G06F21/46

Private password constraint validation

Privately determining whether a password satisfies a constraint without having to divulge the password itself to a third party that evaluates the constraint, and without the third party even being aware of the result of the evaluation. After the user selects a password, private communication (e.g., private information retrieval) is used to determine whether the selected password satisfies password constraints. For instance, the password might be encrypted (e.g., homomorphically), and then the encrypted password and a function definition (e.g., a homomorphic function definition) is then provided to the third party. The third party then performs the function and returns an already encrypted result. The third party generated the encrypted result directly, without having access to the result in the clear. Upon receiving the encrypted result, the user's computing system may then decrypt the result, to find out whether the password satisfies the constraints, and thus is sufficiently safe.

User interfaces for managing user account passwords

In some embodiments, an electronic device presents a weak password warning in a password management user interface that includes information about the user account with which the password is associated. In some embodiments, an electronic device presents a weak password warning in a login user interface.

User interfaces for managing user account passwords

In some embodiments, an electronic device presents a weak password warning in a password management user interface that includes information about the user account with which the password is associated. In some embodiments, an electronic device presents a weak password warning in a login user interface.

SYSTEM AND METHOD FOR DATA ACCESS FROM AN AIRCRAFT
20230222233 · 2023-07-13 ·

There is provided a data access method and system for an aircraft. Password data is obtained for use in providing access to aviation data collected by at least one data acquisition device from one or more locations in the aircraft. The password data is caused to be rendered on at least one display provided in at least one secured location of the aircraft. Subsequent to the password data being rendered on the at least one display, input data is received from at least one user device requesting access to the aviation data. The input data is compared to the password data and, when the input data matches the password data, a connection is established between the at least one user device and the at least one data acquisition device for providing the at least one user device access to the aviation data.

SYSTEM AND METHOD FOR DATA ACCESS FROM AN AIRCRAFT
20230222233 · 2023-07-13 ·

There is provided a data access method and system for an aircraft. Password data is obtained for use in providing access to aviation data collected by at least one data acquisition device from one or more locations in the aircraft. The password data is caused to be rendered on at least one display provided in at least one secured location of the aircraft. Subsequent to the password data being rendered on the at least one display, input data is received from at least one user device requesting access to the aviation data. The input data is compared to the password data and, when the input data matches the password data, a connection is established between the at least one user device and the at least one data acquisition device for providing the at least one user device access to the aviation data.

DATA PACKET GENERATOR FOR GENERATING PASSCODES
20230214477 · 2023-07-06 · ·

A data packet generator periodically generates a data packet including a passcode comprising a plurality of characters. The data packet is sent to a server or a computing device for validation. If validated, the data packet is used, for example, to identify the location of a user or device. Additional systems and methods involving such a data packet generator are also disclosed.

DATA PACKET GENERATOR FOR GENERATING PASSCODES
20230214477 · 2023-07-06 · ·

A data packet generator periodically generates a data packet including a passcode comprising a plurality of characters. The data packet is sent to a server or a computing device for validation. If validated, the data packet is used, for example, to identify the location of a user or device. Additional systems and methods involving such a data packet generator are also disclosed.

INTERNET OF THINGS SECURITY SYSTEM

In one embodiment, a device including a processor, and a memory to store data used by the processor, wherein the processor is operative to run a manufacturer usage description (MUD) controller operative to obtain a MUD profile of an Internet of Things (IoT) device from a MUD server, the MUD profile of the IoT device including: access rights of the IoT device, and any one or more of the following a default device username and/or a default device password of the IoT device, a recommended/required device password complexity of the IoT device, at least one service that should be enabled/disabled on the IoT device, and/or allowed security protocols and/or ciphers for communication to and/or from the IoT device, enforce security of the IoT device according to the MUD profile of the IoT device. Related apparatus and methods are also described.

System architecture and method of authenticating a 3-D object

A non-transitory computer-readable medium encoded with a computer-readable program which, when executed by a processor, will cause a computer to execute a method of authenticating a 3-D object with a 2-D camera, the method including building a pre-determined database. The method additionally includes registering the 3-D object to a storage unit of a device comprising the 2-D camera, thereby creating a registered 3-D model of the 3-D object. Additionally, the method includes authenticating a test 3-D object by comparing the test 3-D object to the registered 3-D model.

System architecture and method of authenticating a 3-D object

A non-transitory computer-readable medium encoded with a computer-readable program which, when executed by a processor, will cause a computer to execute a method of authenticating a 3-D object with a 2-D camera, the method including building a pre-determined database. The method additionally includes registering the 3-D object to a storage unit of a device comprising the 2-D camera, thereby creating a registered 3-D model of the 3-D object. Additionally, the method includes authenticating a test 3-D object by comparing the test 3-D object to the registered 3-D model.