G06F21/46

Extensible platform for orchestration of data with enhanced security
20230046370 · 2023-02-16 ·

In a computer system, an orchestration platform includes extensible components that interact with external systems and technology. The platform is secured by means of architectural features, encryption, and access control.

Extensible platform for orchestration of data with enhanced security
20230046370 · 2023-02-16 ·

In a computer system, an orchestration platform includes extensible components that interact with external systems and technology. The platform is secured by means of architectural features, encryption, and access control.

Methods and systems for creating, verifying, and entering security information

A system for securely producing and using high-entropy security information, such as a password. The system includes a printer, a display device, and a generator computer that is connected to the printer and the display device. The generator computer generates the high-entropy set of characters, (e.g., password), and also generates a machine-readable representation of the high-entropy set of characters, (e.g., a barcode). The generator computer causes the printer to print the high-entropy set of characters and the machine-readable representation on paper, and then deletes the high-entropy set of characters and the machine-readable representation from the system. The high-entropy set of characters, (e.g., password), may be entered into a target computer by scanning the barcode on the paper using a barcode scanner connected to the target computer, which is significantly faster than, and eliminates the human error associated with, typing in a high-entropy set of characters.

Password authentication

Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.

Password authentication

Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.

Electronic device and control method thereof

An electronic device is provided. The electronic device includes a communication interface including circuitry, a memory, and a processor which, based on receiving ID information generated by performing a first encryption process on biometric information and password information generated by performing a second encryption process on the biometric information from an external electronic device through the communication interface, is configured to control the electronic device to: store the ID information and the password information in the memory. The processor, based on receiving first ID information and first password information from the external electronic device, is configured to control the electronic device to: acquire at least one candidate ID information from the memory based on the first ID information, compare password information corresponding to each of the acquired at least one candidate ID information with the first password information to identify one of the candidate ID information, and perform user authentication based on the identified candidate ID information and corresponding password information.

Network based password policy detection and enforcement

A processor may receive a packet configured to travel in a network. The packet may be configured to travel from a first device to a second device. The processor may analyze the packet. The processor may detect a password with the packet. The processor may determine whether the detected password complies with at least one password policy. The processor may provide a password policy compliance output to a user. The password policy compliance output may indicate to the user whether the detected password complies with the at least one password policy.

Network based password policy detection and enforcement

A processor may receive a packet configured to travel in a network. The packet may be configured to travel from a first device to a second device. The processor may analyze the packet. The processor may detect a password with the packet. The processor may determine whether the detected password complies with at least one password policy. The processor may provide a password policy compliance output to a user. The password policy compliance output may indicate to the user whether the detected password complies with the at least one password policy.

TRANSACTION AUTHENTICATION METHOD, SERVER AND SYSTEM USING TWO COMMUNICATION CHANNELS

A transaction method for a user using a first and a second terminal and connected to a server via a first and a second communication channel, respectively. The first terminal sends a transaction amount to the server. The server establishes a verification code whose length depends on the transaction amount, then sends a request to the first terminal and the verification code to the second terminal. The user returns the request filled in with a copied code to the server using the first terminal. The server compares the verification code with the copied code and sends a transaction validation or invalidation message to the first terminal depending on the comparison.

NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVER, SERVER, AND METHOD EXECUTED BY SERVER
20230008132 · 2023-01-12 ·

A server may receive, from a terminal device, a change instruction for changing a password of a communication device different from the server and the terminal device. The server may, in a case where the change instruction is received from the terminal device, send first authentication information to the terminal device. The first authentication information may be inputted to the communication device by a user of the terminal device after the first authentication information has been sent to the terminal device. The server may, in a case where the first authentication information is inputted to the communication device, receive the first authentication information from the communication device. The server may, in a case where the first authentication information is received from the communication device, send a change permission notification to the communication device. The change permission notification may be a notification to permit the communication device to change the password.