VASCO Data Security International GmbH

Switzerland

Back to Profile

1-38 of 38 for VASCO Data Security International GmbH Sort by
Query
Aggregations
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 10
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 8
G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures 5
G06F 21/42 - User authentication using separate channels for security data 3
G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors 3
See more
Found results for  patents

1.

AN ELECTRONIC APPARATUS COMPRISING A LINEAR KEYPAD

      
Application Number US2017012063
Publication Number 2017/117613
Status In Force
Filing Date 2017-01-03
Publication Date 2017-07-06
Owner
  • VASCO DATA SECURTY, INC. (USA)
  • VASCO DATA SECURTY INTERNATIONAL GMBH (Switzerland)
Inventor Savtchenko, Serguei, Konstantinovich

Abstract

An electronic circuit providing a linear keypad and an apparatus comprising such electronic circuit are provided. Methods for detecting that a button of a linear keypad is being pressed and for determining which button is being pressed are also provided. A method for calibrating an apparatus comprising a linear keypad to enable the subsequent determination by the apparatus of which button of the linear keypad is being pressed is also provided.

IPC Classes  ?

  • H03M 11/24 - Static coding using analogue means
  • G06F 3/02 - Input arrangements using manually operated switches, e.g. using keyboards or dials

2.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2016052865
Publication Number 2017/053412
Status In Force
Filing Date 2016-09-21
Publication Date 2017-03-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Teixeron, Guillaume
  • Joly, Ludovic
  • Mennes, Frederik

Abstract

Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and systems are disclosed for thwarting overlay attacks against authentication applications for displaying transaction data and for generating signatures over these transaction data.

IPC Classes  ?

  • G06F 21/42 - User authentication using separate channels for security data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

3.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2016052835
Publication Number 2017/053394
Status In Force
Filing Date 2016-09-21
Publication Date 2017-03-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Mennes, Frederik
  • Joly, Ludovic
  • Teixeron, Guillaume

Abstract

Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and systems are disciosed for thwarting overlay attacks against authentication applications for displaying transaction data and for generating signatures over these transaction data.

IPC Classes  ?

  • G06F 21/42 - User authentication using separate channels for security data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

4.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2016052849
Publication Number 2017/053403
Status In Force
Filing Date 2016-09-21
Publication Date 2017-03-30
Owner
  • VASCO DATA SECURITY, INC (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Mennes, Frederik
  • Joly, Ludovic
  • Teixeron, Guillaume

Abstract

Apparatus, methods and systems to secure remotely accessible applications using authentication devices are disclosed. More in particular apparatus, methods and systems are disclosed for thwarting overlay attacks against authentication applications for displaying transaction data and for generating signatures over these transaction data.

IPC Classes  ?

  • G06F 21/42 - User authentication using separate channels for security data
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/84 - Protecting input, output or interconnection devices output devices, e.g. displays or monitors

5.

METHOD AND APPARATUS FOR SECURING A MOBILE APPLICATION

      
Application Number US2015067784
Publication Number 2016/190903
Status In Force
Filing Date 2015-12-29
Publication Date 2016-12-01
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Claes, Mathias
  • Coulier, Frank

Abstract

Methods, apparatus, and systems for personalizing a software token using a dynamic credential (such as a one-time password or electronic signature) generated by a hardware token are disclosed.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

6.

A MULTI-USER STRONG AUTHENTICATION TOKEN

      
Application Number US2015058365
Publication Number 2016/114841
Status In Force
Filing Date 2015-10-30
Publication Date 2016-07-21
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Mennes, Frederik
  • Couck, Guy
  • Fierens, Bert
  • Lavigne, Sebastien
  • Braams, Harm
  • De Wasch, Tom
  • Teixeron, Guillaume

Abstract

A strong authentication token supporting multiple instances associated with different users and protected by a user identity verification mechanism is disclosed. A multi-instance strong authentication token may be adapted to generate dynamic credentials using cryptographic secrets that are specific to a particular instance stored in the token. A method and a system to secure remotely accessible applications using strong authentication tokens supporting multiple instances are disclosed. A method for loading additional tokens into a multi-instance authentication token is disclosed.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

7.

METHODS, SYSTEMS AND APPARATUS FOR RECOGNIZING GENUINE PRODUCTS

      
Application Number US2015068000
Publication Number 2016/109626
Status In Force
Filing Date 2015-12-30
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONALL GMBH (Switzerland)
Inventor Coulier, Frank

Abstract

Methods, apparatus and systems are described for identifying potentially counterfeited products or goods.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

8.

DATA EXCHANGE METHODS, SYSTEMS AND APPARATUS USING COLOR IMAGES

      
Application Number US2015068225
Publication Number 2016/109767
Status In Force
Filing Date 2015-12-31
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Coulier, Frank

Abstract

Methods, apparatus and systems for transferring transaction data using color images are provided.

IPC Classes  ?

  • G06F 21/36 - User authentication by graphic or iconic representation
  • G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
  • G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

9.

A METHOD AND APPARATUS FOR SECURING AN APPLICATION USING A MEASUREMENT OF A LOCATION DEPENDENT PHYSICAL PROPERTY OF THE ENVIRONMENT

      
Application Number US2015068310
Publication Number 2016/109809
Status In Force
Filing Date 2015-12-31
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor De Wasch, Tom

Abstract

Methods, apparatus, and systems for authenticating a user taking into account measurement values of characteristics of the purported environment of the user are described.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • G06F 21/60 - Protecting data
  • H04W 12/12 - Detection or prevention of fraud

10.

USER AUTHENTICATION BASED ON PERSONAL ACCESS HISTORY

      
Application Number US2015067808
Publication Number 2016/109496
Status In Force
Filing Date 2015-12-29
Publication Date 2016-07-07
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

Methods and systems are provided for authenticating a user using data related to the historical interactions of the user with computer based applications.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

11.

AN AUTHENTICATION APPARATUS WITH A BLUETOOTH INTERFACE

      
Application Number US2014070485
Publication Number 2015/102880
Status In Force
Filing Date 2014-12-16
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Grange, Benoit
  • Verrept, Johan
  • Claes, Mathias

Abstract

Methods, apparatus, and systems for securing the interactions of a user with an application using a Bluetooth enabled authentication device are disclosed.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • G06F 21/43 - User authentication using separate channels for security data wireless channels
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

12.

ELECTRONIC SIGNING METHODS, SYSTEMS AND APPARATUS

      
Application Number US2014071068
Publication Number 2015/102918
Status In Force
Filing Date 2014-12-18
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

Methods, apparatus, and systems for generating digital signatures are disclosed. An apparatus may present itself to a host computer as a mass storage device to provide cryptographic processing results through a standard mass storage access mechanism for exchanging files.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

13.

A METHOD AND APPARATUS FOR SECURING A MOBILE APPLICATION

      
Application Number US2014072102
Publication Number 2015/103031
Status In Force
Filing Date 2014-12-23
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

Methods, apparatus, and systems for securing a mobile application are disclosed. Users of the mobile application may be authenticated using a smartphone or other device including a Near-Field Communication (NFC) transfer device capable of NFC communication. An authentication device may be adapted to present itself to the NFC transfer device as an NFC tag and make a dynamic credential available to the NFC transfer device by including the dynamic credential in an NFC tag readable by the NFC transfer device using NFC mechanisms for reading data contents of NFC tags. An access device comprising the NFC transfer device may then provide the dynamic credential to an application server for verification.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/06 - Authentication
  • H04W 4/00 - Services specially adapted for wireless communication networksFacilities therefor

14.

A METHOD AND APPARATUS FOR PROVIDING CLIENT-SIDE SCORE-BASED AUTHENTICATION

      
Application Number US2014072818
Publication Number 2015/103302
Status In Force
Filing Date 2014-12-30
Publication Date 2015-07-09
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Teixeron, Guillaume
  • Lavigne, Sebastien

Abstract

Methods, apparatus, and systems for generating and verifying one time passwords in connection with a risk assessment are disclosed. The risk assessment may comprise a client-side risk assessment. The risk assessment may also comprise a server-side risk assessment.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security
  • G06F 21/30 - Authentication, i.e. establishing the identity or authorisation of security principals
  • H04L 9/08 - Key distribution

15.

REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES

      
Application Number US2013077961
Publication Number 2014/106031
Status In Force
Filing Date 2013-12-27
Publication Date 2014-07-03
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Mariën, Dirk
  • Coulier, Frank
  • Hoornaert, Frank
  • Mennes, Frederik

Abstract

Authentication devices and methods for generating dynamic credentials are disclosed. The authentication devices include a communication interface for communicating with a security device such as a smart card. A dynamic credential such as a one-time password (OTP) or a message authentication code (MAC) may be generated by receiving from a server an encrypted initialization seed encrypted with an asymmetric encryption algorithm using a public key of a public/private key pair, submitting the encrypted initialization seed to a security device, decrypting at the security device the encrypted initialization seed with a private key of the public/private key pair, returning the decrypted initialization seed to the authentication device, deriving at the authentication device a secret credential generation key from the decrypted initialization seed, and generating the dynamic credential by combining a dynamic variable with the secret credential generation key using a symmetric cryptographic dynamic credential generation algorithm.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

16.

A METHOD AND AN APPARATUS FOR SECURELY SIGNING APPLICATION DATA

      
Application Number US2013078314
Publication Number 2014/106181
Status In Force
Filing Date 2013-12-30
Publication Date 2014-07-03
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

The invention provides a method and apparatus for the secure electronic signing of electronic documents and data. In a preferred embodiment, a method for generating a first digital signature associated with a set of application data is disclosed. The method comprises the steps of: obtaining a first digital representation in a high level first data format of the set of application data; generating a second digital representation in a low level second data format of the application data whereby said low level second data format is different from said high level first data format; presenting an analog representation of the set of application data to a user, whereby said second digital representation is a precise and accurate representation of said analog representation; obtaining an indication whether said user approves said analog representation for signing; if said indication indicates that the user approves said analog representation for signing, generating said first digital signature over said second digital representation using a first signature key associated with the user.

IPC Classes  ?

  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

17.

USER-CONVENIENT AUTHENTICATION METHOD AND APPARATUS USING A MOBILE AUTHENTICATION APPLICATION

      
Application Number US2013053433
Publication Number 2014/022778
Status In Force
Filing Date 2013-08-02
Publication Date 2014-02-06
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Fort, Nicolas
  • Coulier, Frank
  • Teixeron, Guillaume

Abstract

Methods, apparatus, and systems for securing application interactions are disclosed. Application interactions may be secured by, at a user authentication device, capturing a signal emitted by an access device encoded with an authentication initiating message including an application identifier, decoding the signal and obtaining the authentication initiating message, retrieving the application identifier, presenting a human interpretable representation of the application identity to the user, obtaining user approval to generate a response message available to a verification server, generating a dynamic security value using a cryptographic algorithm that is cryptographically linked to the application identity, and generating a response message including the generated dynamic security value; making the response message available to a verification server; and, at the verification server, receiving the response message, verifying the response message including verifying the validity of the dynamic security value, and communicating the result of the verification of the response message to the application.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • G06F 21/43 - User authentication using separate channels for security data wireless channels
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

18.

USB DEVICE WITH A CAP

      
Application Number US2012071939
Publication Number 2013/102001
Status In Force
Filing Date 2012-12-28
Publication Date 2013-07-04
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Agreda De Ro, Maya
  • Waltniel, Rudy

Abstract

An electronic device, which may be a USB device, includes a body part that is removably connected to a cap. The body part includes a connector for plugging the device into a host computing device. The cap includes a lever part and a main part. The lever part of the cap is attached to the main part and pivots at least partially around a pivot axis. The lever part includes an anchor part on one side of the pivot axis and an unlock part on the other side of the pivot axis. The anchor part includes a hook that engages a cavity in the body part when the cap is connected to the body part. Depressing the unlock part of the cap causes the lever to pivot around the pivot axis thereby disengaging the hook from the first cavity, and thereby releasing the cap from the body part.

IPC Classes  ?

  • H05K 5/02 - Casings, cabinets or drawers for electric apparatus Details
  • H01R 13/453 - Shutter or cover plate opened by engagement of counterpart
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • H01R 13/44 - Means for preventing access to live contacts

19.

A STRONG AUTHENTICATION TOKEN WITH VISUAL OUTPUT OF PKI SIGNATURES

      
Application Number US2012071941
Publication Number 2013/102003
Status In Force
Filing Date 2012-12-28
Publication Date 2013-07-04
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO Data Security International GmbH (Switzerland)
Inventor Mariën, Dirk

Abstract

A handheld authentication device comprising a data processor and a display is adapted to : generate an input value; submit the input value to an asymmetric cryptographic operation; obtain the result of said asymmetric cryptographic operation; generate an authentication message substantially comprising the result of the asymmetric cryptographic operation; encode the authentication message into one or more images; and display these images on the display. A method for securing computer-based applications remotely accessed by a user comprises capturing images displayed on the display of an authentication device of the user whereby these images have been encoded with an authentication message generated by the authentication device and whereby the authentication message comprises the result of an asymmetric cryptographic operation on an input value; decoding the images to retrieve the authentication message; retrieving the result of the asymmetric cryptographic operation from the authentication message; verifying the authentication message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

20.

A SMART CARD READER WITH A SECURE LOGGING FEATURE

      
Application Number US2012065017
Publication Number 2013/074631
Status In Force
Filing Date 2012-11-14
Publication Date 2013-05-23
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

The present invention provides a secure smart card reader enabled to make reader signatures on data representative of events and actions which may be security related and which may comprise data representative of reader commands the reader receives from a host or remote application, smart card commands the reader exchanges with an inserted smart card, data the reader presents to the user for approval, and/or configuration parameters the reader applies when dealing with any of the foregoing. The smart card reader may furthermore be adapted to maintain logs of certain events and actions which may comprise exchanging reader commands with a host or remote application, exchanging smart card commands with an inserted smart card, and/or interactions with a user. The logs may comprise data representative of reader commands the reader receives from a host or remote application, smart card commands the reader exchanges with an inserted smart card, data the reader presents to the user for approval, and/or configuration parameters the reader applies when dealing with any of the foregoing. The secure smart card reader may be adapted to generate a reader signature over one or more of these logs.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
  • G07F 7/08 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card

21.

REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES

      
Application Number US2012033432
Publication Number 2012/142354
Status In Force
Filing Date 2012-04-13
Publication Date 2012-10-18
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Coulier, Frank
  • Hoornaert, Frank
  • Mennes, Frederik

Abstract

The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKI private keys such as PKI-enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards

22.

A STRONG AUTHENTICATION TOKEN WITH ACOUSTIC DATA INPUT

      
Application Number US2012026077
Publication Number 2012/116045
Status In Force
Filing Date 2012-02-22
Publication Date 2012-08-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Mariën, Dirk

Abstract

Strong authentication tokens for generating dynamic security values having an acoustical input interface for acoustically receiving input data are disclosed. The tokens may also include an optical interface for receiving input data and may have a selection mechanism to select either the acoustical or the optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device. The acoustic signal received by the token may be modulated using a frequency shift keying modulation scheme using a plurality of coding frequencies to code the acoustical signal where each coding frequency may be an integer multiple of a common base frequency.

IPC Classes  ?

  • G06F 21/20 - by restricting access to nodes in a computer system or computer network

23.

PARALLEL-SERIAL BATTERY SWITCHING AND VOLTAGE REGULATING CIRCUIT AND METHOD FOR STRONG AUTHENTICATION TOKENS.

      
Application Number US2012025011
Publication Number 2012/115821
Status In Force
Filing Date 2012-02-14
Publication Date 2012-08-30
Owner
  • VASCO DATA SECURITY INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

An electronic power supply circuit for battery-powered hardware devices is disclosed which can be electronically switched to supply any of at least two predetermined voltages wherein the batteries are switched in parallel or in series depending on the desired voltage. Also disclosed is an electronic apparatus comprising the electronic power supply circuit, which in some modes of operation uses the highest of the two predetermined voltages and which in other modes of operation can function with the lower of two predetermined voltages, and includes control logic that switches the electronic power supply circuit to supply said higher voltage when the apparatus in a mode in which it uses this higher voltage and that switches said electronic power supply circuit to supply said lower voltage at least during some of the modes in which the apparatus can function with the lower voltage.

IPC Classes  ?

  • H02M 3/158 - Conversion of DC power input into DC power output without intermediate conversion into AC by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only with automatic control of output voltage or current, e.g. switching regulators including plural semiconductor devices as final control devices for a single load
  • H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries

24.

METHOD AND APPARATUS FOR ENCODING AND DECODING DATA TRANSMITTED TO AN AUTHENTICATION TOKEN

      
Application Number US2012026588
Publication Number 2012/116312
Status In Force
Filing Date 2012-02-24
Publication Date 2012-08-30
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Hoornaert, Frank
  • Marien, Dirk

Abstract

Methods and apparatus for encoding and decoding data transmitted acoustically and/or optically to strong authentication tokens to generate dynamic security values are disclosed. The tokens may also include a selection mechanism to select either an acoustical or an optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device.

IPC Classes  ?

  • G06F 21/20 - by restricting access to nodes in a computer system or computer network

25.

MASS STORAGE DEVICE MEMORY ENCRYPTION METHODS, SYSTEMS, AND APPARATUS

      
Application Number US2011040729
Publication Number 2011/159918
Status In Force
Filing Date 2011-06-16
Publication Date 2011-12-22
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

Mass storage devices and methods for securely storing data are disclosed. The mass storage device includes a communication interface for communicating with a connected host computer, a mass-memory storage component for storing data, a secure key storage component adapted to securely store at least one master secret, and an encryption-decryption component different from the secure key storage component and connected to the secure key storage component and the mass-memory storage component. The encryption-decryption component may be adapted to encrypt data received from the host computer using an encryption algorithm and at least one encryption key and to write the encrypted data into the mass-memory storage component. The encryption-decryption component may also be adapted to decrypt encrypted data stored in the mass-memory storage component for returning the data to the host computer in response to a read data command from the host computer using a decryption algorithm and at least one decryption key the security of which is protected using a master secret securely stored in the secure key storage component.

IPC Classes  ?

  • G06F 21/02 - by protecting specific internal components of computers

26.

COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY

      
Application Number US2010053846
Publication Number 2011/050321
Status In Force
Filing Date 2010-10-22
Publication Date 2011-04-28
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Hoornaert, Frank
  • Marien, Dirk

Abstract

Transactions are classified into a limited number of categories. A user submitting a transaction to a server is requested to also generate and submit a dynamic transaction category approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction. Transactions are assigned one of a limited number of risk levels. A user submitting a transaction to a server is requested to also generate and submit a dynamic risk level approval code for the submitted transaction. On the server side a corresponding verification value is generated for the received transaction. The received dynamic risk level approval code is verified on the server side by comparing it with the generated verification value.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

27.

STRONG AUTHENTICATION TOKEN USABLE WITH A PLURALITY OF INDEPENDENT APPLICATION PROVIDERS

      
Application Number US2010053862
Publication Number 2011/050332
Status In Force
Filing Date 2010-10-22
Publication Date 2011-04-28
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Grange, Benoit
  • Marien, Dirk
  • Hoornaert, Frank

Abstract

The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

28.

AUTHENTICATION TOKEN WITH INCREMENTAL KEY ESTABLISHMENT CAPABILITY

      
Application Number US2010041486
Publication Number 2011/006043
Status In Force
Filing Date 2010-07-09
Publication Date 2011-01-13
Owner
  • VASCO DATA SECURITY INC. (USA)
  • VASCO DATA SECURITY INTERNATINAL GMBH (Switzerland)
Inventor
  • Hoornaert, Frank
  • Mennes, Frederik

Abstract

An apparatus comprising storage for a secret key, said secret key for use in the generation of cryptographic values, and a cryptographic agent for generating said cryptographic values using said secret key, selects one of a predetermined set of key transformations in an unpredictable way and applies said selected key transformation to said secret key prior to generating one of said cryptographic values A server receives and authenticates a credential generated using a transformed secret and derives the transformed secret, by generating a plurality of verification values using a set of known permitted transformations of a stored secret, determining whether said credential matches one of said plurality of verification values, and, if said credential matches one of said plurality of verification values, storing the corresponding one of said set of known permitted transformations as an updated value for said stored secret

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

29.

IMPROVED MODULATION AND DEMODULATION CIRCUIT

      
Application Number US2010041490
Publication Number 2011/006046
Status In Force
Filing Date 2010-07-09
Publication Date 2011-01-13
Owner
  • VASCO DATA SECURITY INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

The invention relates to the field of modulation and demodulation circuits, such as envelope detectors used to demodulate amplitude- modulated (AM) signals and amplitude-shift-keying (ASK) signals. By judiciously coupling an analog circuit comprising one resistor and two capacitors which are judiciously dimensioned to a port of a digital component, an extremely compact envelope detector can be obtained, which achieves demodulation of a binary ASK signal for direct coupling into a digital input port. Accordingly, a very compact envelope detector may advantageously be used in the data receiving part of a sealed device requiring postmanufactuπng data transfer, in combination with additional components that provide electromagnetic coupling, such as inductive coupling, capacitive coupling, or radiative coupling. An example of such a device is a credit card sized authentication token, the electrical personalization of which happens after the production of the card-like housing.

IPC Classes  ?

  • H03K 5/153 - Arrangements in which a pulse is delivered at the instant when a predetermined characteristic of an input signal is present or at a fixed time interval after this instant

30.

SLIM ELECTRONIC APPARATUS WITH EMBOSSED KEY PROTECTION AND PROCESS FOR PROVIDING SAME

      
Application Number US2009068646
Publication Number 2010/080573
Status In Force
Filing Date 2009-12-18
Publication Date 2010-07-15
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Couck, Guy, Louis

Abstract

The present invention relates to the field of pocket-size electronic devices, including credit card sized devices such as authentication tokens. It consists of an improvement of the well-known "raised ridge" to protect individual buttons from false key presses, obtained by applying embossing. A known problem with applying embossing to cards containing electronic components, is the fact that the embossing process may damage the components or the wiring inside the card. In the process according to the invention, an embossed ridge of a judiciously designed shape is used to avoid such damage.

IPC Classes  ?

  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier

31.

METHOD AND SYSTEM FOR PROVIDING A FEDERATED AUTHENTICATION SERVICE WITH GRADUAL EXPIRATION OF CREDENTIALS

      
Application Number US2009063845
Publication Number 2010/056655
Status In Force
Filing Date 2009-11-10
Publication Date 2010-05-20
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Noe, Frederick

Abstract

The present invention relates to the field of authentication of users of services over a computer network, more specifically within the paradigms of federated authentication or single sign-on. A known technique consists of associating different trust levels to different authentication mechanisms, wherein the respective trust levels give access to different information resources, notably to provide the possibility to protect more sensitive resources with a stronger form of authentication. The present invention provides a mechanism to allow the trust level to decrease without re-authenticating with the single sign on system, down to the level at which it is no longer sufficient to obtain access to a desired resource. Only then, the user needs to reauthenticate.

IPC Classes  ?

  • G06F 7/04 - Identity comparison, i.e. for like or unlike values

32.

METHOD FOR POST-MANUFACTURING DATA TRANSFER TO AND FROM A SEALED DEVICE

      
Application Number US2009056794
Publication Number 2010/030973
Status In Force
Filing Date 2009-09-14
Publication Date 2010-03-18
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Couck, Guy, Louis
  • Hoornaert, Frank

Abstract

The present invention is directed towards authentication tokens that are completely embedded in a non-conductive enclosure. The invention is based on the insight that it would be advantageous to separate the electronic data personalization of such tokens from the visual device personalization. The present application concerns an authentication token that allows communication with an external unit after the production of the nonconductive enclosure, in order to transmit or receive device identification data. As this communication need only take place during the manufacturing process, a low-power close-range transmission technique such as inductive coupling, capacitive coupling, or RFID communication suffices for this purpose. Accordingly, the present application discloses a method for manufacturing authentication tokens, and a token manufactured according to said method.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled

33.

METHOD FOR PROVISIONING TRUSTED SOFTWARE TO AN ELECTRONIC DEVICE

      
Application Number US2009055602
Publication Number 2010/027970
Status In Force
Filing Date 2009-09-01
Publication Date 2010-03-11
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Braams, Harm

Abstract

The operations required to verify the origin and the authenticity of a software module for an electronic device can advantageously be divided between a general-purpose computer (host) having the electronic device attached to it, and the electronic device itself. More specifically, memory and processing intensive tasks such as syntax checking are done at the host, while security-critical tasks such as cryptographic verifications are done at the electronic device. The present invention provides a method for updating software on an electronic device in a trusted way, wherein verification steps are divided between a host system connected to the electronic device, and the electronic device itself. The present invention further provides a storage medium containing a program for a host system, causing this host system to perform verification steps with respect to a software update for an attached electronic device, and to appropriately interact with the electronic device.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs

34.

A STRONG AUTHENTICATION TOKEN GENERATING ONE-TIME PASSWORDS AND SIGNATURES UPON SERVER CREDENTIAL VERIFICATION

      
Application Number US2009036794
Publication Number 2009/145964
Status In Force
Filing Date 2009-03-11
Publication Date 2009-12-03
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Mennes, Frederik
  • Hoornaert, Frank

Abstract

The invention defines a strong authentication token that remedies a vulnerability to a certain type of social engineering attacks, by authenticating the server or messages purporting to come from the server prior to generating a one-time password or transaction signature; and, in the case of the generation of a transaction signature, signing not only transaction values but also transaction context information and, prior to generating said transaction signature, presenting said transaction values and transaction context information to the user for the user to review and approve using trustworthy output and input means. It furthermore offers this authentication and review functionality without sacrificing user convenience or cost efficiency, by judiciously coding the transaction data to be signed, thus reducing the transmission size of information that has to be exchanged over the token's trustworthy interfaces.

IPC Classes  ?

  • G06Q 20/00 - Payment architectures, schemes or protocols

35.

A METHOD AND AN APPARATUS TO CONVERT A LIGHT SIGNAL EMITTED BY A DISPLAY INTO DIGITAL SIGNALS

      
Application Number US2009036805
Publication Number 2009/114616
Status In Force
Filing Date 2009-03-11
Publication Date 2009-09-17
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

The present invention provides a method and a device to convert a time varying optical pattern emitted by a display into a digital data signal. More specifically the invention allows a handheld security token to convert a time-varying light intensity pattern emitted by a source such as a computer screen into a digital signal including a sequence of coded data symbols. The invention is based on the insight that the intensity of light emitted by regions of said source can be easily sampled by a simple low-cost processor if appropriate AID conversion hardware converts the incident light into an electrical signal which is time varying, whereby the base frequency of this electrical signal is a function of the light intensity. Intensity levels used for channel coding and symbol clock can be recovered from the signal by the receiver.

IPC Classes  ?

36.

METHOD FOR TRANSMISSION OF A DIGITAL MESSAGE FROM A DISPLAY TO A HANDHELD RECEIVER

      
Application Number US2009036796
Publication Number 2009/114608
Status In Force
Filing Date 2009-03-11
Publication Date 2009-09-17
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor Marien, Dirk

Abstract

The invention relates to a method to efficiently transmit a digital message over a unidirectional optical link, such as the link between a computer screen and a security token equipped with photosensitive elements. It is an object of this invention to provide a source coding scheme that is optimized for transmissions of alphanumerical data containing frequent occurrences of numerals and less frequent occurrences of non-numerical data. This is achieved by using a modified Huffman code for source coding, consisting of a nibble-based prefix-free binary code. The output of the coder is efficiently mapped onto a 6B4T channel code, wherein unused ternary codewords can be used to signal data-link layer events. This efficient signalling of data-link layer events, in turn, allows for a synchronization scheme based on repeated transmissions of a finite-length message, combined with an out-of-band clock signal.

IPC Classes  ?

  • H03M 5/16 - Conversion to or from representation by pulses the pulses having three levels

37.

TWO-FACTOR USE AUTHENTICATION TOKEN

      
Application Number US2009032098
Publication Number 2009/097260
Status In Force
Filing Date 2009-01-27
Publication Date 2009-08-06
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Noe, Frederick
  • Hoornaert, Frank
  • Fort, Nicolas
  • Marien, Dirk

Abstract

A USB token advantageously mimics a human interface device such as a keyboard in interacting with a host computer, thus removing the need for pre-installation of a dedicated device driver. This is accomplished by requiring the host computer to direct the input of the attached human interface devices of the keyboard type, including the USB token, exclusively to the program interacting with the USB token, by using cryptographic algorithms based on a shared secret, which require less data to be transferred than PKI-based algorithms, and by employing an efficient encoding scheme that minimizes the time needed to exchange information with the USB token, and minimizes the probability of generating ambiguity with input that might legitimately be generated by other attached human interface devices.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

38.

REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES

      
Application Number US2008065216
Publication Number 2009/025905
Status In Force
Filing Date 2008-05-30
Publication Date 2009-02-26
Owner
  • VASCO DATA SECURITY, INC. (USA)
  • VASCO DATA SECURITY INTERNATIONAL GMBH (Switzerland)
Inventor
  • Coulier, Frank
  • Hoornaert, Frank

Abstract

The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKl private keys such as PKI- enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In other words a digital connection that would allow an application to submit data to the card for signing by the card's private key and that would allow retrieving the entire resulting signature from the card is not required. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols