File and bit location authentication
An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach perfor...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Nassar Nader M Nachman David E Nassar Tamer M Grunin Galina |
description | An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information. The approach performs includes determining, by one or more computer processors, whether the identified authentication information matches previously submitted authentication information for the identified account attempting to access content requiring authentication. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9674203B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9674203B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9674203B23</originalsourceid><addsrcrecordid>eNrjZFBxy8xJVUjMS1FIyixRyMlPTizJzM9TSCwtyUjNK8mEcHkYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSXxosKWZuYmRgbGTkTERSgC6hiaG</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>File and bit location authentication</title><source>esp@cenet</source><creator>Nassar Nader M ; Nachman David E ; Nassar Tamer M ; Grunin Galina</creator><creatorcontrib>Nassar Nader M ; Nachman David E ; Nassar Tamer M ; Grunin Galina</creatorcontrib><description>An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information. The approach performs includes determining, by one or more computer processors, whether the identified authentication information matches previously submitted authentication information for the identified account attempting to access content requiring authentication.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170606&DB=EPODOC&CC=US&NR=9674203B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170606&DB=EPODOC&CC=US&NR=9674203B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Nassar Nader M</creatorcontrib><creatorcontrib>Nachman David E</creatorcontrib><creatorcontrib>Nassar Tamer M</creatorcontrib><creatorcontrib>Grunin Galina</creatorcontrib><title>File and bit location authentication</title><description>An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information. The approach performs includes determining, by one or more computer processors, whether the identified authentication information matches previously submitted authentication information for the identified account attempting to access content requiring authentication.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFBxy8xJVUjMS1FIyixRyMlPTizJzM9TSCwtyUjNK8mEcHkYWNMSc4pTeaE0N4OCm2uIs4duakF-fGpxQWJyal5qSXxosKWZuYmRgbGTkTERSgC6hiaG</recordid><startdate>20170606</startdate><enddate>20170606</enddate><creator>Nassar Nader M</creator><creator>Nachman David E</creator><creator>Nassar Tamer M</creator><creator>Grunin Galina</creator><scope>EVB</scope></search><sort><creationdate>20170606</creationdate><title>File and bit location authentication</title><author>Nassar Nader M ; Nachman David E ; Nassar Tamer M ; Grunin Galina</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9674203B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Nassar Nader M</creatorcontrib><creatorcontrib>Nachman David E</creatorcontrib><creatorcontrib>Nassar Tamer M</creatorcontrib><creatorcontrib>Grunin Galina</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Nassar Nader M</au><au>Nachman David E</au><au>Nassar Tamer M</au><au>Grunin Galina</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>File and bit location authentication</title><date>2017-06-06</date><risdate>2017</risdate><abstract>An approach for authentication is provided. The approach performs identifying, by one or more computer processors, an account attempting to access content. The approach performs identifying, by one or more computer processors, a file including at least authentication information. The approach performs identifying, by one or more computer processors, a location of the authentication information within the identified file. The approach performs identifying, by one or more computer processors, a length of the authentication information. The approach performs identifying, by one or more computer processors, the authentication information in the identified file based at least on the identified location and the identified length of the authentication information. The approach performs includes determining, by one or more computer processors, whether the identified authentication information matches previously submitted authentication information for the identified account attempting to access content requiring authentication.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9674203B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | File and bit location authentication |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T12%3A41%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Nassar%20Nader%20M&rft.date=2017-06-06&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9674203B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |