTH
20180012014 · 2018-01-11 ·

A password evaluation engine used to evaluate a user's password that redefines the concepts of password complexity and password strength is discussed. Password complexity may be calculated by the evaluation engine so as to take into account the amount of knowledge possessed by a potential attacker, seeking to crack the password, of the rules corresponding to a rule set used for generating the password. A determination of password strength by the evaluation engine may consider a potential attacker's computational resources, the protection function used to protect/store a password and the amount of time available to the attacker to crack the password with respect to an identified search space based on the attacker's knowledge. Embodiments also enable a password strength estimator to be evaluated and policy recommendations to be generated for an entity's password policy requirements.

Apparatus and method for accessing contact lists on an electronic device that is unavailable or unusable
11711468 · 2023-07-25 ·

An apparatus, method, and non-transitory computer readable medium are provided for accessing data on a phone that is inaccessible. The apparatus includes a memory configured to store a plurality of contact profiles in a contact list corresponding to an inaccessible device, and a processor coupled to the memory. The apparatus receives, from an unknown device over a voice connection, an access identifier corresponding to the inaccessible device and a contact identifier associated with a contact profile of the plurality of contact profiles; identifies the contact list based on matching the access identifier with the inaccessible device; determines a contact device of the contact profile in the contact list corresponding to the contact identifier; and connects, over the voice connection, the unknown device to the contact device corresponding to the contact profile.

Apparatus and method for accessing contact lists on an electronic device that is unavailable or unusable
11711468 · 2023-07-25 ·

An apparatus, method, and non-transitory computer readable medium are provided for accessing data on a phone that is inaccessible. The apparatus includes a memory configured to store a plurality of contact profiles in a contact list corresponding to an inaccessible device, and a processor coupled to the memory. The apparatus receives, from an unknown device over a voice connection, an access identifier corresponding to the inaccessible device and a contact identifier associated with a contact profile of the plurality of contact profiles; identifies the contact list based on matching the access identifier with the inaccessible device; determines a contact device of the contact profile in the contact list corresponding to the contact identifier; and connects, over the voice connection, the unknown device to the contact device corresponding to the contact profile.