Access Management and Credential Protection
First Claim
Patent Images
1. A user system comprising:
- a legacy computing device;
a hardware computing device;
any of a secured input device, a secured output device, or combination thereof;
any of an input device, an output device, or combination thereof;
the legacy computing system further comprising;
any of an off-the-shelf computing system, notebook, smartphone, personal computer, tablet, point of sale terminal, monitoring station, maintenance station, programmable logic controller, server, wired or wireless router, or combination thereof;
the legacy computing system communicating with any of a network, a hardware computing device, input or output peripheral, or combination thereof;
a hardware computing device serving as a trusted environment, the hardware computing device further comprising;
a central processing unit and memory, programs and instructions executed by the central processing unit;
data stored in the memory and processed by the central processing unit;
the hardware computing device connected and communicating with the legacy computing system;
the hardware computing device communicating with any of a network computing system, another legacy computing system, another hardware computing device or combination thereof;
the hardware computing device connected and communicating to any of a keyboard, mouse, camera, microphone, touch pad, touch screen, biometric device, display, speaker, network communication device, input device, output device or combination thereof;
the hardware computing device executing secure functions and processes, without the legacy computing system having access to data in the hardware computing device;
the hardware computing device processing data any of;
the input device communicatively coupled with the hardware computing device and the input device transmitting secure data to the hardware computing device without the legacy computing system having access to the secure data;
an authentication and identification module or function;
the hardware computing device transmitting secure data to the network communicating with other networked computing systems without the legacy computing system having access to such data;
encryption and decryption functions;
comparing characters and bits strings from input devices to stored information;
blocking data from reaching the legacy computing system;
altering the character strings transmitted to the legacy computing system to enable seeding;
warn user on suspicious operation;
voice and image recognition;
secure handling of sensitive information and data;
emulating I/O peripherals to be transmitted to the legacy computing system or combination thereof;
the hardware computing device includes any type of memory means, RAM, Flash, ROM, hardwired, firmware or combination thereof;
the hardware computing device storing in the memory any of data, passwords, encryption codes, account numbers, credit card numbers, social security number, ID values, images, video, voice, audio, URLs, black and white lists, contact lists, email contacts, sensitive records, finger prints, iris image, digital signature, hardware computing device ID number, GPS location or combination thereof without the legacy computing system having access to the memory;
the data stored in the memory may be acquired with any of an input device, the legacy computing system or a legacy computing system, data from a network, another hardware computing device or combination thereof;
the hardware computing device communicates with network computing systems and the hardware computing device executes any of functions, receiving data, sending data, processing data, transferring data to a legacy computing system or combination thereof; and
the hardware computing device designed to communicate with any of input device, output device, a keyboard, a switch, a microphone, a camera, a fingerprint scanner, a biometric device, a GPS device, a LED, a speaker, a display, or combination thereof.
0 Assignments
0 Petitions
Accused Products
Abstract
Secure computer architectures, systems, and applications are provided herein. An exemplary system includes a legacy environment which is an off-the-shelf computing system, a trusted environment device that communicates with a network, and at least one peripheral that is communicatively coupled with the trusted environment device or having an authentication module.
57 Citations
8 Claims
-
1. A user system comprising:
-
a legacy computing device; a hardware computing device; any of a secured input device, a secured output device, or combination thereof; any of an input device, an output device, or combination thereof; the legacy computing system further comprising; any of an off-the-shelf computing system, notebook, smartphone, personal computer, tablet, point of sale terminal, monitoring station, maintenance station, programmable logic controller, server, wired or wireless router, or combination thereof; the legacy computing system communicating with any of a network, a hardware computing device, input or output peripheral, or combination thereof; a hardware computing device serving as a trusted environment, the hardware computing device further comprising; a central processing unit and memory, programs and instructions executed by the central processing unit; data stored in the memory and processed by the central processing unit; the hardware computing device connected and communicating with the legacy computing system; the hardware computing device communicating with any of a network computing system, another legacy computing system, another hardware computing device or combination thereof; the hardware computing device connected and communicating to any of a keyboard, mouse, camera, microphone, touch pad, touch screen, biometric device, display, speaker, network communication device, input device, output device or combination thereof; the hardware computing device executing secure functions and processes, without the legacy computing system having access to data in the hardware computing device; the hardware computing device processing data any of; the input device communicatively coupled with the hardware computing device and the input device transmitting secure data to the hardware computing device without the legacy computing system having access to the secure data; an authentication and identification module or function; the hardware computing device transmitting secure data to the network communicating with other networked computing systems without the legacy computing system having access to such data; encryption and decryption functions; comparing characters and bits strings from input devices to stored information; blocking data from reaching the legacy computing system; altering the character strings transmitted to the legacy computing system to enable seeding; warn user on suspicious operation; voice and image recognition; secure handling of sensitive information and data; emulating I/O peripherals to be transmitted to the legacy computing system or combination thereof; the hardware computing device includes any type of memory means, RAM, Flash, ROM, hardwired, firmware or combination thereof; the hardware computing device storing in the memory any of data, passwords, encryption codes, account numbers, credit card numbers, social security number, ID values, images, video, voice, audio, URLs, black and white lists, contact lists, email contacts, sensitive records, finger prints, iris image, digital signature, hardware computing device ID number, GPS location or combination thereof without the legacy computing system having access to the memory; the data stored in the memory may be acquired with any of an input device, the legacy computing system or a legacy computing system, data from a network, another hardware computing device or combination thereof; the hardware computing device communicates with network computing systems and the hardware computing device executes any of functions, receiving data, sending data, processing data, transferring data to a legacy computing system or combination thereof; and the hardware computing device designed to communicate with any of input device, output device, a keyboard, a switch, a microphone, a camera, a fingerprint scanner, a biometric device, a GPS device, a LED, a speaker, a display, or combination thereof. - View Dependent Claims (2, 3, 4)
-
-
5. A secured computing system comprising any of a computing system, a legacy system, a trusted system, a hardware computing device, a server, or combination thereof that executes a program further comprising any of a session with a hardware computing device, a session with a legacy computing system, a session with another computing system on a network, a management program that integrates all programs into a single user session or combination thereof by means of a single or multiple IP addresses;
-
the secured computing system communicating with any of the legacy system, the hardware computing device or combination thereof; the hardware computing device communicating directly to any of the secured computing system, another secured computing system or via the legacy computing system; the hardware computing device connected to input or output devices that allow a user to directly communicate with the secured computing system or another secured computing system; the secured computing system executing a user session initiated in the user'"'"'s computing system, the user'"'"'s computing system further comprising the legacy computing system and the hardware computing device, the session supported by means of multiple internet protocol addresses; the user session further comprising either of a secure session executed by means of the hardware computing device or a non-secure session executed by means of the legacy computing system; the secured computing system allowing the user to communicate securely with any of a networked computing system, the legacy computing system or another computing system, a server, a site or combination thereof; the secured computing system allowing secured action and service any of opening an account, login to an account, access to another networked computing system, payment, fund transfer, review and transfer documents, process information received from the hardware computing device or from the legacy computing system, evaluating data from the legacy computing system with reference to data from the hardware computing device, displaying information communicated to the legacy computing system for the user review, masking information to be sent to the legacy computing system to allow only the user to view it and avoid malware from interpreting it or combination thereof;
the secured computing system executing any of authentication of user, actions, operations, defeating or seeding of malware, hacker or combination thereof, taking advantage of simultaneous communication via two channels to the hardware computing device and the legacy computing system by any of storing user credentials including any of passwords, token values, cookies, pictures, audio, credit card, social security, ID numbers, hardware computing device ID, URLs, seeded information, or combination thereof;the secured computing system comparing information received from the legacy computing system to the information received from the hardware computing device, detecting attempts by malware or hacker by means of seeded information, block or redirect malware or hacker access, locate hacker in real time, retaliate against hackers or combination thereof. - View Dependent Claims (6, 7, 8)
-
Specification