A system and method for preventing interception and decryption of information by an unauthorized party when that information is transmitted over a network is provided. A token is used to encrypt one-time password that is different for each network session, to prevent decryption thereof. The encrypted one-time password is returned to a network server for authentication by the server. The network server generates its response in a similar fashion. The server compares its response to the one-time password, to determine if they match. If they match, then the client is granted access to the network. If they responses do not match, then the client is denied access to the network by the server.
Remote Diagnosis And Repair Of Vending Machine Communication Failures
Mandeep S. Arora - Danville CA, US Fred Cheng - Aliso Viejo CA, US Anant Agrawal - Diamond Bar CA, US A. Louis Beaudoin - Oakland CA, US Eric M. Chu - Laguna Niguel CA, US
Assignee:
Cantaloupe Systems, Inc. - Berkeley CA
International Classification:
G06F 7/08
US Classification:
235381, 235383
Abstract:
An audit system for a vending machine system is provided. This audit system is configured to retrieve operational data, such as a DEX file, from a vending machine controller in the vending machine system. The audit system is further configured to store a communications log of the data transmitted between the vending machine controller and the audit system. This communications log can be used by an operator at a host system to assist in debugging communication errors between the audit system and the vending machine controller.
System And Method For Controlling Access To Multiple Public Networks And For Controlling Access To Multiple Private Networks
Paul Lin - Fremont CA, US Henry Hon - Berkeley CA, US Fred Cheng - Berkeley CA, US
Assignee:
Authenex, Inc. - Hayward CA
International Classification:
H04L 29/00
US Classification:
726 2, 713168
Abstract:
A system and method for controlling access to multiple public networks and for controlling access to multiple private networks is provided. Authentication is used with unique public shared secrets and unique private shared secrets to control access to the networks. The invention includes a user device for communicating with at least a public network and/or a private network. The device may be capable of accessing multiple networks through one or more private networks with multiple access control servers. The user device must provide a correct response to each access control server, before access to the network may be granted. The device generates a one-time password, or response, to gain access to a controlled network server. The response generated by the device is matched to a response generated by an access control server that may have generated a challenge that prompted the response. If the two responses match, the device is authenticated and a user of the device is granted access to the network server.
System And Method For Controlling Access To Multiple Public Networks And For Controlling Access To Multiple Private Networks
Paul Lin - Fremont CA, US Henry Hon - Berkeley CA, US Fred Cheng - Union City CA, US
Assignee:
Authenex, Inc. - San Jose CA
International Classification:
H04L 29/00
US Classification:
726 2, 713168
Abstract:
A system and method for controlling access to multiple public networks and for controlling access to multiple private networks is provided. Authentication is used with unique public shared secrets and unique private shared secrets to control access to the networks. The invention includes a user device for communicating with at least a public network and/or a private network. The device may be capable of accessing multiple networks through one or more private networks with multiple access control servers. The user device must provide a correct response to each access control server, before access to the network may be granted. The device generates a one-time password, or response, to gain access to a controlled network server. The response generated by the device is matched to a response generated by an access control server that may have generated a challenge that prompted the response. If the two responses match, the device is authenticated and a user of the device is granted access to the network server.
Mandeep Singh Arora - Danville CA, US Anant Agrawal - Diamond Bar CA, US Fred Cheng - Aliso Viejo CA, US Eric Matthew Chu - Laguna Niguel CA, US Amedee Louis Beaudoin - Oakland CA, US
Assignee:
Cantaloupe Systems, Inc. - San Francisco CA
International Classification:
G07F 17/00
US Classification:
700241, 705 28, 705 9, 701200, 701202
Abstract:
Techniques are provided for calculating vending machines' service priorities and scheduling the vending machines for service taking into account a number of factors and thresholds (). In some embodiments, the machines () are subdivided into subroutes (). Each subroute has one or more machines, and at least one subroute has a plurality of machines. The vending machine service schedule is generated by selecting the highest priority subroute () and selecting the machines in that subroute (). Other subroutes can be selected () if there is time left in the Service Period.
Mandeep Singh Arora - Danville CA, US Anant Agrawal - Diamond Bar CA, US Fred Cheng - Aliso Viejo CA, US Eric Matthew Chu - Laguna Niguel CA, US Amedee Louis Beaudoin - Oakland CA, US
Assignee:
Cantaloupe Systems, Inc. - San Francisco CA
International Classification:
G06F 17/00
US Classification:
700241, 705 28, 705 9, 701200, 701202
Abstract:
Techniques are provided for calculating vending machines' service priorities and scheduling the vending machines for service taking into account a number of factors and thresholds (). In some embodiments, the machines () are subdivided into subroutes (). Each subroute has one or more machines, and at least one subroute has a plurality of machines. The vending machine service schedule is generated by selecting the highest priority subroute () and selecting the machines in that subroute (). Other subroutes can be selected () if there is time left in the Service Period.
Self-Contained Token Device For Installing And Running A Variety Of Applications
Paul Lin - Fremont CA, US Fu-Hua Lee - Foster City CA, US Fred Cheng - Fremont CA, US
International Classification:
H04L 9/32
US Classification:
726020000
Abstract:
A token device that contains software and firmware required for running and installing a variety of applications is provided. The token is configured to connect to a host device via a USB port, wireless receiver or other means. The token may contain varying combinations of installers, applications, drivers, memory, and firmware. Token-related and non-token related applications that may be contained in the token's memory may include those required for smart card, cryptographic service provider, authentication, firewall, antivirus, and VPN type applications.
System And Method For Validating A Network Session
Henry Hon - Berkeley CA, US Fred Cheng - Berkeley CA, US
Assignee:
Authenex, Inc. - Hayward CA
International Classification:
H04L 9/00
US Classification:
713185000
Abstract:
A system and method for preventing interception and decryption of information by an unauthorized party when that information is transmitted over a network is provided. A token is used to encrypt one-time password that is different for each network session, to prevent decryption thereof. The encrypted one-time password is returned to a network server for authentication by the server. The network server generates its response in a similar fashion. The server compares its response to the one-time password, to determine if they match. If they match, then the client is granted access to the network. If they responses do not match, then the client is denied access to the network by the server.
Name / Title
Company / Classification
Phones & Addresses
Fred Cheng Executive
Coherent Inc All Other Miscellaneous Electrical Equipment and Component M
2400 Condensa St, Santa Clara, CA 95051 (408)7644000
Fred Cheng - Description: In 2001, Fred Cheng (), entered the TVB New Talent Singing Awards in which he won second place, following in many notable ...