1
Tom Kirkevold, Mark Erdrich, Steven F Johnson, Scott E McIntyre, Robert J Pfistor, Nicholas J Colarelli, Timothy A Larson, Timothy A Strege, Arthur J Blumenthal, Christopher H Johnson, Ken Brookings, Roger Butler: Integrated automotive service system and method. Hunter Engineering Company, Polster Lieder Woodruff & Lucchesi L C, July 17, 2001: US06263322 (142 worldwide citation)

An integrated automotive repair shop network is designed to greatly enhance the efficiency and quality of diagnostic and repair work performed in an automotive repair shop. The network employs a data entry terminal for the entry of routine customer information into a shop management system, includin ...


2
Edward M Scheidt, Ersin Domanque, Roger Butler, Wai Tsang: Access system utilizing multiple factor identification and authentication. Tec Sec, IP Strategies, February 13, 2007: US07178025 (111 worldwide citation)

A method of authenticating a user to use a system includes using a provider token to generate a random value. The token generates a derived key based at least in part on a token-provided salt value and a user-provided password. The provider generates a token unlock key based at least in part on the ...


3
Edward M Scheidt, C Jay Wack, Wai Tsang, Roger Butler: Cryptographic configuration control. Ip Strategies, December 14, 2006: US20060282681-A1

A method of providing object security includes selecting an object to secure, selecting at least one criterion for authorization to access the object, generating an authorization profile based on the at least one criterion, generating an encryption key, binding the authorization profile to at least ...


4
Edward M Scheidt, C JAY Wack, Wai Tsang, Roger Butler, Ron Parsons: Constructive Channel Key. Ip Strategies, April 16, 2009: US20090097657-A1

A method of generating a constructive channel key includes providing an issuer with a card public key as the keying part of a CKM credential. An ephemeral key pair is computed by the issuer using pre-established enterprise domain parameters. A shared value for the ephemeral private key and the card ...


5
Edward M Scheidt, Ersin Domanque, Roger Butler, Wai Tsang: Access system utilizing multiple factor identification and authentication. Ip Strategies, October 20, 2005: US20050235148-A1

A method of authenticating a user to use a system includes using a provider token to generate a random value. The token generates a derived key based at least in part on a token-provided salt value and a user-provided password. The provider generates a token unlock key based at least in part on the ...


6
Edward M Scheidt, C JAY Wack, Wai Tsang, Roger Butler, Ron Parsons: Multiple Level Access with SILOS. July 21, 2011: US20110178930-A1

A silo system process includes providing a partner with a digitally-signed CKM authorization key by an issuer, thereby allowing the partner to create a silo of an agreed size on a storage medium. The owner of the storage medium provides a personal card for provisioning. The partner creates a silo on ...



Click the thumbnails below to visualize the patent trend.