Patent classifications
G06F2221/2131
SYSTEMS AND METHODS FOR NON-HUMAN ACCOUNT TRACKING
Systems and methods for non-human account tracking are disclosed. According to one embodiment, a method may include: retrieving, by a tracing tool computer program executed by a computer processor, a plurality of records for a computer application from an application database, the plurality of records comprising a computer application name, one or more Application Programming Interfaces (APIs) associated with the computer application, and an identification of a plurality of non-human accounts that have access to the computer application; storing, by the tracing tool computer program, the plurality of records as raw data in a relational database; determining, by the tracing tool computer program, that each of the retrieved plurality of non-human accounts is in an account vault; associating, by the tracing tool computer program, the non-human accounts with the retrieved one or more APIs; and storing, by the tracing tool computer program, the association in a relational database.
PERFORMING AUTHENTICATION
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
Managing security credentials
Disclosed are various embodiments for managing security credentials. In one embodiment, knowledge-based questions are selected in response to failing to receive a valid master security credential in a request to authenticate a user account for access to account data. In response to receiving the request, the plurality of knowledge-based questions are provided to an application. Answers to the knowledge-based questions are received and scored. Access is granted to establish a new master security credential based at least in part on the score meeting or exceeding a predetermined threshold.
UNLOCK AND RECOVERY FOR ENCRYPTED DEVICES
A computing device can perform operations to unlock encrypted volumes of the computing device while the computing device is in a recovery environment. In some examples, the computing device can work in conjunction with a test computing device to unlock the encrypted volumes using an unlock token and a PIN. In other examples, the computing device can perform operations without a test computing device. For example, the computing device can, while in the recovery environment, use credentials associated with a user of the computing device to obtain a recovery password to unlock keys for interpreting the encrypted volumes. In some examples, the computing device can use a shortened recovery password in conjunction with anti-hammering capabilities of a Trusted Platform Module in order to unlock keys for interpreting the encrypted volumes. These and other operations can facilitate secure unlock of volumes of encrypted data on a consumer device.
Password security
The description relates to password reset security. One example can receive a login request and a password for a cloud-based user account. The example can also retrieve stored authenticated user information associated with the password. The example can further send a notification of the login request to a contact address associated with the cloud-based user account. The notification can contain at least some of the stored authenticated user information.
Identity verification and verifying device
An identity verification method and a verifying device, where the verifying device receives an account for requesting password reset. When the account is invalid, the verifying device sends a fake identification and a first verification request to a requesting device. The verification request mentioned requests a user to determine whether to send verification information to a first communication address. The fake identification and the first communication address are associated with the first account.
Recording medium, information processing method, information processing apparatus, and information processing terminal
A non-transitory computer-readable recording medium having computer-readable instructions stored thereon, which when executed, cause an information processing apparatus including a memory and processing circuitry, to execute a method including managing a first account and a second account for a service provided by the information processing apparatus, registering a second user corresponding to the second account as a user capable of recovering the first account, in response to receiving a request from a first information processing terminal corresponding to a first user corresponding to the first account, determining whether authentication is successful based on authentication information of the first user received from a second information processing terminal corresponding to the second user, and providing the first user access to the service based on the determination.
SYSTEM FOR RESTORING LOST PRIVATE KEY
The present disclosure relates to a system for restoring a lost private key. More specifically, in the system, an extra private key is split into a plurality of parts, the parts are double-encrypted and stored in external servers, and when a key used has been lost, the pieces of the private key are downloaded from the respective servers through authentication and decrypted for use. The system includes at least: a terminal that generates a reference key when a driving signal is input, converts the reference key to an encryption key, splits the encryption key into a plurality of parts to generate a plurality of the partial encryption keys, performs secondary encryption on one of the partial encryption keys with a preset authentication code, and receives and decrypts the partial encryption keys stored in the server unit when a loss signal is input from outside.
Persistent memory passphrase management
An information handling system may include a persistent memory configured to be secured via a passphrase; a basic input/output system (BIOS); and a management controller configured to provide out-of-band management of the information handling system. The BIOS may be configured to set the passphrase of the persistent memory, encrypt the passphrase via a first key of a first asymmetric key pair, and transmit the encrypted passphrase to the management controller. The management controller may be configured to decrypt the encrypted passphrase via a second key of the first asymmetric key pair, re-encrypt the passphrase via a first key of a second asymmetric key pair, and transmit the re-encrypted passphrase to an external management console via an out-of-band management interface.
USER AUTHENTICATION IN A RECALL-MEMORY ENHANCING MANNER
With a multitude of passwords in today's technologically enhanced world, where each password is a string of nonsensical alphanumeric characters, the user can easily forget a particular password. However, while users frequently forget a nonsensical password, users easily remember places, favorite songs, or other emotionally relevant items. The system disclosed here enables a user to access passwords in a recall-memory enhancing manner by tying password access to memorable items such as places, songs, images or other emotionally relevant items.