VASCO Data Security, Inc.

United States of America

Back to Profile

1-43 of 43 for VASCO Data Security, Inc. Sort by
Query
Aggregations
IP Type
        Patent 40
        Trademark 3
Jurisdiction
        World 39
        United States 2
        Europe 2
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 10
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 8
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures 5
G06F 21/42 - User authentication using separate channels for security data 3
G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors 3
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 3
09 - Scientific and electric apparatus and instruments 2
38 - Telecommunications services 2
45 - Legal and security services; personal services for individuals. 2

1.

Electronic device

      
Application Number 29583209
Grant Number D0816082
Status In Force
Filing Date 2016-11-03
First Publication Date 2018-04-24
Grant Date 2018-04-24
Owner Vasco Data Security Inc. (USA)
Inventor Stijnen, Frederik

2.

AN ELECTRONIC APPARATUS COMPRISING A LINEAR KEYPAD

      
Application Number US2017012063
Publication Number 2017/117613
Status In Force
Filing Date 2017-01-03
Publication Date 2017-07-06
Owner
  • VASCO DATA SECURTY, INC. (USA)
  • VASCO DATA SECURTY INTERNATIONAL GMBH (Switzerland)
Inventor Savtchenko, Serguei, Konstantinovich

Abstract

An electronic circuit providing a linear keypad and an apparatus comprising such electronic circuit are provided. Methods for detecting that a button of a linear keypad is being pressed and for determining which button is being pressed are also provided. A method for calibrating an apparatus comprising a linear keypad to enable the subsequent determination by the apparatus of which button of the linear keypad is being pressed is also provided.

IPC Classes  ?

  • H03M 11/24 - Static coding using analogue means
  • G06F 3/02 - Input arrangements using manually operated switches, e.g. using keyboards or dials

3.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2016052865
Publication Number 2017/053412
Status In Force
Filing Date 2016-09-21
Publication Date 2017-03-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Teixeron, Guillaume
  • Joly, Ludovic
  • Mennes, Frederik

Abstract

Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and systems are disclosed for thwarting overlay attacks against authentication applications for displaying transaction data and for generating signatures over these transaction data.

IPC Classes  ?

  • G06F 21/42 - User authentication using separate channels for security data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

4.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2016052835
Publication Number 2017/053394
Status In Force
Filing Date 2016-09-21
Publication Date 2017-03-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Mennes, Frederik
  • Joly, Ludovic
  • Teixeron, Guillaume

Abstract

Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and systems are disciosed for thwarting overlay attacks against authentication applications for displaying transaction data and for generating signatures over these transaction data.

IPC Classes  ?

  • G06F 21/42 - User authentication using separate channels for security data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

5.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2016052849
Publication Number 2017/053403
Status In Force
Filing Date 2016-09-21
Publication Date 2017-03-30
Owner
  • VASCO DATA SECURITY, INC (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Mennes, Frederik
  • Joly, Ludovic
  • Teixeron, Guillaume

Abstract

Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and systems are disclosed for thwarting overlay attacks against authentication applications for displaying transaction data and for generating signatures over these transaction data.

IPC Classes  ?

  • G06F 21/42 - User authentication using separate channels for security data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

6.

METHOD AND APPARATUS FOR SECURING A MOBILE APPLICATION

      
Application Number US2015067784
Publication Number 2016/190903
Status In Force
Filing Date 2015-12-29
Publication Date 2016-12-01
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Claes, Mathias
  • Coulier, Frank

Abstract

Methods, apparatus, and systems for personalizing a software token using a dynamic credential (such as a one-time password or electronic signature) generated by a hardware token are disclosed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

7.

VASCO TRUST FOR THE DIGITAL WORLD

      
Application Number 016051088
Status Registered
Filing Date 2016-11-17
Registration Date 2017-05-22
Owner VASCO Data Security, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking [supervision], life-saving and teaching apparatus and instruments; Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; Apparatus for recording, transmission or reproduction of sound or images; Magnetic data carriers, recording discs; Compact discs, DVDs and other digital recording media; Mechanisms for coin-operated apparatus; Cash registers, calculating machines, data processing equipment, computers; Computer software; Fire-extinguishing apparatus; security software; computer application software; data processing apparatus; telecommunications apparatus; mobile telecommunication apparatus; downloadable computer security software; software for network and device security; software for ensuring the security of electronic mail; cards encoded with security features for identification purposes; computer hardware; electronic publications, downloadable, relating to data security; data storage devices; data capture apparatus; data encryption apparatus; electronic encryption units; encoding and decoding apparatus and instruments; electronic coding units; electronic decoders; software for assessing the risk associated with end user identities; software for application, transaction and identity security related to mobile device applications; software for electronic signature applications and systems, including administrative and user applications and digital storage systems; software for data security; software for secure transaction authentication; software for the protection of on-line transactions and data transfer by electronic means; software for access control to computers, electronic networks, web sites and databases; software for electronic generation of authentication credentials and signatures; computer software for biometric systems for the identification and authentication of persons; biometric identification apparatus; biometric access control systems; biometric identification systems; biometric fingerprint readers; biometric voice recognition systems; biometric retinal scanners; electronic devices and computer hardware for data security, electronic generation of authentication credentials and signatures, protection of on-line transactions and data transfer by electronic means, and for access control to computers, electronic networks, web sites and databases; encoded smart cards; optical readers; authentication tokens, namely, hardware devices for authorising access to a network service; electronic security tags; parts and fittings for all the aforesaid goods. Telecommunications; providing access to electronic communications networks and electronic databases; providing access to portals on the internet; providing access to platforms on the internet; providing secure or authenticated access to computer networks and websites; providing electronic transmission of secure e-mail; automatic transfer of digital data using telecommunications channels; communication of information by electronic means; data transfer services; digital transmission of data via the internet; electronic communication services for financial institutions; electronic communications services relating to credit card authorisation; electronic transmission and retransmission of sounds, images, documents, messages and data; provision of wireless application protocol services including those utilising a secure communications channel; secured data, sound and image transmission services; transmission of coded messages and images; transmission of encrypted communications; transmission of short messages [SMS], images, speech, sound, music and text communications between mobile telecommunications devices; information, advisory and consultancy services in relation to all the aforesaid services. Scientific and technological services and research and design relating thereto; Industrial analysis and research services; Design and development of computer hardware and software; hosting services and software as a service and rental of software; software research; providing temporary use of non-downloadable software applications accessible via a web site; installation and customization of computer applications software; updating and maintenance of computer software; programming of data processing equipment; project studies relating to software; testing of computing equipment; maintaining websites; software as a service [SaaS]; platform as a service [PaaS]; data security services; data security services [firewalls]; computer programming services for electronic data security; design and development of electronic data security systems; programming of internet security programs; rental of internet security programs; design and development of internet security programs; computer security services for protection against illegal network access; provision of security services for computer networks, computer access and computerised transactions; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; identity verification services;  services for the digitization and automation of business workflows such as onboarding a new customer; research relating to security; technical research relating to automatic identification systems; testing, analysis and evaluation services in the telecommunications field, for the purpose of certification and designing, updating and maintaining computer software of others used for security and certification of electronic instructions; consultation services, namely, consultation in the field of data security; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals;   monitoring of computer systems for security purposes in the nature of monitoring data transmission and online financial transactions;   information, advisory and consultancy services in relation to all the aforesaid services. Legal services; Security services for the protection of property and individuals; security services; security assessment of risks; monitoring of security systems; electronic monitoring services for security purposes; electronic signature verification services;    providing user authentication services in e-commerce transactions; information, advisory and consultancy services in relation to all the aforesaid services.

8.

VASCO DELIVERING TRUST TO THE DIGITAL WORLD

      
Application Number 016051104
Status Registered
Filing Date 2016-11-17
Registration Date 2017-05-22
Owner VASCO Data Security, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 38 - Telecommunications services
  • 42 - Scientific, technological and industrial services, research and design
  • 45 - Legal and security services; personal services for individuals.

Goods & Services

Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking [supervision], life-saving and teaching apparatus and instruments; Apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; Apparatus for recording, transmission or reproduction of sound or images; Magnetic data carriers, recording discs; Compact discs, DVDs and other digital recording media; Mechanisms for coin-operated apparatus; Cash registers, calculating machines, data processing equipment, computers; Computer software; Fire-extinguishing apparatus; security software; computer application software; data processing apparatus; telecommunications apparatus; mobile telecommunication apparatus; downloadable computer security software; software for network and device security; software for ensuring the security of electronic mail; cards encoded with security features for identification purposes; computer hardware; electronic publications, downloadable, relating to data security; data storage devices; data capture apparatus; data encryption apparatus; electronic encryption units; encoding and decoding apparatus and instruments; electronic coding units; electronic decoders; software for assessing the risk associated with end user identities; software for application, transaction and identity security related to mobile device applications; software for electronic signature applications and systems, including administrative and user applications and digital storage systems; software for data security; software for secure transaction authentication; software for the protection of on-line transactions and data transfer by electronic means; software for access control to computers, electronic networks, web sites and databases; software for electronic generation of authentication credentials and signatures; computer software for biometric systems for the identification and authentication of persons; biometric identification apparatus; biometric access control systems; biometric identification systems; biometric fingerprint readers; biometric voice recognition systems; biometric retinal scanners; electronic devices and computer hardware for data security, electronic generation of authentication credentials and signatures, protection of on-line transactions and data transfer by electronic means, and for access control to computers, electronic networks, web sites and databases; encoded smart cards; optical readers; authentication tokens, namely, hardware devices for authorising access to a network service; electronic security tags; parts and fittings for all the aforesaid goods. Telecommunications; providing access to electronic communications networks and electronic databases; providing access to portals on the internet; providing access to platforms on the internet; providing secure or authenticated access to computer networks and websites; providing electronic transmission of secure e-mail; automatic transfer of digital data using telecommunications channels; communication of information by electronic means; data transfer services; digital transmission of data via the internet; electronic communication services for financial institutions; electronic communications services relating to credit card authorisation; electronic transmission and retransmission of sounds, images, documents, messages and data; provision of wireless application protocol services including those utilising a secure communications channel; secured data, sound and image transmission services; transmission of coded messages and images; transmission of encrypted communications; transmission of short messages [SMS], images, speech, sound, music and text communications between mobile telecommunications devices; information, advisory and consultancy services in relation to all the aforesaid services. Scientific and technological services and research and design relating thereto; Industrial analysis and research services; Design and development of computer hardware and software; hosting services and software as a service and rental of software; software research; providing temporary use of non-downloadable software applications accessible via a web site; installation and customization of computer applications software; updating and maintenance of computer software; programming of data processing equipment; project studies relating to software; testing of computing equipment; maintaining websites; software as a service [SaaS]; platform as a service [PaaS]; data security services; data security services [firewalls]; computer programming services for electronic data security; design and development of electronic data security systems; programming of internet security programs; rental of internet security programs; design and development of internet security programs; computer security services for protection against illegal network access; provision of security services for computer networks, computer access and computerised transactions; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; identity verification services;  services for the digitization and automation of business workflows such as onboarding a new customer; research relating to security; technical research relating to automatic identification systems; testing, analysis and evaluation services in the telecommunications field, for the purpose of certification and designing, updating and maintaining computer software of others used for security and certification of electronic instructions; consultation services, namely, consultation in the field of data security; computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals; monitoring of computer systems for security purposes in the nature of monitoring data transmission and online financial transactions; information, advisory and consultancy services in relation to all the aforesaid services. Legal services; Security services for the protection of property and individuals; security services; security assessment of risks; monitoring of security systems; electronic monitoring services for security purposes; electronic signature verification services;   providing user authentication services in e-commerce transactions; information, advisory and consultancy services in relation to all the aforesaid services.

9.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2015058365
Publication Number 2016/114841
Status In Force
Filing Date 2015-10-30
Publication Date 2016-07-21
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Mennes, Frederik
  • Couck, Guy
  • Fierens, Bert
  • Lavigne, Sebastien
  • Braams, Harm
  • De Wasch, Tom
  • Teixeron, Guillaume

Abstract

A strong authentication token supporting multiple instances associated with different users and protected by a user identity verification mechanism is disclosed. A multi-instance strong authentication token may be adapted to generate dynamic credentials using cryptographic secrets that are specific to a particular instance stored in the token. A method and a system to secure remotely accessible applications using strong authentication tokens supporting multiple instances are disclosed. A method for loading additional tokens into a multi-instance authentication token is disclosed.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

10.

METHODS, SYSTEMS AND APPARATUS FOR RECOGNIZING GENUINE PRODUCTS

      
Application Number US2015068000
Publication Number 2016/109626
Status In Force
Filing Date 2015-12-30
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONALL GMBH (Switzerland)
Inventor Coulier, Frank

Abstract

Methods, apparatus and systems are described for identifying potentially counterfeited products or goods.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

11.

DATA EXCHANGE METHODS, SYSTEMS AND APPARATUS USING COLOR IMAGES

      
Application Number US2015068225
Publication Number 2016/109767
Status In Force
Filing Date 2015-12-31
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Coulier, Frank

Abstract

Methods, apparatus and systems for transferring transaction data using color images are provided.

IPC Classes  ?

  • G06F 21/36 - User authentication by graphic or iconic representation
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

12.

A METHOD AND APPARATUS FOR SECURING AN APPLICATION USING A MEASUREMENT OF A LOCATION DEPENDENT PHYSICAL PROPERTY OF THE ENVIRONMENT

      
Application Number US2015068310
Publication Number 2016/109809
Status In Force
Filing Date 2015-12-31
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor De Wasch, Tom

Abstract

Methods, apparatus, and systems for authenticating a user taking into account measurement values of characteristics of the purported environment of the user are described.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/60 - Protecting data
  • H04W 12/12 - Detection or prevention of fraud

13.

USER AUTHENTICATION BASED ON PERSONAL ACCESS HISTORY

      
Application Number US2015067808
Publication Number 2016/109496
Status In Force
Filing Date 2015-12-29
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

Methods and systems are provided for authenticating a user using data related to the historical interactions of the user with computer based applications.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

14.

AN AUTHENTICATION APPARATUS WITH A BLUETOOTH INTERFACE

      
Application Number US2014070485
Publication Number 2015/102880
Status In Force
Filing Date 2014-12-16
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Grange, Benoit
  • Verrept, Johan
  • Claes, Mathias

Abstract

Methods, apparatus, and systems for securing the interactions of a user with an application using a Bluetooth enabled authentication device are disclosed.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • G06F 21/43 - User authentication using separate channels for security data wireless channels
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

15.

ELECTRONIC SIGNING METHODS, SYSTEMS AND APPARATUS

      
Application Number US2014071068
Publication Number 2015/102918
Status In Force
Filing Date 2014-12-18
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

Methods, apparatus, and systems for generating digital signatures are disclosed. An apparatus may present itself to a host computer as a mass storage device to provide cryptographic processing results through a standard mass storage access mechanism for exchanging files.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

16.

A METHOD AND APPARATUS FOR SECURING A MOBILE APPLICATION

      
Application Number US2014072102
Publication Number 2015/103031
Status In Force
Filing Date 2014-12-23
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

Methods, apparatus, and systems for securing a mobile application are disclosed. Users of the mobile application may be authenticated using a smartphone or other device including a Near-Field Communication (NFC) transfer device capable of NFC communication. An authentication device may be adapted to present itself to the NFC transfer device as an NFC tag and make a dynamic credential available to the NFC transfer device by including the dynamic credential in an NFC tag readable by the NFC transfer device using NFC mechanisms for reading data contents of NFC tags. An access device comprising the NFC transfer device may then provide the dynamic credential to an application server for verification.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor

17.

A METHOD AND APPARATUS FOR PROVIDING CLIENT-SIDE SCORE-BASED AUTHENTICATION

      
Application Number US2014072818
Publication Number 2015/103302
Status In Force
Filing Date 2014-12-30
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Teixeron, Guillaume
  • Lavigne, Sebastien

Abstract

Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may comprise a client-side risk assessment. The risk assessment may also comprise a server-side risk assessment.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security
  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
  • H04L 9/08 - Key distribution

18.

REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES

      
Application Number US2013077961
Publication Number 2014/106031
Status In Force
Filing Date 2013-12-27
Publication Date 2014-07-03
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Mariën, Dirk
  • Coulier, Frank
  • Hoornaert, Frank
  • Mennes, Frederik

Abstract

Authentication devices and methods for generating dynamic credentials are disclosed. The authentication devices include a communication interface for communicating with a security device such as a smart card. A dynamic credential such as a one-time password (OTP) or a message authentication code (MAC) may be generated by receiving from a server an encrypted initialization seed encrypted with an asymmetric encryption algorithm using a public key of a public/private key pair, submitting the encrypted initialization seed to a security device, decrypting at the security device the encrypted initialization seed with a private key of the public/private key pair, returning the decrypted initialization seed to the authentication device, deriving at the authentication device a secret credential generation key from the decrypted initialization seed, and generating the dynamic credential by combining a dynamic variable with the secret credential generation key using a symmetric cryptographic dynamic credential generation algorithm.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

19.

A METHOD AND AN APPARATUS FOR SECURELY SIGNING APPLICATION DATA

      
Application Number US2013078314
Publication Number 2014/106181
Status In Force
Filing Date 2013-12-30
Publication Date 2014-07-03
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

The invention provides a method and apparatus for the secure electronic signing of electronic documents and data. In a preferred embodiment, a method for generating a first digital signature associated with a set of application data is disclosed. The method comprises the steps of: obtaining a first digital representation in a high level first data format of the set of application data; generating a second digital representation in a low level second data format of the application data whereby said low level second data format is different from said high level first data format; presenting an analog representation of the set of application data to a user, whereby said second digital representation is a precise and accurate representation of said analog representation; obtaining an indication whether said user approves said analog representation for signing; if said indication indicates that the user approves said analog representation for signing, generating said first digital signature over said second digital representation using a first signature key associated with the user.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

20.

USER-CONVENIENT AUTHENTICATION METHOD AND APPARATUS USING A MOBILE AUTHENTICATION APPLICATION

      
Application Number US2013053433
Publication Number 2014/022778
Status In Force
Filing Date 2013-08-02
Publication Date 2014-02-06
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Coulier, Frank
  • Teixeron, Guillaume

Abstract

Methods, apparatus, and systems for securing application interactions are disclosed. Application interactions may be secured by, at a user authentication device, capturing a signal emitted by an access device encoded with an authentication initiating message including an application identifier, decoding the signal and obtaining the authentication initiating message, retrieving the application identifier, presenting a human interpretable representation of the application identity to the user, obtaining user approval to generate a response message available to a verification server, generating a dynamic security value using a cryptographic algorithm that is cryptographically linked to the application identity, and generating a response message including the generated dynamic security value; making the response message available to a verification server; and, at the verification server, receiving the response message, verifying the response message including verifying the validity of the dynamic security value, and communicating the result of the verification of the response message to the application.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • G06F 21/43 - User authentication using separate channels for security data wireless channels
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

21.

USB DEVICE WITH A CAP

      
Application Number US2012071939
Publication Number 2013/102001
Status In Force
Filing Date 2012-12-28
Publication Date 2013-07-04
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Agreda De Ro, Maya
  • Waltniel, Rudy

Abstract

An electronic device, which may be a USB device, includes a body part that is removably connected to a cap. The body part includes a connector for plugging the device into a host computing device. The cap includes a lever part and a main part. The lever part of the cap is attached to the main part and pivots at least partially around a pivot axis. The lever part includes an anchor part on one side of the pivot axis and an unlock part on the other side of the pivot axis. The anchor part includes a hook that engages a cavity in the body part when the cap is connected to the body part. Depressing the unlock part of the cap causes the lever to pivot around the pivot axis thereby disengaging the hook from the first cavity, and thereby releasing the cap from the body part.

IPC Classes  ?

  • H05K 5/02 - Casings, cabinets or drawers for electric apparatus Details
  • H01R 13/453 - Shutter or cover plate opened by engagement of counterpart
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • H01R 13/44 - Means for preventing access to live contacts

22.

A STRONG AUTHENTICATION TOKEN WITH VISUAL OUTPUT OF PKI SIGNATURES

      
Application Number US2012071941
Publication Number 2013/102003
Status In Force
Filing Date 2012-12-28
Publication Date 2013-07-04
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO Data Security International GmbH (Switzerland)
Inventor Mariën, Dirk

Abstract

A handheld authentication device comprising a data processor and a display is adapted to : generate an input value; submit the input value to an asymmetric cryptographic operation; obtain the result of said asymmetric cryptographic operation; generate an authentication message substantially comprising the result of the asymmetric cryptographic operation; encode the authentication message into one or more images; and display these images on the display. A method for securing computer-based applications remotely accessed by a user comprises capturing images displayed on the display of an authentication device of the user whereby these images have been encoded with an authentication message generated by the authentication device and whereby the authentication message comprises the result of an asymmetric cryptographic operation on an input value; decoding the images to retrieve the authentication message; retrieving the result of the asymmetric cryptographic operation from the authentication message; verifying the authentication message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

23.

A SMART CARD READER WITH A SECURE LOGGING FEATURE

      
Application Number US2012065017
Publication Number 2013/074631
Status In Force
Filing Date 2012-11-14
Publication Date 2013-05-23
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

The present invention provides a secure smart card reader enabled to make reader signatures on data representative of events and actions which may be security related and which may comprise data representative of reader commands the reader receives from a host or remote application, smart card commands the reader exchanges with an inserted smart card, data the reader presents to the user for approval, and/or configuration parameters the reader applies when dealing with any of the foregoing. The smart card reader may furthermore be adapted to maintain logs of certain events and actions which may comprise exchanging reader commands with a host or remote application, exchanging smart card commands with an inserted smart card, and/or interactions with a user. The logs may comprise data representative of reader commands the reader receives from a host or remote application, smart card commands the reader exchanges with an inserted smart card, data the reader presents to the user for approval, and/or configuration parameters the reader applies when dealing with any of the foregoing. The secure smart card reader may be adapted to generate a reader signature over one or more of these logs.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
  • G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card

24.

REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES

      
Application Number US2012033432
Publication Number 2012/142354
Status In Force
Filing Date 2012-04-13
Publication Date 2012-10-18
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Coulier, Frank
  • Hoornaert, Frank
  • Mennes, Frederik

Abstract

The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKI private keys such as PKI-enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards

25.

A STRONG AUTHENTICATION TOKEN WITH ACOUSTIC DATA INPUT

      
Application Number US2012026077
Publication Number 2012/116045
Status In Force
Filing Date 2012-02-22
Publication Date 2012-08-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Mariën, Dirk

Abstract

Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed. The tokens may also include an optical interface for receiving input data and may have a selection mechanism to select either the acoustical or the optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device. The acoustic signal received by the token may be modulated using a frequency shift keying modulation scheme using a plurality of coding frequencies to code the acoustical signal where each coding frequency may be an integer multiple of a common base frequency.

IPC Classes  ?

  • G06F 21/20 - by restricting access to nodes in a computer system or computer network

26.

PARALLEL-SERIAL BATTERY SWITCHING AND VOLTAGE REGULATING CIRCUIT AND METHOD FOR STRONG AUTHENTICATION TOKENS.

      
Application Number US2012025011
Publication Number 2012/115821
Status In Force
Filing Date 2012-02-14
Publication Date 2012-08-30
Owner
  • VASCO DATA SECURITY INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

An electronic power supply circuit for battery-powered hardware devices is disclosed which can be electronically switched to supply any of at least two predetermined voltages wherein the batteries are switched in parallel or in series depending on the desired voltage. Also disclosed is an electronic apparatus comprising the electronic power supply circuit, which in some modes of operation uses the highest of the two predetermined voltages and which in other modes of operation can function with the lower of two predetermined voltages, and includes control logic that switches the electronic power supply circuit to supply said higher voltage when the apparatus in a mode in which it uses this higher voltage and that switches said electronic power supply circuit to supply said lower voltage at least during some of the modes in which the apparatus can function with the lower voltage.

IPC Classes  ?

  • H02M 3/158 - Conversion of DC power input into DC power output without intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators including plural semiconductor devices as final control devices for a single load
  • H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries

27.

METHOD AND APPARATUS FOR ENCODING AND DECODING DATA TRANSMITTED TO AN AUTHENTICATION TOKEN

      
Application Number US2012026588
Publication Number 2012/116312
Status In Force
Filing Date 2012-02-24
Publication Date 2012-08-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Hoornaert, Frank
  • Marien, Dirk

Abstract

Methods and apparatus for encoding and decoding data transmitted acoustically and/or optically to strong authentication tokens to generate dynamic security values are disclosed. The tokens may also include a selection mechanism to select either an acoustical or an optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device.

IPC Classes  ?

  • G06F 21/20 - by restricting access to nodes in a computer system or computer network

28.

MASS STORAGE DEVICE MEMORY ENCRYPTION METHODS, SYSTEMS, AND APPARATUS

      
Application Number US2011040729
Publication Number 2011/159918
Status In Force
Filing Date 2011-06-16
Publication Date 2011-12-22
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

Mass storage devices and methods for securely storing data are disclosed. The mass storage device includes a communication interface for communicating with a connected host computer, a mass-memory storage component for storing data, a secure key storage component adapted to securely store at least one master secret, and an encryption-decryption component different from the secure key storage component and connected to the secure key storage component and the mass-memory storage component. The encryption-decryption component may be adapted to encrypt data received from the host computer using an encryption algorithm and at least one encryption key and to write the encrypted data into the mass-memory storage component. The encryption-decryption component may also be adapted to decrypt encrypted data stored in the mass-memory storage component for returning the data to the host computer in response to a read data command from the host computer using a decryption algorithm and at least one decryption key the security of which is protected using a master secret securely stored in the secure key storage component.

IPC Classes  ?

  • G06F 21/02 - by protecting specific internal components of computers

29.

COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY

      
Application Number US2010053846
Publication Number 2011/050321
Status In Force
Filing Date 2010-10-22
Publication Date 2011-04-28
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Hoornaert, Frank
  • Marien, Dirk

Abstract

Transactions are classified into a limited number of categories. A user submitting a transaction to a server is requested to also generate and submit a dynamic transaction category approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction. Transactions are assigned one of a limited number of risk levels. A user submitting a transaction to a server is requested to also generate and submit a dynamic risk level approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction. The received dynamic risk level approval code is verified on the server side by comparing it with the generated verification value.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

30.

STRONG AUTHENTICATION TOKEN USABLE WITH A PLURALITY OF INDEPENDENT APPLICATION PROVIDERS

      
Application Number US2010053862
Publication Number 2011/050332
Status In Force
Filing Date 2010-10-22
Publication Date 2011-04-28
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Grange, Benoit
  • Marien, Dirk
  • Hoornaert, Frank

Abstract

The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

31.

AUTHENTICATION TOKEN WITH INCREMENTAL KEY ESTABLISHMENT CAPABILITY

      
Application Number US2010041486
Publication Number 2011/006043
Status In Force
Filing Date 2010-07-09
Publication Date 2011-01-13
Owner
  • VASCO DATA SECURITY INC. (USA)
  • VASCO DATA SECURITY INTERNATINAL GMBH (Switzerland)
Inventor
  • Hoornaert, Frank
  • Mennes, Frederik

Abstract

An apparatus comprising storage for a secret key, said secret key for use in the generation of cryptographic values, and a cryptographic agent for generating said cryptographic values using said secret key, selects one of a predetermined set of key transformations in an unpredictable way and applies said selected key transformation to said secret key prior to generating one of said cryptographic values A server receives and authenticates a credential generated using a transformed secret and derives the transformed secret, by generating a plurality of verification values using a set of known permitted transformations of a stored secret, determining whether said credential matches one of said plurality of verification values, and, if said credential matches one of said plurality of verification values, storing the corresponding one of said set of known permitted transformations as an updated value for said stored secret

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

32.

IMPROVED MODULATION AND DEMODULATION CIRCUIT

      
Application Number US2010041490
Publication Number 2011/006046
Status In Force
Filing Date 2010-07-09
Publication Date 2011-01-13
Owner
  • VASCO DATA SECURITY INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

The invention relates to the field of modulation and demodulation circuits, such as envelope detectors used to demodulate amplitude- modulated (AM) signals and amplitude-shift-keying (ASK) signals. By judiciously coupling an analog circuit comprising one resistor and two capacitors which are judiciously dimensioned to a port of a digital component, an extremely compact envelope detector can be obtained, which achieves demodulation of a binary ASK signal for direct coupling into a digital input port. Accordingly, a very compact envelope detector may advantageously be used in the data receiving part of a sealed device requiring postmanufactuπng data transfer, in combination with additional components that provide electromagnetic coupling, such as inductive coupling, capacitive coupling, or radiative coupling. An example of such a device is a credit card sized authentication token, the electrical personalization of which happens after the production of the card-like housing.

IPC Classes  ?

  • H03K 5/153 - Arrangements in which a pulse is delivered at the instant when a predetermined characteristic of an input signal is present or at a fixed time interval after this instant

33.

SLIM ELECTRONIC APPARATUS WITH EMBOSSED KEY PROTECTION AND PROCESS FOR PROVIDING SAME

      
Application Number US2009068646
Publication Number 2010/080573
Status In Force
Filing Date 2009-12-18
Publication Date 2010-07-15
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Couck, Guy, Louis

Abstract

The present invention relates to the field of pocket-size electronic devices, including credit card sized devices such as authentication tokens. It consists of an improvement of the well-known "raised ridge" to protect individual buttons from false key presses, obtained by applying embossing. A known problem with applying embossing to cards containing electronic components, is the fact that the embossing process may damage the components or the wiring inside the card. In the process according to the invention, an embossed ridge of a judiciously designed shape is used to avoid such damage.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

34.

SLIM ELECTRONIC DEVICE WITH DETECTOR FOR UNINTENTIONAL ACTIVATION

      
Application Number US2009067299
Publication Number 2010/068659
Status In Force
Filing Date 2009-12-09
Publication Date 2010-06-17
Owner VASCO DATA SECURITY, INC. (USA)
Inventor
  • Vasco Data Security International Gmbh
  • Couck, Guy, Louis

Abstract

The device of the present invention, having at least one activation button, is further equipped with a sensor adapted to detect conditions under which unintentional triggering of the activation button is likely. The sensor is operatively coupled with the activation button to suspend its effect when the target conditions are being detected. The undesired side-effects of false button activations, including battery drain and activation counter drift, are thus avoided, increasing the device's lifespan and user convenience. In a particular embodiment, the sensor is a decoy button located near the activation button, which serves to de-activate the activation button.

IPC Classes  ?

35.

METHOD AND SYSTEM FOR PROVIDING A FEDERATED AUTHENTICATION SERVICE WITH GRADUAL EXPIRATION OF CREDENTIALS

      
Application Number US2009063845
Publication Number 2010/056655
Status In Force
Filing Date 2009-11-10
Publication Date 2010-05-20
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Noe, Frederick

Abstract

The present invention relates to the field of authentication of users of services over a computer network, more specifically within the paradigms of federated authentication or single sign-on. A known technique consists of associating different trust levels to different authentication mechanisms, wherein the respective trust levels give access to different information resources, notably to provide the possibility to protect more sensitive resources with a stronger form of authentication. The present invention provides a mechanism to allow the trust level to decrease without re-authenticating with the single sign on system, down to the level at which it is no longer sufficient to obtain access to a desired resource. Only then, the user needs to reauthenticate.

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values

36.

METHOD FOR POST-MANUFACTURING DATA TRANSFER TO AND FROM A SEALED DEVICE

      
Application Number US2009056794
Publication Number 2010/030973
Status In Force
Filing Date 2009-09-14
Publication Date 2010-03-18
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Couck, Guy, Louis
  • Hoornaert, Frank

Abstract

The present invention is directed towards authentication tokens that are completely embedded in a non-conductive enclosure. The invention is based on the insight that it would be advantageous to separate the electronic data personalization of such tokens from the visual device personalization. The present application concerns an authentication token that allows communication with an external unit after the production of the nonconductive enclosure, in order to transmit or receive device identification data. As this communication need only take place during the manufacturing process, a low-power close-range transmission technique such as inductive coupling, capacitive coupling, or RFID communication suffices for this purpose. Accordingly, the present application discloses a method for manufacturing authentication tokens, and a token manufactured according to said method.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled

37.

METHOD FOR PROVISIONING TRUSTED SOFTWARE TO AN ELECTRONIC DEVICE

      
Application Number US2009055602
Publication Number 2010/027970
Status In Force
Filing Date 2009-09-01
Publication Date 2010-03-11
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

The operations required to verify the origin and the authenticity of a software module for an electronic device can advantageously be divided between a general-purpose computer (host) having the electronic device attached to it, and the electronic device itself. More specifically, memory and processing intensive tasks such as syntax checking are done at the host, while security-critical tasks such as cryptographic verifications are done at the electronic device. The present invention provides a method for updating software on an electronic device in a trusted way, wherein verification steps are divided between a host system connected to the electronic device, and the electronic device itself. The present invention further provides a storage medium containing a program for a host system, causing this host system to perform verification steps with respect to a software update for an attached electronic device, and to appropriately interact with the electronic device.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

38.

A STRONG AUTHENTICATION TOKEN GENERATING ONE-TIME PASSWORDS AND SIGNATURES UPON SERVER CREDENTIAL VERIFICATION

      
Application Number US2009036794
Publication Number 2009/145964
Status In Force
Filing Date 2009-03-11
Publication Date 2009-12-03
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Mennes, Frederik
  • Hoornaert, Frank

Abstract

The invention defines a strong authentication token that remedies a vulnerability to a certain type of social engineering attacks, by authenticating the server or messages purporting to come from the server prior to generating a one-time password or transaction signature; and, in the case of the generation of a transaction signature, signing not only transaction values but also transaction context information and, prior to generating said transaction signature, presenting said transaction values and transaction context information to the user for the user to review and approve using trustworthy output and input means. It furthermore offers this authentication and review functionality without sacrificing user convenience or cost efficiency, by judiciously coding the transaction data to be signed, thus reducing the transmission size of information that has to be exchanged over the token's trustworthy interfaces.

IPC Classes  ?

  • G06Q 20/00 - Payment architectures, schemes or protocols

39.

A METHOD AND AN APPARATUS TO CONVERT A LIGHT SIGNAL EMITTED BY A DISPLAY INTO DIGITAL SIGNALS

      
Application Number US2009036805
Publication Number 2009/114616
Status In Force
Filing Date 2009-03-11
Publication Date 2009-09-17
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

The present invention provides a method and a device to convert a time varying optical pattern emitted by a display into a digital data signal. More specifically the invention allows a handheld security token to convert a time-varying light intensity pattern emitted by a source such as a computer screen into a digital signal including a sequence of coded data symbols. The invention is based on the insight that the intensity of light emitted by regions of said source can be easily sampled by a simple low-cost processor if appropriate AID conversion hardware converts the incident light into an electrical signal which is time varying, whereby the base frequency of this electrical signal is a function of the light intensity. Intensity levels used for channel coding and symbol clock can be recovered from the signal by the receiver.

IPC Classes  ?

40.

METHOD FOR TRANSMISSION OF A DIGITAL MESSAGE FROM A DISPLAY TO A HANDHELD RECEIVER

      
Application Number US2009036796
Publication Number 2009/114608
Status In Force
Filing Date 2009-03-11
Publication Date 2009-09-17
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

The invention relates to a method to efficiently transmit a digital message over a unidirectional optical link, such as the link between a computer screen and a security token equipped with photosensitive elements. It is an object of this invention to provide a source coding scheme that is optimized for transmissions of alphanumerical data containing frequent occurrences of numerals and less frequent occurrences of non-numerical data. This is achieved by using a modified Huffman code for source coding, consisting of a nibble-based prefix-free binary code. The output of the coder is efficiently mapped onto a 6B4T channel code, wherein unused ternary codewords can be used to signal data-link layer events. This efficient signalling of data-link layer events, in turn, allows for a synchronization scheme based on repeated transmissions of a finite-length message, combined with an out-of-band clock signal.

IPC Classes  ?

  • H03M 5/16 - Conversion to or from representation by pulses the pulses having three levels

41.

TWO-FACTOR USE AUTHENTICATION TOKEN

      
Application Number US2009032098
Publication Number 2009/097260
Status In Force
Filing Date 2009-01-27
Publication Date 2009-08-06
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Noe, Frederick
  • Hoornaert, Frank
  • Fort, Nicolas
  • Marien, Dirk

Abstract

A USB token advantageously mimics a human interface device such as a keyboard in interacting with a host computer, thus removing the need for pre-installation of a dedicated device driver. This is accomplished by requiring the host computer to direct the input of the attached human interface devices of the keyboard type, including the USB token, exclusively to the program interacting with the USB token, by using cryptographic algorithms based on a shared secret, which require less data to be transferred than PKI-based algorithms, and by employing an efficient encoding scheme that minimizes the time needed to exchange information with the USB token, and minimizes the probability of generating ambiguity with input that might legitimately be generated by other attached human interface devices.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

42.

REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES

      
Application Number US2008065216
Publication Number 2009/025905
Status In Force
Filing Date 2008-05-30
Publication Date 2009-02-26
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Coulier, Frank
  • Hoornaert, Frank

Abstract

The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKl private keys such as PKI- enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In other words a digital connection that would allow an application to submit data to the card for signing by the card's private key and that would allow retrieving the entire resulting signature from the card is not required. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

43.

VASCO

      
Serial Number 75119499
Status Registered
Filing Date 1996-06-13
Registration Date 1998-04-14
Owner VASCO DATA SECURITY, INC. ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

computer consultation, and computer hardware and software design and development for others