Honeywords: Making password-cracking detectable
We propose a simple method for improving the security of hashed passwords: the
maintenance of additional``honeywords''(false passwords) associated with each user's …
maintenance of additional``honeywords''(false passwords) associated with each user's …
Contactless transaction
D Wentker, E Wong, G Shenker, D Deibert - US Patent 10,057,085, 2018 - Google Patents
A method associated with a contactless phone. The method includes sending a balance
inquiry response message to a mobile phone. The mobile phone includes a contactless …
inquiry response message to a mobile phone. The mobile phone includes a contactless …
Technologies for enhanced user authentication using advanced sensor monitoring
Technologies for information security include a computing device with one or more sensors.
The computing device may authenticate a user and, after successful authentication, analyze …
The computing device may authenticate a user and, after successful authentication, analyze …
Mobile phone payment with disabling feature
D Deibert, E Wong, G Shenker, D Wentker - US Patent 9,647,855, 2017 - Google Patents
ABSTRACT A method and system for payments for mobile phone payments with a disabling
feature is disclosed. The method includes activating a mobile phone containing contactless …
feature is disclosed. The method includes activating a mobile phone containing contactless …
Data protection in a networked computing environment
GJ Boss, IIRA Hamilton, JR Hoy, AMH Magro - US Patent 9,923,908, 2018 - Google Patents
Approaches for providing data protection in a networked computing environment are
provided. A method includes detecting, by at least one computer device, a breach of a first …
provided. A method includes detecting, by at least one computer device, a breach of a first …
System conversion in a networked computing environment
GJ Boss, IIRA Hamilton, JR Hoy, AMH Magro - US Patent 9,954,870, 2018 - Google Patents
Approaches for providing security in a networked computing environment are provided. The
method includes detecting, by at least one computer device, a breach of a first system in the …
method includes detecting, by at least one computer device, a breach of a first system in the …
Using deception to enhance security: A Taxonomy, Model, and Novel Uses
MH Almeshekah - 2015 - search.proquest.com
As the convergence between our physical and digital worlds continue at a rapid pace,
securing our digital information is vital to our prosperity. Most current typical computer …
securing our digital information is vital to our prosperity. Most current typical computer …
Data protection in a networked computing environment
GJ Boss, IIRA Hamilton, JR Hoy… - US Patent 10,686,809, 2020 - Google Patents
Approaches for providing data protection in a networked computing environment are
provided. A method includes detecting, by at least one computer device, a breach of a first …
provided. A method includes detecting, by at least one computer device, a breach of a first …
Adaptive authentication solution that rewards almost correct passwords and that simulates access for incorrect passwords
SM Abraham, LA Carbonell, TS Cheng… - US Patent …, 2012 - Google Patents
The present invention discloses an adaptive authentication Solution that rewards almost
correct passwords and that simu lates access for incorrect passwords. In the solution, an …
correct passwords and that simu lates access for incorrect passwords. In the solution, an …
Data protection in a networked computing environment
GJ Boss, IIRA Hamilton, JR Hoy… - US Patent 10,326,785, 2019 - Google Patents
Approaches for providing data protection in a networked computing environment are
provided. A method includes detecting, by at least one computer device, a breach of a first …
provided. A method includes detecting, by at least one computer device, a breach of a first …