Methods and devices for detecting unauthorized access to credentials of a credential store
A Truskovsky, CL Bender, DJ Martin - US Patent 9,088,556, 2015 - Google Patents
US9088556B2 - Methods and devices for detecting unauthorized access to credentials of a
credential store - Google Patents US9088556B2 - Methods and devices for detecting …
credential store - Google Patents US9088556B2 - Methods and devices for detecting …
Password management and verification with a blockchain
D Anglin, H Anglin, S Liu, Y Liu - US Patent 10,666,442, 2020 - Google Patents
An example operation may include one or more of hashing a password received from a user
device to create one or more password hash values, determining whether the one or more …
device to create one or more password hash values, determining whether the one or more …
Document-level attribute-based access control
A Grand - US Patent 11,023,598, 2021 - Google Patents
Methods and systems for a document-level attribute-based access control service are
provided. The document-level attribute-based access control service may be positioned …
provided. The document-level attribute-based access control service may be positioned …
Credential entry and management
J Berlin, S Falkenburg, A Peterson, A Hshieh… - US Patent …, 2018 - Google Patents
The present embodiments relate to entry and management of identifiers and credentials.
The present embodiments display a credential affordance that, upon selection, provides a …
The present embodiments display a credential affordance that, upon selection, provides a …
Service-to-service role mapping systems and methods
C Gormley - US Patent 11,223,626, 2022 - Google Patents
Service-to-service role mapping systems and methods are disclosed herein. An example
role mapping service is posi tioned between a directory service and a search engine …
role mapping service is posi tioned between a directory service and a search engine …
Default password removal
SD Willnauer - US Patent 11,196,554, 2021 - Google Patents
Methods and systems for starting a node without a default password are provided.
Exemplary methods include: creat ing a node responsive to indicia received from a user; …
Exemplary methods include: creat ing a node responsive to indicia received from a user; …
User security token invalidation
J Modi - US Patent 11,025,425, 2021 - Google Patents
Provided are methods and systems for invalidating user security tokens. An example method
may include providing, by one or more nodes in a cluster, a list of revoked security tokens …
may include providing, by one or more nodes in a cluster, a list of revoked security tokens …
Computer readable storage media for legacy integration and methods and systems for utilizing same
R Katieb - US Patent 9,613,204, 2017 - Google Patents
BACKGROUND Contemporary enterprise systems have made significant strides in
integrating various security, communication, and authentication mechanisms to provide …
integrating various security, communication, and authentication mechanisms to provide …
Rhythm-based user authentication
DM Grigg, RA Starbuck, CA Hanson - US Patent 9,213,819, 2015 - Google Patents
The present invention is directed to an apparatus, a method, and a computer program
product for authenticating a user based on a sequence of rhythmic inputs. The user via a …
product for authenticating a user based on a sequence of rhythmic inputs. The user via a …
Password input interface
W Guo - US Patent 10,331,871, 2019 - Google Patents
A trigger instruction is received to set a password input interface. A setting of a term
represented by a key is triggered. A selection or input of the term represented by the key on …
represented by a key is triggered. A selection or input of the term represented by the key on …