Honeywords: Making password-cracking detectable

A Juels, RL Rivest - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We propose a simple method for improving the security of hashed passwords: the
maintenance of additional``honeywords''(false passwords) associated with each user's …

Contactless transaction

D Wentker, E Wong, G Shenker, D Deibert - US Patent 10,057,085, 2018 - Google Patents
A method associated with a contactless phone. The method includes sending a balance
inquiry response message to a mobile phone. The mobile phone includes a contactless …

Technologies for enhanced user authentication using advanced sensor monitoring

J Chhabra, NM Smith, MJ Sheller… - US Patent App. 14 …, 2016 - Google Patents
Technologies for information security include a computing device with one or more sensors.
The computing device may authenticate a user and, after successful authentication, analyze …

Mobile phone payment with disabling feature

D Deibert, E Wong, G Shenker, D Wentker - US Patent 9,647,855, 2017 - Google Patents
ABSTRACT A method and system for payments for mobile phone payments with a disabling
feature is disclosed. The method includes activating a mobile phone containing contactless …

Data protection in a networked computing environment

GJ Boss, IIRA Hamilton, JR Hoy, AMH Magro - US Patent 9,923,908, 2018 - Google Patents
Approaches for providing data protection in a networked computing environment are
provided. A method includes detecting, by at least one computer device, a breach of a first …

System conversion in a networked computing environment

GJ Boss, IIRA Hamilton, JR Hoy, AMH Magro - US Patent 9,954,870, 2018 - Google Patents
Approaches for providing security in a networked computing environment are provided. The
method includes detecting, by at least one computer device, a breach of a first system in the …

Using deception to enhance security: A Taxonomy, Model, and Novel Uses

MH Almeshekah - 2015 - search.proquest.com
As the convergence between our physical and digital worlds continue at a rapid pace,
securing our digital information is vital to our prosperity. Most current typical computer …

Data protection in a networked computing environment

GJ Boss, IIRA Hamilton, JR Hoy… - US Patent 10,686,809, 2020 - Google Patents
Approaches for providing data protection in a networked computing environment are
provided. A method includes detecting, by at least one computer device, a breach of a first …

Adaptive authentication solution that rewards almost correct passwords and that simulates access for incorrect passwords

SM Abraham, LA Carbonell, TS Cheng… - US Patent …, 2012 - Google Patents
The present invention discloses an adaptive authentication Solution that rewards almost
correct passwords and that simu lates access for incorrect passwords. In the solution, an …

Data protection in a networked computing environment

GJ Boss, IIRA Hamilton, JR Hoy… - US Patent 10,326,785, 2019 - Google Patents
Approaches for providing data protection in a networked computing environment are
provided. A method includes detecting, by at least one computer device, a breach of a first …