US20120102324A1 - Remote verification of user presence and identity - Google Patents
Remote verification of user presence and identity Download PDFInfo
- Publication number
- US20120102324A1 US20120102324A1 US13/279,244 US201113279244A US2012102324A1 US 20120102324 A1 US20120102324 A1 US 20120102324A1 US 201113279244 A US201113279244 A US 201113279244A US 2012102324 A1 US2012102324 A1 US 2012102324A1
- Authority
- US
- United States
- Prior art keywords
- remote computer
- user
- digital key
- key
- behavioral data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Definitions
- the present invention relates to the field of remote computing and, more specifically, the present invention relates to the field of security in remote computer environments.
- the distance learning movement is a field of education that focuses on teaching methods and technology with the aim of delivering teaching and education to students who are not physically present in a traditional educational setting, such as a classroom.
- the distance learning process creates and provides access to learning, usually via the Internet, when the source of information and the learners are separated by time and distance, or both.
- One of the issues associated with distance learning is the verification of presence and identity of students.
- the teaching provider has an interest in verifying that a student is actually sitting at a computer and interacting with it, so as to ensure that the student is present during a class. It is also important that the teaching provider verify the identity of the student, so as to prevent the student from having another person attend a class or take an exam.
- the currently available distance learning software does not adequately solve the aforementioned problems with the prior art.
- a system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
- a method for verifying presence and identity of a user on a remote computer comprises receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
- FIG. 1 is a block diagram illustrating a network architecture of a remote presence and identity verification system, in accordance with one embodiment of the present invention.
- the present invention improves upon the problems with the prior art by providing verification of remote users of a computer system in a user-friendly and safe manner.
- the present invention allows for more secure user verification by requiring that users carry and utilize small, unobtrusive security tokens that hold encrypted keys unique to the user.
- the present invention further allows for the automatic and seamless storage and transmittal of behavioral data of the user during usage, which may be used to verify the presence and interaction of the user at the remote computer.
- FIG. 1 is a block diagram illustrating a network architecture of a remote identity and presence verification system, in accordance with one embodiment of the present invention.
- FIG. 1 shows a server 102 and a database 104 connected to the network 106 , which may be the Internet.
- the database 104 may house user information, such as contact information, user credentials, user records, and financial or payment information, for a plurality of users. Each user's record may also include a unique identifier for his digital key.
- user 130 may use his computer 132 to enter his credentials, contact information, unique identifier and payment information into the database 104 .
- the computer 132 may be a desktop, laptop, tablet, netbook, smartphone or the like.
- FIG. 1 also shows that the user 130 may use a digital key 135 , which may interface with the computer 132 .
- the digital key 135 may be a security token (otherwise called a hardware token, authentication token, USB token, cryptographic token, or key fob), which is a physical device given to an authorized user of the server 102 to ease authentication.
- Security tokens are used to prove one's identity electronically. Some security tokens store cryptographic keys, such as passwords, a digital signature, or biometric data.
- the digital key 135 comprises a YubiKey, manufactured by Yubico, which is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key.
- Yubikey has four modes of operation including Standard Yubico 12 character ID+32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software.
- the method of the present invention begins with a user 130 using his computer 132 to log onto server 102 over the network 106 using his credentials.
- the user 130 may utilize a specialized secure web browser to log in and interact with server 102 .
- An encrypted key may be read from the digital key 135 and transmitted to the server 102 .
- a password or key is automatically written into a browser text field when the user 130 , upon being prompted, presses a button on the digital key 135 .
- Encrypted data may be read from the digital key 135 and transmitted to the server 102 at random intervals.
- the server 102 Upon receiving an encrypted key, the server 102 decrypts the data and stores it.
- the specialized web browser may capture behavioral data of the user 130 and other data, such as session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers.
- the web browser may also send the behavioral and other data to the server 102 at certain time intervals. The behavioral and other data may be used to determine the actual presence of the user 130 at the computer 132 .
- a user 130 when a user 130 enters a portion of the web site that requires additional verification, such as a quiz or a test, the user 130 is presented with a popup window requesting a phone number and a pin number.
- the user 130 calls the number the user 130 will be instructed to enter the pin number.
- the popup window text After entering the pin number the popup window text will change displaying a random message to record via voice.
- the popup window will show a textbox to enter an encrypted key from the digital key 135 , such as the Yubico key.
- the information from the encrypted key and voice recording is stored in database 104 for an administrator or instructor to view or analyze.
- the voice recording may also be analyzed with voice analyzing software.
Abstract
A system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
Description
- This application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, filed on Oct. 21, 2010.
- 1. Field of the Invention
- The present invention relates to the field of remote computing and, more specifically, the present invention relates to the field of security in remote computer environments.
- 2. Description of the Related Art
- The distance learning movement is a field of education that focuses on teaching methods and technology with the aim of delivering teaching and education to students who are not physically present in a traditional educational setting, such as a classroom. The distance learning process creates and provides access to learning, usually via the Internet, when the source of information and the learners are separated by time and distance, or both.
- One of the issues associated with distance learning is the verification of presence and identity of students. The teaching provider has an interest in verifying that a student is actually sitting at a computer and interacting with it, so as to ensure that the student is present during a class. It is also important that the teaching provider verify the identity of the student, so as to prevent the student from having another person attend a class or take an exam. The currently available distance learning software does not adequately solve the aforementioned problems with the prior art.
- Therefore, what is needed is a system and method for improving the problems with the prior art, and more particularly for a more efficient system and method for verifying the presence and identity of remote users of a computer system.
- Embodiments of the present invention address deficiencies of the art in respect to distance learning and provide a novel and non-obvious system and method for remotely verifying presence and identity in a distance learning environment. In an embodiment of the invention, a system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
- In another embodiment of the invention, a method for verifying presence and identity of a user on a remote computer comprises receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
- Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
- The accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
-
FIG. 1 is a block diagram illustrating a network architecture of a remote presence and identity verification system, in accordance with one embodiment of the present invention. - The present invention improves upon the problems with the prior art by providing verification of remote users of a computer system in a user-friendly and safe manner. The present invention allows for more secure user verification by requiring that users carry and utilize small, unobtrusive security tokens that hold encrypted keys unique to the user. The present invention further allows for the automatic and seamless storage and transmittal of behavioral data of the user during usage, which may be used to verify the presence and interaction of the user at the remote computer.
-
FIG. 1 is a block diagram illustrating a network architecture of a remote identity and presence verification system, in accordance with one embodiment of the present invention.FIG. 1 shows aserver 102 and adatabase 104 connected to thenetwork 106, which may be the Internet. Thedatabase 104 may house user information, such as contact information, user credentials, user records, and financial or payment information, for a plurality of users. Each user's record may also include a unique identifier for his digital key. For example,user 130 may use hiscomputer 132 to enter his credentials, contact information, unique identifier and payment information into thedatabase 104. Thecomputer 132 may be a desktop, laptop, tablet, netbook, smartphone or the like. -
FIG. 1 also shows that theuser 130 may use adigital key 135, which may interface with thecomputer 132. Thedigital key 135 may be a security token (otherwise called a hardware token, authentication token, USB token, cryptographic token, or key fob), which is a physical device given to an authorized user of theserver 102 to ease authentication. Security tokens are used to prove one's identity electronically. Some security tokens store cryptographic keys, such as passwords, a digital signature, or biometric data. - In one embodiment, the
digital key 135 comprises a YubiKey, manufactured by Yubico, which is a device that acts as a USB keyboard and provides secure authentication by a one-time password that is encrypted using the AES encryption algorithm with a 128-bit key. The Yubikey has four modes of operation including Standard Yubico 12 character ID+32 character OTP, OATH 6 or 8 digit OTP for use with third party OATH servers, Static pass code including 1-64 character for legacy login applications, and challenge-response functionality using client software. - The method of the present invention begins with a
user 130 using hiscomputer 132 to log ontoserver 102 over thenetwork 106 using his credentials. Theuser 130 may utilize a specialized secure web browser to log in and interact withserver 102. An encrypted key may be read from thedigital key 135 and transmitted to theserver 102. In one embodiment, a password or key is automatically written into a browser text field when theuser 130, upon being prompted, presses a button on thedigital key 135. Encrypted data may be read from thedigital key 135 and transmitted to theserver 102 at random intervals. - Upon receiving an encrypted key, the
server 102 decrypts the data and stores it. The specialized web browser may capture behavioral data of theuser 130 and other data, such as session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers. The web browser may also send the behavioral and other data to theserver 102 at certain time intervals. The behavioral and other data may be used to determine the actual presence of theuser 130 at thecomputer 132. - In one embodiment of the present invention, when a
user 130 enters a portion of the web site that requires additional verification, such as a quiz or a test, theuser 130 is presented with a popup window requesting a phone number and a pin number. When theuser 130 calls the number theuser 130 will be instructed to enter the pin number. After entering the pin number the popup window text will change displaying a random message to record via voice. After recording the voice message the popup window will show a textbox to enter an encrypted key from thedigital key 135, such as the Yubico key. The information from the encrypted key and voice recording is stored indatabase 104 for an administrator or instructor to view or analyze. The voice recording may also be analyzed with voice analyzing software. - Although specific embodiments of the invention have been disclosed, those having ordinary skill in the art will understand that changes can be made to the specific embodiments without departing from the spirit and scope of the invention. The scope of the invention is not to be restricted, therefore, to the specific embodiments. Furthermore, it is intended that the appended claims cover any and all such applications, modifications, and embodiments within the scope of the present invention.
-
-
Application Number Filing Date 61/528,024 Aug. 26, 2011 61/405,643 Oct. 21, 2010 - This application is a continuation application and claims priority to U.S. provisional application No. 61/528,024, entitled “REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY” filed on Aug. 26, 2011, which claims priority to U.S. provisional application No. 61/405,643, entitled USB Device coupled to a Decision-making system. System, method, and computer program product for authenticating into a website with microcontroller, filed on Oct. 21, 2010.
- Ser. No. 11/105,962
- APPARATUS AND METHOD FOR COMPUTER BASED EXAMINATIONS.
- Ser. No. 11/734,149
- SYSTEM FOR AND METHODS OF STORING AND COMPARING COMPUTER GENERATED CONTINUOUS VECTOR LINES THROUGH A NON-SECURE OR A SECURE COMMUNICATION CHANNEL.
- Ser. No. 12/287,336
- METHODS FOR PERFORMING SECURE ON-LINE TESTING WITHOUT PRE-INSTALLATION OF A SECURE BROWSER.
- Ser. No. 12/674,142
- DEVICE AND METHOD FOR GENERATING DYNAMIC CREDIT CARD DATA.
Claims (6)
1. A system for verifying presence and identity of a user on a remote computer, comprising:
a server connected to a networked communication system;
a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system;
a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key;
a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and
a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
2. The system of claim 1 , wherein the server further comprises a database for storing user records and user credentials.
3. The system of claim 2 , wherein the interface on the remote computer for the digital key comprises a USB port.
4. The system of claim 3 , wherein the digital key comprises a device that acts as a USB keyboard and provides secure authentication by a one-time password.
5. The system of claim 4 , wherein the behavioral data recorded includes: session identifiers, a number of times the digital key has powered up, a session count, user names, time deltas between events, and device identifiers.
6. A method for verifying presence and identity of a user on a remote computer, comprising:
receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer;
reading, by a processor on the remote computer, the encrypted key from the digital key;
transmitting, by the processor, the encrypted key to the server over the networked communications system;
capturing, by a computer program executing on the remote computer, behavioral data of the user; and
transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/279,244 US20120102324A1 (en) | 2010-10-21 | 2011-10-21 | Remote verification of user presence and identity |
US14/525,206 US9197635B2 (en) | 2010-10-21 | 2014-10-27 | Remote verification of user presence and identity |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US40564310P | 2010-10-21 | 2010-10-21 | |
US201161528024P | 2011-08-26 | 2011-08-26 | |
US13/279,244 US20120102324A1 (en) | 2010-10-21 | 2011-10-21 | Remote verification of user presence and identity |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/525,206 Continuation US9197635B2 (en) | 2010-10-21 | 2014-10-27 | Remote verification of user presence and identity |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120102324A1 true US20120102324A1 (en) | 2012-04-26 |
Family
ID=45973989
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/279,244 Abandoned US20120102324A1 (en) | 2010-10-21 | 2011-10-21 | Remote verification of user presence and identity |
US14/525,206 Expired - Fee Related US9197635B2 (en) | 2010-10-21 | 2014-10-27 | Remote verification of user presence and identity |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/525,206 Expired - Fee Related US9197635B2 (en) | 2010-10-21 | 2014-10-27 | Remote verification of user presence and identity |
Country Status (1)
Country | Link |
---|---|
US (2) | US20120102324A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140283007A1 (en) * | 2013-03-12 | 2014-09-18 | Eric Lynch | Temporal Security for Controlled Access Systems |
CN105450662A (en) * | 2015-12-25 | 2016-03-30 | 小米科技有限责任公司 | Encryption method and device |
US10027645B2 (en) | 2013-12-16 | 2018-07-17 | Matthew B. Rappaport | Systems and methods for verifying attributes of users of online systems |
US10412070B2 (en) | 2016-06-21 | 2019-09-10 | Noa, Inc. | Method and apparatus of implementing a VPN tunnel |
US11070556B2 (en) * | 2015-01-21 | 2021-07-20 | Thycotic Software, Llc | Context-based possession-less access of secure information |
US20220217136A1 (en) * | 2021-01-04 | 2022-07-07 | Bank Of America Corporation | Identity verification through multisystem cooperation |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417797B (en) * | 2015-04-02 | 2021-07-30 | 创新先进技术有限公司 | Method and device for authenticating user |
US9866545B2 (en) * | 2015-06-02 | 2018-01-09 | ALTR Solutions, Inc. | Credential-free user login to remotely executed applications |
US9824208B2 (en) * | 2015-07-06 | 2017-11-21 | Unisys Corporation | Cloud-based active password manager |
TWI661332B (en) * | 2018-03-21 | 2019-06-01 | 精英電腦股份有限公司 | Method for remotely authorizing a user to log on a computer system |
US10628572B2 (en) * | 2018-08-24 | 2020-04-21 | Venkatachalam Garimella | Computer and data protection system |
DE102019106049A1 (en) * | 2019-03-08 | 2020-09-10 | Krohne Messtechnik Gmbh | Method for secure communication between a field device in automation technology and a terminal and a system for secure communication between a field device and a terminal |
Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US20020046353A1 (en) * | 2000-08-18 | 2002-04-18 | Sony Corporation | User authentication method and user authentication server |
US6449651B1 (en) * | 1998-11-19 | 2002-09-10 | Toshiba America Information Systems, Inc. | System and method for providing temporary remote access to a computer |
US6609115B1 (en) * | 1999-12-30 | 2003-08-19 | Ge Medical Systems | Method and apparatus for limited online access to restricted documentation |
US20050235144A1 (en) * | 2004-04-14 | 2005-10-20 | Jacobs James P | Apparatus and method for computer based examinations |
US20070083540A1 (en) * | 2002-01-28 | 2007-04-12 | Witness Systems, Inc. | Providing Access to Captured Data Using a Multimedia Player |
US7219138B2 (en) * | 2002-01-31 | 2007-05-15 | Witness Systems, Inc. | Method, apparatus, and system for capturing data exchanged between a server and a user |
US20070180507A1 (en) * | 2006-01-27 | 2007-08-02 | Feitian Technologies, Co., Ltd. | Information security device of universal serial bus human interface device class and data transmission method for same |
US7260726B1 (en) * | 2001-12-06 | 2007-08-21 | Adaptec, Inc. | Method and apparatus for a secure computing environment |
US20070234064A1 (en) * | 2006-03-29 | 2007-10-04 | Casio Computer Co., Ltd. | Identification information output device |
US20090029771A1 (en) * | 2007-07-25 | 2009-01-29 | Mega Brands International, S.A.R.L. | Interactive story builder |
WO2009025605A2 (en) * | 2007-08-19 | 2009-02-26 | Yubico Ab | Device and method for generating dynamic credit card data |
US20090063626A1 (en) * | 2007-08-27 | 2009-03-05 | Kazushi Nakagawa | Call management system, call management method, management server, client server, client terminal, and call device |
US20090271633A1 (en) * | 2008-03-10 | 2009-10-29 | Aceinc Pty Limited | Data Access and Identity Verification |
US7664960B1 (en) * | 2005-09-23 | 2010-02-16 | Kenneth Wayne Clubb | Password enhancing device |
US20100062834A1 (en) * | 2004-04-07 | 2010-03-11 | Phillip James Ryan | Player controls |
US20100199334A1 (en) * | 2006-04-24 | 2010-08-05 | Cypak Ab | Device and method for identification and authentication |
US20100198674A1 (en) * | 2009-02-03 | 2010-08-05 | John Boucard | Brand Experience System |
US20100325435A1 (en) * | 2003-06-27 | 2010-12-23 | Young-Man Park | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same |
US20110029433A1 (en) * | 2008-04-10 | 2011-02-03 | Chee Min Thoo | Import/export transaction facility |
US20110119155A1 (en) * | 2009-05-15 | 2011-05-19 | Ayman Hammad | Verification of portable consumer devices for 3-d secure services |
US20110197266A1 (en) * | 2005-12-09 | 2011-08-11 | Citicorp Development Center, Inc. | Methods and systems for secure user authentication |
US8004491B2 (en) * | 2004-10-05 | 2011-08-23 | Jeff Maynard | System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel |
US20110265156A1 (en) * | 2008-12-24 | 2011-10-27 | Gemalto Sa | Portable security device protection against keystroke loggers |
US20110321139A1 (en) * | 2010-06-23 | 2011-12-29 | K7 Computing Private Ltd. | Online Protection Of Information And Resources |
US20120018506A1 (en) * | 2009-05-15 | 2012-01-26 | Visa Intrernational Service Association | Verification of portable consumer device for 3-d secure services |
US8146164B2 (en) * | 2006-01-24 | 2012-03-27 | Eshun Kobi O | Method and apparatus for thwarting spyware |
US8176324B1 (en) * | 2009-07-02 | 2012-05-08 | Exelis Inc. | Method and system for a secure virtual keyboard |
US8239679B2 (en) * | 2007-06-28 | 2012-08-07 | Tencent Technology (Shenzhen) Company Limited | Authentication method, client, server and system |
US20120233684A1 (en) * | 2011-03-07 | 2012-09-13 | Jerome Denis | Key distribution for unconnected one-time password tokens |
US20120254955A1 (en) * | 2009-12-22 | 2012-10-04 | Junko Suginaka | Personal authentication method, personal authentication system, and portable-type communication terminal |
US8611544B1 (en) * | 2011-01-25 | 2013-12-17 | Adobe Systems Incorporated | Systems and methods for controlling electronic document use |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7093137B1 (en) * | 1999-09-30 | 2006-08-15 | Casio Computer Co., Ltd. | Database management apparatus and encrypting/decrypting system |
US20020182578A1 (en) * | 2001-06-01 | 2002-12-05 | Rachman Bruce A. | Online course support method and system |
US7325134B2 (en) * | 2002-10-08 | 2008-01-29 | Koolspan, Inc. | Localized network authentication and security using tamper-resistant keys |
US20040139182A1 (en) * | 2002-12-02 | 2004-07-15 | Chi-Tung Chang | Management device and method for controlling an internet website browsing |
US20120210119A1 (en) * | 2004-06-14 | 2012-08-16 | Arthur Baxter | Method and Apparatus for Secure Internet Browsing |
US7979716B2 (en) * | 2004-11-18 | 2011-07-12 | Biogy, Inc. | Method of generating access keys |
US7676584B2 (en) * | 2005-05-17 | 2010-03-09 | Kid Group Llc | Method and apparatus for providing games and content |
US8607045B2 (en) * | 2005-09-09 | 2013-12-10 | Emc Corporation | Tokencode exchanges for peripheral authentication |
GB0600207D0 (en) * | 2006-01-05 | 2006-02-15 | Bishop Durrell G B | Apparatus for direct automated access to a task or content |
US7853535B2 (en) * | 2006-12-27 | 2010-12-14 | Colella Brian A | System for secure internet access for children |
US8275890B2 (en) * | 2009-06-03 | 2012-09-25 | International Business Machines Corporation | Detecting an inactive client during a communication session |
US8819170B2 (en) * | 2011-07-14 | 2014-08-26 | Schneider Electric It Corporation | Communication protocols |
WO2013186711A2 (en) * | 2012-06-13 | 2013-12-19 | Yeara Christian | Gatekeeper lock system |
US9324242B2 (en) * | 2013-03-13 | 2016-04-26 | Ergopedia, Inc. | Electronic book that can communicate directly with hardware devices via a keyboard API interface |
US9137247B2 (en) * | 2013-03-15 | 2015-09-15 | Intel Corporation | Technologies for secure storage and use of biometric authentication information |
US20150242609A1 (en) * | 2014-02-24 | 2015-08-27 | Google Inc. | Universal Authenticator Across Web and Mobile |
-
2011
- 2011-10-21 US US13/279,244 patent/US20120102324A1/en not_active Abandoned
-
2014
- 2014-10-27 US US14/525,206 patent/US9197635B2/en not_active Expired - Fee Related
Patent Citations (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5784463A (en) * | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
US6449651B1 (en) * | 1998-11-19 | 2002-09-10 | Toshiba America Information Systems, Inc. | System and method for providing temporary remote access to a computer |
US6609115B1 (en) * | 1999-12-30 | 2003-08-19 | Ge Medical Systems | Method and apparatus for limited online access to restricted documentation |
US20020046353A1 (en) * | 2000-08-18 | 2002-04-18 | Sony Corporation | User authentication method and user authentication server |
US7260726B1 (en) * | 2001-12-06 | 2007-08-21 | Adaptec, Inc. | Method and apparatus for a secure computing environment |
US20070083540A1 (en) * | 2002-01-28 | 2007-04-12 | Witness Systems, Inc. | Providing Access to Captured Data Using a Multimedia Player |
US7219138B2 (en) * | 2002-01-31 | 2007-05-15 | Witness Systems, Inc. | Method, apparatus, and system for capturing data exchanged between a server and a user |
US20100325435A1 (en) * | 2003-06-27 | 2010-12-23 | Young-Man Park | Two-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same |
US20100062834A1 (en) * | 2004-04-07 | 2010-03-11 | Phillip James Ryan | Player controls |
US20050235144A1 (en) * | 2004-04-14 | 2005-10-20 | Jacobs James P | Apparatus and method for computer based examinations |
US8004491B2 (en) * | 2004-10-05 | 2011-08-23 | Jeff Maynard | System for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel |
US7664960B1 (en) * | 2005-09-23 | 2010-02-16 | Kenneth Wayne Clubb | Password enhancing device |
US20110197266A1 (en) * | 2005-12-09 | 2011-08-11 | Citicorp Development Center, Inc. | Methods and systems for secure user authentication |
US8146164B2 (en) * | 2006-01-24 | 2012-03-27 | Eshun Kobi O | Method and apparatus for thwarting spyware |
US20070180507A1 (en) * | 2006-01-27 | 2007-08-02 | Feitian Technologies, Co., Ltd. | Information security device of universal serial bus human interface device class and data transmission method for same |
US20070234064A1 (en) * | 2006-03-29 | 2007-10-04 | Casio Computer Co., Ltd. | Identification information output device |
US20100199334A1 (en) * | 2006-04-24 | 2010-08-05 | Cypak Ab | Device and method for identification and authentication |
US8239679B2 (en) * | 2007-06-28 | 2012-08-07 | Tencent Technology (Shenzhen) Company Limited | Authentication method, client, server and system |
US20090029771A1 (en) * | 2007-07-25 | 2009-01-29 | Mega Brands International, S.A.R.L. | Interactive story builder |
US20110101093A1 (en) * | 2007-08-19 | 2011-05-05 | Yubico Ab | Device and method for generating dynamic credit card data |
WO2009025605A2 (en) * | 2007-08-19 | 2009-02-26 | Yubico Ab | Device and method for generating dynamic credit card data |
US20090063626A1 (en) * | 2007-08-27 | 2009-03-05 | Kazushi Nakagawa | Call management system, call management method, management server, client server, client terminal, and call device |
US20090271633A1 (en) * | 2008-03-10 | 2009-10-29 | Aceinc Pty Limited | Data Access and Identity Verification |
US20110029433A1 (en) * | 2008-04-10 | 2011-02-03 | Chee Min Thoo | Import/export transaction facility |
US20110265156A1 (en) * | 2008-12-24 | 2011-10-27 | Gemalto Sa | Portable security device protection against keystroke loggers |
US20100198674A1 (en) * | 2009-02-03 | 2010-08-05 | John Boucard | Brand Experience System |
US20110119155A1 (en) * | 2009-05-15 | 2011-05-19 | Ayman Hammad | Verification of portable consumer devices for 3-d secure services |
US20120018506A1 (en) * | 2009-05-15 | 2012-01-26 | Visa Intrernational Service Association | Verification of portable consumer device for 3-d secure services |
US8313022B2 (en) * | 2009-05-15 | 2012-11-20 | Ayman Hammad | Verification of portable consumer device for 3-D secure services |
US8176324B1 (en) * | 2009-07-02 | 2012-05-08 | Exelis Inc. | Method and system for a secure virtual keyboard |
US20120254955A1 (en) * | 2009-12-22 | 2012-10-04 | Junko Suginaka | Personal authentication method, personal authentication system, and portable-type communication terminal |
US20110321139A1 (en) * | 2010-06-23 | 2011-12-29 | K7 Computing Private Ltd. | Online Protection Of Information And Resources |
US8611544B1 (en) * | 2011-01-25 | 2013-12-17 | Adobe Systems Incorporated | Systems and methods for controlling electronic document use |
US20120233684A1 (en) * | 2011-03-07 | 2012-09-13 | Jerome Denis | Key distribution for unconnected one-time password tokens |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140283007A1 (en) * | 2013-03-12 | 2014-09-18 | Eric Lynch | Temporal Security for Controlled Access Systems |
US9390244B2 (en) * | 2013-03-12 | 2016-07-12 | Eric Lynch | Temporal security for controlled access systems |
US10402551B2 (en) | 2013-03-12 | 2019-09-03 | Eric Lynch | Temporal security for controlled access systems |
US10027645B2 (en) | 2013-12-16 | 2018-07-17 | Matthew B. Rappaport | Systems and methods for verifying attributes of users of online systems |
US10212148B2 (en) | 2013-12-16 | 2019-02-19 | Mbr Innovations Llc | Systems and methods for verifying attributes of users of online systems |
US10516658B2 (en) | 2013-12-16 | 2019-12-24 | Mbr Innovations Llc | Systems and methods for verifying attributes of users of online systems |
US11070556B2 (en) * | 2015-01-21 | 2021-07-20 | Thycotic Software, Llc | Context-based possession-less access of secure information |
CN105450662A (en) * | 2015-12-25 | 2016-03-30 | 小米科技有限责任公司 | Encryption method and device |
US10412070B2 (en) | 2016-06-21 | 2019-09-10 | Noa, Inc. | Method and apparatus of implementing a VPN tunnel |
US20220217136A1 (en) * | 2021-01-04 | 2022-07-07 | Bank Of America Corporation | Identity verification through multisystem cooperation |
Also Published As
Publication number | Publication date |
---|---|
US9197635B2 (en) | 2015-11-24 |
US20150113273A1 (en) | 2015-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120102324A1 (en) | Remote verification of user presence and identity | |
Farke et al. | {“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company | |
Kaiiali et al. | Designing a secure exam management system (SEMS) for M-learning environments | |
CN107026844B (en) | Enhance the user authen method of safety | |
US10909230B2 (en) | Methods for user authentication | |
US20090276839A1 (en) | Identity collection, verification and security access control system | |
Ullah et al. | A study into the usability and security implications of text and image based challenge questions in the context of online examination | |
Neumann et al. | Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both? | |
Owens et al. | User perceptions of the usability and security of smartphones as {FIDO2} roaming authenticators | |
CN105978994A (en) | Web system oriented logging-in method | |
Baró‐Solé et al. | Integration of an adaptive trust‐based e‐assessment system into virtual learning environments—The TeSLA project experience | |
Tellini et al. | Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform | |
Iyanda et al. | Development of two-factor authentication login system using dynamic password with SMS verification | |
KR20200004666A (en) | Biometric information authentication system using machine learning and block chain and its method | |
O'Reilly et al. | Does the shift to cloud delivery of courses compromise quality control | |
He et al. | Understanding mobile banking applications’ security risks through blog mining and the workflow technology | |
CN107454044A (en) | A kind of e-book reading protection of usage right method and system | |
Vinţe et al. | Perspectives of digital identity–the case of online education during the COVID-19 pandemic | |
KR20200137435A (en) | Opinion collection system and method using secure link address based on block-chain | |
Jagadamaba | Keystroke Dynamics in E-Learning and Online Exams | |
Sabbah | Proposed models for secure e-examination system | |
Rose | Virtual proctoring in distance education: An open-source solution | |
Ullah et al. | Usability of activity-based and image-based challenge questions in online student authentication | |
Khorev | Authenticate users with their work on the Internet | |
Balilo Jr et al. | A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc.(BUUFFAI) eVoting System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: LAZ ROD INC., FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RODRIGUEZ, LAZARO;REEL/FRAME:036738/0662 Effective date: 20150924 |