US20120102324A1 - Remote verification of user presence and identity - Google Patents

Remote verification of user presence and identity Download PDF

Info

Publication number
US20120102324A1
US20120102324A1 US13/279,244 US201113279244A US2012102324A1 US 20120102324 A1 US20120102324 A1 US 20120102324A1 US 201113279244 A US201113279244 A US 201113279244A US 2012102324 A1 US2012102324 A1 US 2012102324A1
Authority
US
United States
Prior art keywords
remote computer
user
digital key
key
behavioral data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/279,244
Inventor
Michael James McNeely
Lazaro Rodriguez
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Laz Rod Inc
Original Assignee
Mr. Lazaro Rodriguez
Mr. Michael James McNeely
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mr. Lazaro Rodriguez, Mr. Michael James McNeely filed Critical Mr. Lazaro Rodriguez
Priority to US13/279,244 priority Critical patent/US20120102324A1/en
Publication of US20120102324A1 publication Critical patent/US20120102324A1/en
Priority to US14/525,206 priority patent/US9197635B2/en
Assigned to LAZ ROD INC. reassignment LAZ ROD INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RODRIGUEZ, LAZARO
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Definitions

  • the present invention relates to the field of remote computing and, more specifically, the present invention relates to the field of security in remote computer environments.
  • the distance learning movement is a field of education that focuses on teaching methods and technology with the aim of delivering teaching and education to students who are not physically present in a traditional educational setting, such as a classroom.
  • the distance learning process creates and provides access to learning, usually via the Internet, when the source of information and the learners are separated by time and distance, or both.
  • One of the issues associated with distance learning is the verification of presence and identity of students.
  • the teaching provider has an interest in verifying that a student is actually sitting at a computer and interacting with it, so as to ensure that the student is present during a class. It is also important that the teaching provider verify the identity of the student, so as to prevent the student from having another person attend a class or take an exam.
  • the currently available distance learning software does not adequately solve the aforementioned problems with the prior art.
  • a system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
  • a method for verifying presence and identity of a user on a remote computer comprises receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
  • FIG. 1 is a block diagram illustrating a network architecture of a remote presence and identity verification system, in accordance with one embodiment of the present invention.
  • the present invention improves upon the problems with the prior art by providing verification of remote users of a computer system in a user-friendly and safe manner.
  • the present invention allows for more secure user verification by requiring that users carry and utilize small, unobtrusive security tokens that hold encrypted keys unique to the user.
  • the present invention further allows for the automatic and seamless storage and transmittal of behavioral data of the user during usage, which may be used to verify the presence and interaction of the user at the remote computer.
  • FIG. 1 is a block diagram illustrating a network architecture of a remote identity and presence verification system, in accordance with one embodiment of the present invention.
  • FIG. 1 shows a server 102 and a database 104 connected to the network 106 , which may be the Internet.
  • the database 104 may house user information, such as contact information, user credentials, user records, and financial or payment information, for a plurality of users. Each user's record may also include a unique identifier for his digital key.
  • user 130 may use his computer 132 to enter his credentials, contact information, unique identifier and payment information into the database 104 .
  • the computer 132 may be a desktop, laptop, tablet, netbook, smartphone or the like.
  • FIG. 1 also shows that the user 130 may use a digital key 135 , which may interface with the computer 132 .
  • the digital key 135 may be a security token (otherwise called a hardware token, authentication token, USB token, cryptographic token, or key fob), which is a physical device given to an authorized user of the server 102 to ease authentication.
  • Security tokens are used to prove one's identity electronically. Some security tokens store cryptographic keys, such as passwords, a digital signature, or biometric data.
  • the digital key 135 comprises a YubiKey, manufactured by Yubico, which is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key.
  • Yubikey has four modes of operation including Standard Yubico 12 character ID+32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software.
  • the method of the present invention begins with a user 130 using his computer 132 to log onto server 102 over the network 106 using his credentials.
  • the user 130 may utilize a specialized secure web browser to log in and interact with server 102 .
  • An encrypted key may be read from the digital key 135 and transmitted to the server 102 .
  • a password or key is automatically written into a browser text field when the user 130 , upon being prompted, presses a button on the digital key 135 .
  • Encrypted data may be read from the digital key 135 and transmitted to the server 102 at random intervals.
  • the server 102 Upon receiving an encrypted key, the server 102 decrypts the data and stores it.
  • the specialized web browser may capture behavioral data of the user 130 and other data, such as session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers.
  • the web browser may also send the behavioral and other data to the server 102 at certain time intervals. The behavioral and other data may be used to determine the actual presence of the user 130 at the computer 132 .
  • a user 130 when a user 130 enters a portion of the web site that requires additional verification, such as a quiz or a test, the user 130 is presented with a popup window requesting a phone number and a pin number.
  • the user 130 calls the number the user 130 will be instructed to enter the pin number.
  • the popup window text After entering the pin number the popup window text will change displaying a random message to record via voice.
  • the popup window will show a textbox to enter an encrypted key from the digital key 135 , such as the Yubico key.
  • the information from the encrypted key and voice recording is stored in database 104 for an administrator or instructor to view or analyze.
  • the voice recording may also be analyzed with voice analyzing software.

Abstract

A system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.

Description

    RELATED APPLICATION
  • This application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, filed on Oct. 21, 2010.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to the field of remote computing and, more specifically, the present invention relates to the field of security in remote computer environments.
  • 2. Description of the Related Art
  • The distance learning movement is a field of education that focuses on teaching methods and technology with the aim of delivering teaching and education to students who are not physically present in a traditional educational setting, such as a classroom. The distance learning process creates and provides access to learning, usually via the Internet, when the source of information and the learners are separated by time and distance, or both.
  • One of the issues associated with distance learning is the verification of presence and identity of students. The teaching provider has an interest in verifying that a student is actually sitting at a computer and interacting with it, so as to ensure that the student is present during a class. It is also important that the teaching provider verify the identity of the student, so as to prevent the student from having another person attend a class or take an exam. The currently available distance learning software does not adequately solve the aforementioned problems with the prior art.
  • Therefore, what is needed is a system and method for improving the problems with the prior art, and more particularly for a more efficient system and method for verifying the presence and identity of remote users of a computer system.
  • BRIEF SUMMARY OF THE INVENTION
  • Embodiments of the present invention address deficiencies of the art in respect to distance learning and provide a novel and non-obvious system and method for remotely verifying presence and identity in a distance learning environment. In an embodiment of the invention, a system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
  • In another embodiment of the invention, a method for verifying presence and identity of a user on a remote computer comprises receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
  • Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
  • FIG. 1 is a block diagram illustrating a network architecture of a remote presence and identity verification system, in accordance with one embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention improves upon the problems with the prior art by providing verification of remote users of a computer system in a user-friendly and safe manner. The present invention allows for more secure user verification by requiring that users carry and utilize small, unobtrusive security tokens that hold encrypted keys unique to the user. The present invention further allows for the automatic and seamless storage and transmittal of behavioral data of the user during usage, which may be used to verify the presence and interaction of the user at the remote computer.
  • FIG. 1 is a block diagram illustrating a network architecture of a remote identity and presence verification system, in accordance with one embodiment of the present invention. FIG. 1 shows a server 102 and a database 104 connected to the network 106, which may be the Internet. The database 104 may house user information, such as contact information, user credentials, user records, and financial or payment information, for a plurality of users. Each user's record may also include a unique identifier for his digital key. For example, user 130 may use his computer 132 to enter his credentials, contact information, unique identifier and payment information into the database 104. The computer 132 may be a desktop, laptop, tablet, netbook, smartphone or the like.
  • FIG. 1 also shows that the user 130 may use a digital key 135, which may interface with the computer 132. The digital key 135 may be a security token (otherwise called a hardware token, authentication token, USB token, cryptographic token, or key fob), which is a physical device given to an authorized user of the server 102 to ease authentication. Security tokens are used to prove one's identity electronically. Some security tokens store cryptographic keys, such as passwords, a digital signature, or biometric data.
  • In one embodiment, the digital key 135 comprises a YubiKey, manufactured by Yubico, which is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key. The Yubikey has four modes of operation including Standard Yubico 12 character ID+32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software.
  • The method of the present invention begins with a user 130 using his computer 132 to log onto server 102 over the network 106 using his credentials. The user 130 may utilize a specialized secure web browser to log in and interact with server 102. An encrypted key may be read from the digital key 135 and transmitted to the server 102. In one embodiment, a password or key is automatically written into a browser text field when the user 130, upon being prompted, presses a button on the digital key 135. Encrypted data may be read from the digital key 135 and transmitted to the server 102 at random intervals.
  • Upon receiving an encrypted key, the server 102 decrypts the data and stores it. The specialized web browser may capture behavioral data of the user 130 and other data, such as session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers. The web browser may also send the behavioral and other data to the server 102 at certain time intervals. The behavioral and other data may be used to determine the actual presence of the user 130 at the computer 132.
  • In one embodiment of the present invention, when a user 130 enters a portion of the web site that requires additional verification, such as a quiz or a test, the user 130 is presented with a popup window requesting a phone number and a pin number. When the user 130 calls the number the user 130 will be instructed to enter the pin number. After entering the pin number the popup window text will change displaying a random message to record via voice. After recording the voice message the popup window will show a textbox to enter an encrypted key from the digital key 135, such as the Yubico key. The information from the encrypted key and voice recording is stored in database 104 for an administrator or instructor to view or analyze. The voice recording may also be analyzed with voice analyzing software.
  • Although specific embodiments of the invention have been disclosed, those having ordinary skill in the art will understand that changes can be made to the specific embodiments without departing from the spirit and scope of the invention. The scope of the invention is not to be restricted, therefore, to the specific embodiments. Furthermore, it is intended that the appended claims cover any and all such applications, modifications, and embodiments within the scope of the present invention.
  • RELATED U.S. PATENT DOCUMENTS
  • Application Number Filing Date
    61/528,024 Aug. 26, 2011
    61/405,643 Oct. 21, 2010
  • PARENT CASE TEXT
  • This application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, entitled USB Device coupled to a Decision-making system. System, method, and computer program product for authenticating into a website with microcontroller, filed on Oct. 21, 2010.
  • REFERENCES CITED
  • Ser. No. 11/105,962
  • APPARATUS AND METHOD FOR COMPUTER BASED EXAMINATIONS.
  • Ser. No. 11/734,149
  • SYSTEM FOR AND METHODS OF STORING AND COMPARING COMPUTER GENERATED CONTINUOUS VECTOR LINES THROUGH A NON-SECURE OR A SECURE COMMUNICATION CHANNEL.
  • Ser. No. 12/287,336
  • METHODS FOR PERFORMING SECURE ON-LINE TESTING WITHOUT PRE-INSTALLATION OF A SECURE BROWSER.
  • Ser. No. 12/674,142
  • DEVICE AND METHOD FOR GENERATING DYNAMIC CREDIT CARD DATA.

Claims (6)

1. A system for verifying presence and identity of a user on a remote computer, comprising:
a server connected to a networked communication system;
a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system;
a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key;
a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and
a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
2. The system of claim 1, wherein the server further comprises a database for storing user records and user credentials.
3. The system of claim 2, wherein the interface on the remote computer for the digital key comprises a USB port.
4. The system of claim 3, wherein the digital key comprises a device that acts as a USB keyboard and provides secure authentication by a one-time password.
5. The system of claim 4, wherein the behavioral data recorded includes: session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers.
6. A method for verifying presence and identity of a user on a remote computer, comprising:
receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer;
reading, by a processor on the remote computer, the encrypted key from the digital key;
transmitting, by the processor, the encrypted key to the server over the networked communications system;
capturing, by a computer program executing on the remote computer, behavioral data of the user; and
transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
US13/279,244 2010-10-21 2011-10-21 Remote verification of user presence and identity Abandoned US20120102324A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/279,244 US20120102324A1 (en) 2010-10-21 2011-10-21 Remote verification of user presence and identity
US14/525,206 US9197635B2 (en) 2010-10-21 2014-10-27 Remote verification of user presence and identity

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US40564310P 2010-10-21 2010-10-21
US201161528024P 2011-08-26 2011-08-26
US13/279,244 US20120102324A1 (en) 2010-10-21 2011-10-21 Remote verification of user presence and identity

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/525,206 Continuation US9197635B2 (en) 2010-10-21 2014-10-27 Remote verification of user presence and identity

Publications (1)

Publication Number Publication Date
US20120102324A1 true US20120102324A1 (en) 2012-04-26

Family

ID=45973989

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/279,244 Abandoned US20120102324A1 (en) 2010-10-21 2011-10-21 Remote verification of user presence and identity
US14/525,206 Expired - Fee Related US9197635B2 (en) 2010-10-21 2014-10-27 Remote verification of user presence and identity

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/525,206 Expired - Fee Related US9197635B2 (en) 2010-10-21 2014-10-27 Remote verification of user presence and identity

Country Status (1)

Country Link
US (2) US20120102324A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140283007A1 (en) * 2013-03-12 2014-09-18 Eric Lynch Temporal Security for Controlled Access Systems
CN105450662A (en) * 2015-12-25 2016-03-30 小米科技有限责任公司 Encryption method and device
US10027645B2 (en) 2013-12-16 2018-07-17 Matthew B. Rappaport Systems and methods for verifying attributes of users of online systems
US10412070B2 (en) 2016-06-21 2019-09-10 Noa, Inc. Method and apparatus of implementing a VPN tunnel
US11070556B2 (en) * 2015-01-21 2021-07-20 Thycotic Software, Llc Context-based possession-less access of secure information
US20220217136A1 (en) * 2021-01-04 2022-07-07 Bank Of America Corporation Identity verification through multisystem cooperation

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417797B (en) * 2015-04-02 2021-07-30 创新先进技术有限公司 Method and device for authenticating user
US9866545B2 (en) * 2015-06-02 2018-01-09 ALTR Solutions, Inc. Credential-free user login to remotely executed applications
US9824208B2 (en) * 2015-07-06 2017-11-21 Unisys Corporation Cloud-based active password manager
TWI661332B (en) * 2018-03-21 2019-06-01 精英電腦股份有限公司 Method for remotely authorizing a user to log on a computer system
US10628572B2 (en) * 2018-08-24 2020-04-21 Venkatachalam Garimella Computer and data protection system
DE102019106049A1 (en) * 2019-03-08 2020-09-10 Krohne Messtechnik Gmbh Method for secure communication between a field device in automation technology and a terminal and a system for secure communication between a field device and a terminal

Citations (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5784463A (en) * 1996-12-04 1998-07-21 V-One Corporation Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US20020046353A1 (en) * 2000-08-18 2002-04-18 Sony Corporation User authentication method and user authentication server
US6449651B1 (en) * 1998-11-19 2002-09-10 Toshiba America Information Systems, Inc. System and method for providing temporary remote access to a computer
US6609115B1 (en) * 1999-12-30 2003-08-19 Ge Medical Systems Method and apparatus for limited online access to restricted documentation
US20050235144A1 (en) * 2004-04-14 2005-10-20 Jacobs James P Apparatus and method for computer based examinations
US20070083540A1 (en) * 2002-01-28 2007-04-12 Witness Systems, Inc. Providing Access to Captured Data Using a Multimedia Player
US7219138B2 (en) * 2002-01-31 2007-05-15 Witness Systems, Inc. Method, apparatus, and system for capturing data exchanged between a server and a user
US20070180507A1 (en) * 2006-01-27 2007-08-02 Feitian Technologies, Co., Ltd. Information security device of universal serial bus human interface device class and data transmission method for same
US7260726B1 (en) * 2001-12-06 2007-08-21 Adaptec, Inc. Method and apparatus for a secure computing environment
US20070234064A1 (en) * 2006-03-29 2007-10-04 Casio Computer Co., Ltd. Identification information output device
US20090029771A1 (en) * 2007-07-25 2009-01-29 Mega Brands International, S.A.R.L. Interactive story builder
WO2009025605A2 (en) * 2007-08-19 2009-02-26 Yubico Ab Device and method for generating dynamic credit card data
US20090063626A1 (en) * 2007-08-27 2009-03-05 Kazushi Nakagawa Call management system, call management method, management server, client server, client terminal, and call device
US20090271633A1 (en) * 2008-03-10 2009-10-29 Aceinc Pty Limited Data Access and Identity Verification
US7664960B1 (en) * 2005-09-23 2010-02-16 Kenneth Wayne Clubb Password enhancing device
US20100062834A1 (en) * 2004-04-07 2010-03-11 Phillip James Ryan Player controls
US20100199334A1 (en) * 2006-04-24 2010-08-05 Cypak Ab Device and method for identification and authentication
US20100198674A1 (en) * 2009-02-03 2010-08-05 John Boucard Brand Experience System
US20100325435A1 (en) * 2003-06-27 2010-12-23 Young-Man Park Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
US20110029433A1 (en) * 2008-04-10 2011-02-03 Chee Min Thoo Import/export transaction facility
US20110119155A1 (en) * 2009-05-15 2011-05-19 Ayman Hammad Verification of portable consumer devices for 3-d secure services
US20110197266A1 (en) * 2005-12-09 2011-08-11 Citicorp Development Center, Inc. Methods and systems for secure user authentication
US8004491B2 (en) * 2004-10-05 2011-08-23 Jeff Maynard System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel
US20110265156A1 (en) * 2008-12-24 2011-10-27 Gemalto Sa Portable security device protection against keystroke loggers
US20110321139A1 (en) * 2010-06-23 2011-12-29 K7 Computing Private Ltd. Online Protection Of Information And Resources
US20120018506A1 (en) * 2009-05-15 2012-01-26 Visa Intrernational Service Association Verification of portable consumer device for 3-d secure services
US8146164B2 (en) * 2006-01-24 2012-03-27 Eshun Kobi O Method and apparatus for thwarting spyware
US8176324B1 (en) * 2009-07-02 2012-05-08 Exelis Inc. Method and system for a secure virtual keyboard
US8239679B2 (en) * 2007-06-28 2012-08-07 Tencent Technology (Shenzhen) Company Limited Authentication method, client, server and system
US20120233684A1 (en) * 2011-03-07 2012-09-13 Jerome Denis Key distribution for unconnected one-time password tokens
US20120254955A1 (en) * 2009-12-22 2012-10-04 Junko Suginaka Personal authentication method, personal authentication system, and portable-type communication terminal
US8611544B1 (en) * 2011-01-25 2013-12-17 Adobe Systems Incorporated Systems and methods for controlling electronic document use

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7093137B1 (en) * 1999-09-30 2006-08-15 Casio Computer Co., Ltd. Database management apparatus and encrypting/decrypting system
US20020182578A1 (en) * 2001-06-01 2002-12-05 Rachman Bruce A. Online course support method and system
US7325134B2 (en) * 2002-10-08 2008-01-29 Koolspan, Inc. Localized network authentication and security using tamper-resistant keys
US20040139182A1 (en) * 2002-12-02 2004-07-15 Chi-Tung Chang Management device and method for controlling an internet website browsing
US20120210119A1 (en) * 2004-06-14 2012-08-16 Arthur Baxter Method and Apparatus for Secure Internet Browsing
US7979716B2 (en) * 2004-11-18 2011-07-12 Biogy, Inc. Method of generating access keys
US7676584B2 (en) * 2005-05-17 2010-03-09 Kid Group Llc Method and apparatus for providing games and content
US8607045B2 (en) * 2005-09-09 2013-12-10 Emc Corporation Tokencode exchanges for peripheral authentication
GB0600207D0 (en) * 2006-01-05 2006-02-15 Bishop Durrell G B Apparatus for direct automated access to a task or content
US7853535B2 (en) * 2006-12-27 2010-12-14 Colella Brian A System for secure internet access for children
US8275890B2 (en) * 2009-06-03 2012-09-25 International Business Machines Corporation Detecting an inactive client during a communication session
US8819170B2 (en) * 2011-07-14 2014-08-26 Schneider Electric It Corporation Communication protocols
WO2013186711A2 (en) * 2012-06-13 2013-12-19 Yeara Christian Gatekeeper lock system
US9324242B2 (en) * 2013-03-13 2016-04-26 Ergopedia, Inc. Electronic book that can communicate directly with hardware devices via a keyboard API interface
US9137247B2 (en) * 2013-03-15 2015-09-15 Intel Corporation Technologies for secure storage and use of biometric authentication information
US20150242609A1 (en) * 2014-02-24 2015-08-27 Google Inc. Universal Authenticator Across Web and Mobile

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5784463A (en) * 1996-12-04 1998-07-21 V-One Corporation Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US6449651B1 (en) * 1998-11-19 2002-09-10 Toshiba America Information Systems, Inc. System and method for providing temporary remote access to a computer
US6609115B1 (en) * 1999-12-30 2003-08-19 Ge Medical Systems Method and apparatus for limited online access to restricted documentation
US20020046353A1 (en) * 2000-08-18 2002-04-18 Sony Corporation User authentication method and user authentication server
US7260726B1 (en) * 2001-12-06 2007-08-21 Adaptec, Inc. Method and apparatus for a secure computing environment
US20070083540A1 (en) * 2002-01-28 2007-04-12 Witness Systems, Inc. Providing Access to Captured Data Using a Multimedia Player
US7219138B2 (en) * 2002-01-31 2007-05-15 Witness Systems, Inc. Method, apparatus, and system for capturing data exchanged between a server and a user
US20100325435A1 (en) * 2003-06-27 2010-12-23 Young-Man Park Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
US20100062834A1 (en) * 2004-04-07 2010-03-11 Phillip James Ryan Player controls
US20050235144A1 (en) * 2004-04-14 2005-10-20 Jacobs James P Apparatus and method for computer based examinations
US8004491B2 (en) * 2004-10-05 2011-08-23 Jeff Maynard System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel
US7664960B1 (en) * 2005-09-23 2010-02-16 Kenneth Wayne Clubb Password enhancing device
US20110197266A1 (en) * 2005-12-09 2011-08-11 Citicorp Development Center, Inc. Methods and systems for secure user authentication
US8146164B2 (en) * 2006-01-24 2012-03-27 Eshun Kobi O Method and apparatus for thwarting spyware
US20070180507A1 (en) * 2006-01-27 2007-08-02 Feitian Technologies, Co., Ltd. Information security device of universal serial bus human interface device class and data transmission method for same
US20070234064A1 (en) * 2006-03-29 2007-10-04 Casio Computer Co., Ltd. Identification information output device
US20100199334A1 (en) * 2006-04-24 2010-08-05 Cypak Ab Device and method for identification and authentication
US8239679B2 (en) * 2007-06-28 2012-08-07 Tencent Technology (Shenzhen) Company Limited Authentication method, client, server and system
US20090029771A1 (en) * 2007-07-25 2009-01-29 Mega Brands International, S.A.R.L. Interactive story builder
US20110101093A1 (en) * 2007-08-19 2011-05-05 Yubico Ab Device and method for generating dynamic credit card data
WO2009025605A2 (en) * 2007-08-19 2009-02-26 Yubico Ab Device and method for generating dynamic credit card data
US20090063626A1 (en) * 2007-08-27 2009-03-05 Kazushi Nakagawa Call management system, call management method, management server, client server, client terminal, and call device
US20090271633A1 (en) * 2008-03-10 2009-10-29 Aceinc Pty Limited Data Access and Identity Verification
US20110029433A1 (en) * 2008-04-10 2011-02-03 Chee Min Thoo Import/export transaction facility
US20110265156A1 (en) * 2008-12-24 2011-10-27 Gemalto Sa Portable security device protection against keystroke loggers
US20100198674A1 (en) * 2009-02-03 2010-08-05 John Boucard Brand Experience System
US20110119155A1 (en) * 2009-05-15 2011-05-19 Ayman Hammad Verification of portable consumer devices for 3-d secure services
US20120018506A1 (en) * 2009-05-15 2012-01-26 Visa Intrernational Service Association Verification of portable consumer device for 3-d secure services
US8313022B2 (en) * 2009-05-15 2012-11-20 Ayman Hammad Verification of portable consumer device for 3-D secure services
US8176324B1 (en) * 2009-07-02 2012-05-08 Exelis Inc. Method and system for a secure virtual keyboard
US20120254955A1 (en) * 2009-12-22 2012-10-04 Junko Suginaka Personal authentication method, personal authentication system, and portable-type communication terminal
US20110321139A1 (en) * 2010-06-23 2011-12-29 K7 Computing Private Ltd. Online Protection Of Information And Resources
US8611544B1 (en) * 2011-01-25 2013-12-17 Adobe Systems Incorporated Systems and methods for controlling electronic document use
US20120233684A1 (en) * 2011-03-07 2012-09-13 Jerome Denis Key distribution for unconnected one-time password tokens

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140283007A1 (en) * 2013-03-12 2014-09-18 Eric Lynch Temporal Security for Controlled Access Systems
US9390244B2 (en) * 2013-03-12 2016-07-12 Eric Lynch Temporal security for controlled access systems
US10402551B2 (en) 2013-03-12 2019-09-03 Eric Lynch Temporal security for controlled access systems
US10027645B2 (en) 2013-12-16 2018-07-17 Matthew B. Rappaport Systems and methods for verifying attributes of users of online systems
US10212148B2 (en) 2013-12-16 2019-02-19 Mbr Innovations Llc Systems and methods for verifying attributes of users of online systems
US10516658B2 (en) 2013-12-16 2019-12-24 Mbr Innovations Llc Systems and methods for verifying attributes of users of online systems
US11070556B2 (en) * 2015-01-21 2021-07-20 Thycotic Software, Llc Context-based possession-less access of secure information
CN105450662A (en) * 2015-12-25 2016-03-30 小米科技有限责任公司 Encryption method and device
US10412070B2 (en) 2016-06-21 2019-09-10 Noa, Inc. Method and apparatus of implementing a VPN tunnel
US20220217136A1 (en) * 2021-01-04 2022-07-07 Bank Of America Corporation Identity verification through multisystem cooperation

Also Published As

Publication number Publication date
US9197635B2 (en) 2015-11-24
US20150113273A1 (en) 2015-04-23

Similar Documents

Publication Publication Date Title
US20120102324A1 (en) Remote verification of user presence and identity
Farke et al. {“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company
Kaiiali et al. Designing a secure exam management system (SEMS) for M-learning environments
CN107026844B (en) Enhance the user authen method of safety
US10909230B2 (en) Methods for user authentication
US20090276839A1 (en) Identity collection, verification and security access control system
Ullah et al. A study into the usability and security implications of text and image based challenge questions in the context of online examination
Neumann et al. Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both?
Owens et al. User perceptions of the usability and security of smartphones as {FIDO2} roaming authenticators
CN105978994A (en) Web system oriented logging-in method
Baró‐Solé et al. Integration of an adaptive trust‐based e‐assessment system into virtual learning environments—The TeSLA project experience
Tellini et al. Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform
Iyanda et al. Development of two-factor authentication login system using dynamic password with SMS verification
KR20200004666A (en) Biometric information authentication system using machine learning and block chain and its method
O'Reilly et al. Does the shift to cloud delivery of courses compromise quality control
He et al. Understanding mobile banking applications’ security risks through blog mining and the workflow technology
CN107454044A (en) A kind of e-book reading protection of usage right method and system
Vinţe et al. Perspectives of digital identity–the case of online education during the COVID-19 pandemic
KR20200137435A (en) Opinion collection system and method using secure link address based on block-chain
Jagadamaba Keystroke Dynamics in E-Learning and Online Exams
Sabbah Proposed models for secure e-examination system
Rose Virtual proctoring in distance education: An open-source solution
Ullah et al. Usability of activity-based and image-based challenge questions in online student authentication
Khorev Authenticate users with their work on the Internet
Balilo Jr et al. A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc.(BUUFFAI) eVoting System

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: LAZ ROD INC., FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RODRIGUEZ, LAZARO;REEL/FRAME:036738/0662

Effective date: 20150924