WO2000016190A1 - Apparatus and methods for unlocking password protected software systems to recover master password - Google Patents
Apparatus and methods for unlocking password protected software systems to recover master password Download PDFInfo
- Publication number
- WO2000016190A1 WO2000016190A1 PCT/US1999/021507 US9921507W WO0016190A1 WO 2000016190 A1 WO2000016190 A1 WO 2000016190A1 US 9921507 W US9921507 W US 9921507W WO 0016190 A1 WO0016190 A1 WO 0016190A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- password
- central
- local system
- information
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Definitions
- the present invention relates generally to password protected software systems, and more particularly, to password protected software systems with on screen display, such as parental control-equipped electronic programming guide systems for television viewing.
- Many software systems require the user to enter a password before the system will allow the user to access the system. Passwords must be recognized by the software system as giving the user authority to access the system.
- An example of a password protected software system is a parental control-equipped electronic programming guide system such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
- Some password protected software systems are available on a network.
- a networked system there is typically a network administrator, online service provider, or the like, that establishes initial passwords, and assists the user in identifying a forgotten password.
- the user is provided a first-time password by the network administrator, online service provider, or manufacturer.
- the system prompts the user for the user ' s password.
- systems are programmed to recognize if the password is a "first-time " password.
- the system detects a first-time password, the system prompts the user to choose a personal password.
- the "first-time" password is set to expire within a relatively short period of time or after a relatively short number of accesses.
- Systems are typically programmed to recognize the expiration date of a password and notify the user that the user must select a new password before the old password expires.
- a systems or network administrator can typically recover the identification of the forgotten password for the user.
- the systems or network administrator who is typically at a location remote from the user, can check security files internal to the system. By reading the internal security files, the systems or network administrator can provide the user with the user's password. Before disclosing the password, the systems administrator typically requires that the user provide the systems administrator with the proper identification.
- local systems 10 will hereinafter be referred to as "local systems."
- An example of a local system is an on screen system for parental control of television viewing such as Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
- 2Q password would be to allow the user to access the password. That is, the user could select an option in the system that would display the password. However, such a method would be self-defeating, in that others could equally access the password.
- Still another way to provide the user with the ability to recover the identity of a forgotten password would be to provide a "back door” method, such as: unplugging and
- the present invention provides apparatus and methods that satisfy these needs, ⁇ Specifically, the present invention provides apparatus and methods for recovering a forgotten password while maintaining the security and integrity of the protected software system.
- the present invention provides for a centralized contact, hereinafter referred to as the "central administrator " or "central administration.”
- the present invention further provides for the identification of the particular user to the particular local system, the identification of the particular local system to the central administrator, and the identification c of the particular user to the central administrator. After providing all of the above-described proper identifications, the present invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user.
- the invention provides for the identification by the central administrator of a key that will unlock the software system for the user so that the user can access the j Q identification of the user's password.
- the procedure of identifying a forgotten password is generally referred to hereinafter in this application as the master password recovery procedure.
- FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal 2 identification information for a user and the user's selection of a master password;
- FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure
- FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
- -, ⁇ - FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure.
- a central administration contact hereinafter referred to in this application as the
- T central administrator is established.
- the central administrator would be accessible by the user, through, e.g., a 1-800, or 1-900 telephone number, a website, etc.
- the central administration contact is a completely automated Computer Telephone Interface system.
- the automated central administration system provides vocal communications to the user and requests that the user
- -, - provide input to the central administrator by pressing buttons on the user ' s telephone keypad.
- the automated central administration system is programmed to recognize speech so that the user can speak to the central administration system to provide requested
- the local system When the user attempts to access the local system, the local system will prompt the user for the password. Typically, the first time that a password protected system is accessed, the system will allow the user to identify a password. This password is hereinafter referred to in this application as a "'master password.”
- the manufacturer may provide the buyer of the system with a first-time
- FIG. 2 is a flow diagram of one embodiment of a local system implementation of the master password setup procedure where the user has been supplied a first-time password.
- the user/buyer is prompted to supply the first- time password 210.
- Input of the password and other user input referred to herein may be accomplished using a variety of devices 230 and 450, including but not limited to an infra-red ⁇ remote control device, such as a television remote control 232a. 233a, 235a and 452a, or a keyboard 232b. 233b, 235b and 452b.
- the input device used is not a limitation of the present invention.
- the system will typically invite the user to choose a personal master password 250.
- the local system typically asks the user to confirm the master password by entering it a second time (not shown). If the user is unable to confirm the password, the local system typically reverts to the first-time password and the procedure starts all over again.
- the above-described procedure will be referred to hereinafter in this application as the "master password setup procedure.” .
- one embodiment of the present invention requires that the user provide some additional identification information.
- This information would be information that would be known to the user but not typically known to others, such as, e.g., the user's mother's maiden name, the user's mother's birth date, or other such personal information.
- FIG. 1 is a graphical representation of one embodiment of a local system implementation of an on screen setup procedure display requesting input of the personal identification information for a user and the user's selection of a master password.
- the user is invited to use a pull down menu (not shown) of the alphabet, special characters, and the numbers 0-9, or some other comparable method, to compose the user's r input to the personal identification information screen.
- the personal identification information to the extent that a particular embodiment of the present invention requires this information, will be referred to hereinafter in this application as "master password identification information.”
- master password identification information to the extent that a particular embodiment of the present invention requires this information.
- the embodiment of the setup procedure display screen depicted requests the user to input the user's first name (10), the user's middle initial (20), the user's last name (30). the user's birth date in MM/DD/YYYY format (40), the user's
- the setup procedure display screen depicted provides for the user the serial number of the unit (70).
- the serial number is encrypted through a hashing function.
- the user is also requested to input a selected Master Password (80).
- the master password setup procedure instructs the ⁇ Q user to contact the central administrator to provide certain user identification information
- This further personal identification information may be in the way of a credit card number, or may be the same as the master password identification information or may include some personal identification information in addition to the master password identification information.
- This further personal identification information is referred to ⁇ hereinafter in this application as "counter-identification information.”
- the master password setup procedure requires confirmation from the central administrator that the counter-identification information has been provided.
- the local system and the central administration system each use the same hashing function to each calculate a confirmation key.
- 2Q administration computer system or alternatively, the manual procedure to be performed by the central administrator
- the local system are both programmed to perform a hashing function on information already "known" to the television, for instance, the date, day of the week, zip code of the location of the television, the cable or other programming service to which the television is connected, the serial number of the television, etc.
- the hashing function could be programmed to incorporate as part of the calculation of the hashing key, information that was provided to both the local system and to the central administrator by the user as part of the identification information.
- the central administrator uses the central administration system to calculate the appropriate confirmation key.
- the local system calculates the corresponding confirmation Q key 290.
- the user would then be instructed to enter the confirmation key provided by the central administrator into the local system 235a and 235b.
- the local system would read the confirmation key input by the user 305.
- the local system would compare the input confirmation key with the key that had been calculated by the local system 310. If the two keys match, then the local system allows the user to proceed with the master password setup c procedure 320.
- password change procedures typically require that the user identify the current password before entering the new password: once the new password has been entered, password change procedures typically require the user to confirm the new password by entering the new password a second time.
- password change procedures typically require the user to confirm the new password by entering the new password a second time.
- the local system prompts the user to supply the master password. If the user is unable to provide the master password, the system will not allow the ⁇ user to pass the security screen of the system.
- FIG. 3 is a graphical representation of one embodiment of a local system implementation of an on screen display of a master password recovery instruction screen.
- FIG. 4 is a flow diagram of one embodiment of a local system implementation of the master password recovery procedure.
- the user will refer to a user manual or contact the manufacturer or retailer to identify contact information for the central administration system.
- the local system security processor will ask the user to supply the master password
- the screen that requests the identification information will look like the setup screen, one embodiment of which is depicted in FIG. 1.
- the security system will display a screen that will instruct the user to access the central administrator. This screen is hereinafter
- the instruction screen will tell the user how to contact the central administrator (100), e.g., to dial a particular telephone number, such as a 1-900 number, 1-800 number, or to access a particular website.
- the instruction screen will display information identifying the particular local system unit, such as the serial number of the particular local system unit (1 10, 405-410).
- the instruction screen will also display a character string (120, 420-430).
- the character string displayed will be encrypted and will contain, among other things, the forgotten master password, and to the extent that any was been requested by the local system. the master password identification information.
- the central administrator will request that the user read from the instruction screen certain information, such as: device unit identification information (1 10), for example, the serial number of the particular local system unit; and/or other information displayed on the user's local system screen, such as an encrypted character string (120).
- the central administrator will further request that the user provide the counter-identification information previously provided to the central administrator during the master password setup procedure.
- the central administrator will then use the information provided by the user to either provide the user with the user ' s master password, or with a key to unlock the user's system to, depending upon the embodiment, discover the forgotten master password, or to choose a new master password.
- the central administrator's function may be manually performed, or alternatively, may be programmed in the central administration computer system.
- the central administrator may need to de-encrypt the information provided by the user.
- the central administrator may use a manual procedure or may enter the information into the central administration computer system which is programmed to de-encrypt the user-provided information.
- the central administrator will then test the de-
- This comparison procedure may be either a manual procedure performed by the central administrator or may be performed by the central administration computer system.
- the user reads to the central administrator an encrypted character string containing an encrypted master password, once the central administrator has
- the central administrator will de- encrypt the character string to identify the forgotten password. In one embodiment of the invention, the central administrator will then instruct the user to request the system to calculate a confirmation key. To do that, the user will choose an on screen option to calculate a confirmation key. In one embodiment, the local system will automatically
- TQ calculate 440 and 490 a confirmation key (130) and/or a counter-confirmation key (140).
- the security information system will display a screen that says that a confirmation key has been calculated (see FIG. 3, 130).
- the central administrator will then calculate a confirmation key and instruct the user to input the confirmation key.
- the user will then use a pull down menu (not shown), or some other comparable method, to input the confirmation r key.
- the local system will test the two keys. If the key matches the local system confirmation key.
- the system will then display on screen a counter-confirmation key (140 and 500) and instruct the user to read the counter- confirmation key to the central administrator.
- the local system will then set the master password to expire after a set period of time, e.g , a day. 48 hours, a week, a month, or after a set number of accesses, e.g.. after 1. 2 or 3 further accesses by the user of
- the central administrator will then tell the user the forgotten password.
- the central administrator will calculate a confirmation key and instruct the user to input the confirmation key into the local system.
- the user will then use a pull down ⁇ menu (not shown) or some other comparable method to input the confirmation key.
- the local system will calculate, using the same hashing function used by the central administrator, a local system confirmation key.
- the local system will then test the two keys. If the key matches the local system confirmation key, the system will then display on screen the user ' s master password (similar to 140 and 500).
- ⁇ r In another alternative embodiment of the present invention, the central administrator, as described above, will calculate a key, using, e.g..
- the 20 calculate, as described above, a key, using, e.g., a hashing formula.
- the local system uses the same hashing formula as is used by the central administrator and/or the central administration computer system. In order for the two keys to match, the hashing formula must be applied by the local system to the same information to which the central administrator's hashing formula was applied. If the unlocking key matches the local system key, the local system will then c display on screen the user's master password (similar to 140 and 500). In an alternative embodiment, in the case where the keys match, the local system will require that the user immediately identify a new master password.
- the master password setup procedure and the master password recovery procedure described above are implemented in the following manner to allow a parent to unlock and recover the parent ' s master password that governs a parental control-equipped electronic programming guide system such as o Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
- a parental control-equipped electronic programming guide system such as o Gemstar's Guide Plus+ 99 equipped with V-Chip Plus+ In-Guide User Interface.
- the parent/user purchases a television equipped with a parental control-equipped electronic programming guide system such as Gemstar ' s Guide Plus+ 99 equipped with V- Chip Plus+ In-Guide User Interface.
- a parental control-equipped electronic programming guide system such as Gemstar ' s Guide Plus+ 99 equipped with V- Chip Plus+ In-Guide User Interface.
- the user/parent identifies a master password.
- the user/parent selects a security system option that displays a screen (the "instruction screen") on the television display monitor that instructs the user/parent to contact a central administrator through a 1 -900 telephone number.
- the central administrator in this embodiment is a ⁇ Q completely automated Computer Telephone Interface system.
- the user/parent refers to a user manual or contacts the manufacturer or retailer to identify contact information for the central administration system.
- the central administration one-way hashing function will be performed on the current date to calculate an unlocking key.
- the central administrator once contacted. may ask the user to supply the television's serial number, and possibly, some other types of information as was described previously in this application.
- the user/parent will be instructed to enter the requested information using the user/parent's telephone key pad.
- Other types of information requested would be information that would be "known" to the television set. such as, e.g., the zip code of the location of the television set, the cable service
- the central administration computer system will then use a one-way hashing function to calculate an unlocking key.
- the central administration computer system will read the unlocking key to the user/parent and instruct the user/parent to enter the unlocking key into the user/parent's local television V-Chip Plus+ In-Guide User Interface system.
- the local system will calculate an unlocking key using the same one-way hashing function as was used by the central administration computer system. The local system will then compare the two keys.
- the local television V-Chip Plus+ In-Guide User Interface r system will then display on the television display monitor instructions to the user/parent to immediately choose a new master password. The user/parent must then use the appropriate keys on the viewer's remote control device to identify a new master password. Once the user/parent has identified a new master password, the local system replaces the old master password in the system security files with the new master password and allows the
- the user's system displays notification on the television display monitor notifying the user that the master password has been changed.
- the notification may be displayed in the form of an information screen, insert, overlay, scrolling message, or other such notification.
- the notification would be displayed every time the user turns the television on for a certain number of times, or alternatively, for a certain number of days.
- the present invention can be implemented using a completely automated central administration system capable of recognizing user information input with the user's telephone keypad or capable of recognizing user speech.
- the present invention can be implemented using a partially or completely manual central administration contact.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU61514/99A AU6151499A (en) | 1998-09-17 | 1999-09-17 | Apparatus and methods for unlocking password protected software systems to recover master password |
JP2000570661A JP2002525706A (en) | 1998-09-17 | 1999-09-17 | Apparatus and method for unlocking a password protected software system to recover a master password |
EP99948306A EP1121632A1 (en) | 1998-09-17 | 1999-09-17 | Apparatus and methods for unlocking password protected software systems to recover master password |
CA002344448A CA2344448A1 (en) | 1998-09-17 | 1999-09-17 | Apparatus and methods for unlocking password protected software systems to recover master password |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10075398P | 1998-09-17 | 1998-09-17 | |
US60/100,753 | 1998-09-17 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2000016190A1 true WO2000016190A1 (en) | 2000-03-23 |
WO2000016190A9 WO2000016190A9 (en) | 2000-06-08 |
Family
ID=22281360
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/021507 WO2000016190A1 (en) | 1998-09-17 | 1999-09-17 | Apparatus and methods for unlocking password protected software systems to recover master password |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1121632A1 (en) |
JP (1) | JP2002525706A (en) |
CN (1) | CN1359487A (en) |
AU (1) | AU6151499A (en) |
CA (1) | CA2344448A1 (en) |
WO (1) | WO2000016190A1 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2003062968A1 (en) * | 2002-01-24 | 2003-07-31 | Activcard Ireland, Limited | Flexible method of user authentication for password based system |
EP1429229A1 (en) * | 2002-11-27 | 2004-06-16 | Activcard Ireland Limited | Authenticated remote unblock of a PIN |
WO2006135508A2 (en) * | 2005-06-10 | 2006-12-21 | Microsoft Corporation | Transparent resource administration using a read-only domain controller |
US7191466B1 (en) | 2000-07-25 | 2007-03-13 | Laurence Hamid | Flexible system and method of user authentication for password based system |
EP2061179A1 (en) * | 2006-08-24 | 2009-05-20 | Huawei Technologies Co Ltd | Method, system and password management server for managing user password of network device |
EP2330532A1 (en) * | 2002-12-02 | 2011-06-08 | Nokia Corp. | Privacy protection in a server |
WO2011080613A1 (en) * | 2009-12-28 | 2011-07-07 | Nokia Corporation | Method and apparatus for user interaction while device is locked |
EP2733656A1 (en) * | 2003-12-23 | 2014-05-21 | Trust Digital, LLC | System and method for enforcing a security policy on mobile devices using dynamically generated security profiles |
US9998478B2 (en) | 2002-08-27 | 2018-06-12 | Mcafee, Llc | Enterprise-wide security for computer devices |
US11096054B2 (en) | 2006-10-23 | 2021-08-17 | Mcafee, Llc | System and method for controlling mobile device access to a network |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7602910B2 (en) * | 2004-11-17 | 2009-10-13 | Microsoft Corporation | Password protection |
CN101345622B (en) * | 2007-07-10 | 2012-07-25 | 北京紫贝龙科技有限责任公司 | Information safety device capable of defining authority of apparatus holder |
US8935384B2 (en) | 2010-05-06 | 2015-01-13 | Mcafee Inc. | Distributed data revocation using data commands |
CN103310136A (en) * | 2012-03-15 | 2013-09-18 | 苏州宝时得电动工具有限公司 | Automatic walking system and set thereof |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4786900A (en) * | 1985-09-30 | 1988-11-22 | Casio Computer Co. Ltd. | Electronic key apparatus |
US4802217A (en) * | 1985-06-07 | 1989-01-31 | Siemens Corporate Research & Support, Inc. | Method and apparatus for securing access to a computer facility |
US5666415A (en) * | 1995-07-28 | 1997-09-09 | Digital Equipment Corporation | Method and apparatus for cryptographic authentication |
US5818345A (en) * | 1994-12-03 | 1998-10-06 | Icl Systems Ab | Theft protection for electrically-powered articles |
US5832214A (en) * | 1995-10-26 | 1998-11-03 | Elonex I.P, Holdings, Ltd. | Method and apparatus for data security for a computer |
US5892906A (en) * | 1996-07-19 | 1999-04-06 | Chou; Wayne W. | Apparatus and method for preventing theft of computer devices |
US5944824A (en) * | 1997-04-30 | 1999-08-31 | Mci Communications Corporation | System and method for single sign-on to a plurality of network elements |
-
1999
- 1999-09-17 JP JP2000570661A patent/JP2002525706A/en active Pending
- 1999-09-17 EP EP99948306A patent/EP1121632A1/en not_active Withdrawn
- 1999-09-17 CA CA002344448A patent/CA2344448A1/en not_active Abandoned
- 1999-09-17 AU AU61514/99A patent/AU6151499A/en not_active Abandoned
- 1999-09-17 WO PCT/US1999/021507 patent/WO2000016190A1/en not_active Application Discontinuation
- 1999-09-17 CN CN 99812581 patent/CN1359487A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4802217A (en) * | 1985-06-07 | 1989-01-31 | Siemens Corporate Research & Support, Inc. | Method and apparatus for securing access to a computer facility |
US4786900A (en) * | 1985-09-30 | 1988-11-22 | Casio Computer Co. Ltd. | Electronic key apparatus |
US5818345A (en) * | 1994-12-03 | 1998-10-06 | Icl Systems Ab | Theft protection for electrically-powered articles |
US5666415A (en) * | 1995-07-28 | 1997-09-09 | Digital Equipment Corporation | Method and apparatus for cryptographic authentication |
US5832214A (en) * | 1995-10-26 | 1998-11-03 | Elonex I.P, Holdings, Ltd. | Method and apparatus for data security for a computer |
US5892906A (en) * | 1996-07-19 | 1999-04-06 | Chou; Wayne W. | Apparatus and method for preventing theft of computer devices |
US5944824A (en) * | 1997-04-30 | 1999-08-31 | Mci Communications Corporation | System and method for single sign-on to a plurality of network elements |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7191466B1 (en) | 2000-07-25 | 2007-03-13 | Laurence Hamid | Flexible system and method of user authentication for password based system |
WO2003062968A1 (en) * | 2002-01-24 | 2003-07-31 | Activcard Ireland, Limited | Flexible method of user authentication for password based system |
US9998478B2 (en) | 2002-08-27 | 2018-06-12 | Mcafee, Llc | Enterprise-wide security for computer devices |
US9560041B2 (en) * | 2002-11-27 | 2017-01-31 | Assa Abloy Ab | Authenticated remote pin unblock |
EP1429229A1 (en) * | 2002-11-27 | 2004-06-16 | Activcard Ireland Limited | Authenticated remote unblock of a PIN |
US9118668B1 (en) * | 2002-11-27 | 2015-08-25 | Assa Abloy Ab | Authenticated remote pin unblock |
US20160044027A1 (en) * | 2002-11-27 | 2016-02-11 | Assa Abloy Ab | Authenticated remote pin unblock |
US8495381B2 (en) * | 2002-11-27 | 2013-07-23 | Activcard | Authenticated remote PIN unblock |
EP2330532A1 (en) * | 2002-12-02 | 2011-06-08 | Nokia Corp. | Privacy protection in a server |
EP2733656A1 (en) * | 2003-12-23 | 2014-05-21 | Trust Digital, LLC | System and method for enforcing a security policy on mobile devices using dynamically generated security profiles |
WO2006135508A3 (en) * | 2005-06-10 | 2007-02-22 | Microsoft Corp | Transparent resource administration using a read-only domain controller |
US7865600B2 (en) | 2005-06-10 | 2011-01-04 | Microsoft Corporation | Transparent resource administration using a read-only domain controller |
US7631082B2 (en) | 2005-06-10 | 2009-12-08 | Microsoft Corporation | Transparent resource administration using a read-only domain controller |
WO2006135508A2 (en) * | 2005-06-10 | 2006-12-21 | Microsoft Corporation | Transparent resource administration using a read-only domain controller |
US8793356B2 (en) | 2005-06-10 | 2014-07-29 | Microsoft Corporation | Transparent resource administration using a read-only domain controller |
EP2061179A1 (en) * | 2006-08-24 | 2009-05-20 | Huawei Technologies Co Ltd | Method, system and password management server for managing user password of network device |
EP2061179A4 (en) * | 2006-08-24 | 2010-03-31 | Huawei Tech Co Ltd | Method, system and password management server for managing user password of network device |
US11096054B2 (en) | 2006-10-23 | 2021-08-17 | Mcafee, Llc | System and method for controlling mobile device access to a network |
US11950097B2 (en) | 2006-10-23 | 2024-04-02 | Skyhigh Security Llc | System and method for controlling mobile device access to a network |
US8718606B2 (en) | 2009-12-28 | 2014-05-06 | Nokia Corporation | Method and apparatus for user interaction while device is locked |
WO2011080613A1 (en) * | 2009-12-28 | 2011-07-07 | Nokia Corporation | Method and apparatus for user interaction while device is locked |
Also Published As
Publication number | Publication date |
---|---|
EP1121632A1 (en) | 2001-08-08 |
JP2002525706A (en) | 2002-08-13 |
CA2344448A1 (en) | 2000-03-23 |
AU6151499A (en) | 2000-04-03 |
WO2000016190A9 (en) | 2000-06-08 |
CN1359487A (en) | 2002-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8024567B2 (en) | Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof | |
EP1540869B1 (en) | System and method for user authentication with enhanced passwords | |
EP2839603B1 (en) | Abstracted and randomized one-time passwords for transactional authentication | |
US5971272A (en) | Secured personal identification number | |
US8561174B2 (en) | Authorization method with hints to the authorization code | |
US20070130618A1 (en) | Human-factors authentication | |
WO2000016190A1 (en) | Apparatus and methods for unlocking password protected software systems to recover master password | |
US20090300732A1 (en) | Method and apparatus of otp based on challenge/response | |
US20080028447A1 (en) | Method and system for providing a one time password to work in conjunction with a browser | |
US8868918B2 (en) | Authentication method | |
JP2004240637A (en) | Password authentication system | |
EP0976017B1 (en) | Method and system for providing password protection | |
JP2007124470A (en) | Portable telephone, its user authentication method, and user authentication program | |
WO2016075633A1 (en) | Secure password storage and recall system | |
JP2006033780A (en) | Network authentication system using identification by calling-back | |
JP2008191942A (en) | Authentication device, authentication method and program | |
CA2550566A1 (en) | Process for releasing the access to a computer system or to a program | |
EP1119147A1 (en) | Provision of secure access for telecommunications system | |
JPH09218852A (en) | Illegality checking system | |
US20020073345A1 (en) | Secure indentification method and apparatus | |
KR101632582B1 (en) | Method and system for user authentication using password included random key | |
JP3080202B2 (en) | IC credit card and IC card terminal | |
JP2006243868A (en) | Content authentication system, content creation device, content using device, content creation program, content using program and content authentication method | |
WO2007066385A1 (en) | Personal authentication system, method of personal authentication and program for executing personal authentication | |
KR100594437B1 (en) | User direct password setting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99812581.4 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: C2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: C2 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
COP | Corrected version of pamphlet |
Free format text: PAGES 1/4-4/4, DRAWINGS, REPLACED BY NEW PAGES 1/4-4/4; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2344448 Country of ref document: CA Ref document number: 2344448 Country of ref document: CA Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2000 570661 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999948306 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09787389 Country of ref document: US |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWP | Wipo information: published in national office |
Ref document number: 1999948306 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999948306 Country of ref document: EP |