Patent application number | Description | Published |
20090288148 | Multi-channel multi-factor authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 11-19-2009 |
20090309698 | Single-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features. These security features can be based, for example, on unique knowledge of the person being authenticated, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 12-17-2009 |
20100005296 | Systems and Methods for Controlling Access to Encrypted Data Stored on a Mobile Device - Encrypted data on mobile devices is protected by remotely storing a decryption key. In order to decrypt the encrypted data on the mobile device, the mobile device obtains the decryption key from an access control system that is remote from the mobile device. The access control system can control access to the encrypted data by controlling access to the decryption key. For example, the access control system can implement user authentication as a condition for providing the decryption key. Access to the encrypted data can also be controlled by withholding the decryption key where, for instance, a mobile device has been reported to be lost or stolen, or once an individual's access privilege has been revoked, or at certain times of the day. | 01-07-2010 |
20100115114 | User Authentication for Social Networks - Systems and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender. Verification can be performed, for example, by reference to biometric templates stored during the user enrollment process. The biometric templates can also be used to authenticate users logging into the social network to prevent user impersonation. The ability of some users to communicate to other users of the social network can be limited to only certified users, and even to those certified users that match a criterion, such as gender or age. | 05-06-2010 |
20100279720 | Integrated instant messaging and web browsing client and related methods - An integrated web browser, instant messaging system is presented. The system operates on mobile devices and other types of embedded devices. The system is an integrated instant messaging and web browsing application controlled by an embedded application on a mobile device. Today most web browsers, instant messaging, and other programs are separate or discrete applications that are executed on an either/or type of situation. The present system provides an integrated application environment that is a single application that shares data between instant messaging and web browser sub-modules, which allows users to simultaneously message and browse. The system may also be deployed as part of an overall method for enhancing safety and producing revenue for communications networks. | 11-04-2010 |
20110302644 | Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 12-08-2011 |
20110302645 | Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 12-08-2011 |
20120117386 | Methods for Identifying the Guarantor of an Application - Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved. | 05-10-2012 |
20120166797 | Systems and Methods for Controlling Access to Encrypted Data Stored on a Mobile Device - Encrypted data on mobile devices is protected by remotely storing a decryption key. In order to decrypt the encrypted data on the mobile device, the mobile device obtains the decryption key from an access control system that is remote from the mobile device. The access control system can control access to the encrypted data by controlling access to the decryption key. For example, the access control system can implement user authentication as a condition for providing the decryption key. Access to the encrypted data can also be controlled by withholding the decryption key where, for instance, a mobile device has been reported to be lost or stolen, or once an individual's access privilege has been revoked, or at certain times of the day. | 06-28-2012 |
20120198532 | User Authentication for Social Networks - Systems and methods are provided for social networks that can verify that enrolled users are not misrepresenting facts about themselves such as age and gender. Verification can be performed, for example, by reference to biometric templates stored during the user enrollment process. The biometric templates can also be used to authenticate users logging into the social network to prevent user impersonation. The ability of some users to communicate to other users of the social network can be limited to only certified users, and even to those certified users that match a criterion, such as gender or age. | 08-02-2012 |
20130047223 | Methods for the Secure Use of One-Time Passwords - Methods for authentication over unsecure networks using one-time passwords methods are provided. The methods establish a connection over a first channel between an authentication system and a user's computing system, then the authentication system determines information based on the connection over the first channel, such as the IP address and other information that can be readily found once the IP address is known. The information derived from the connection is then provided to the user over a second channel, and the user is given an opportunity to review the information before deciding whether to continue the login. If the information returned to the user over the second channel is suspicious, this can indicate to the user that the connection over the first channel has been compromised. | 02-21-2013 |
20130080789 | Multi-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that the person has, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 03-28-2013 |
20130254546 | Methods for Identifying the Guarantor of an Application - Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved. | 09-26-2013 |
20130305325 | Methods for Thwarting Man-In-The-Middle Authentication Hacking - Methods for user authentication over unsecured networks are provided. Such methods rely on the user having one or two electronic devices, comprising two unique network addresses, and the methods seek to verify that the two network addresses are linked to geographic locations that are proximate to one another at the time of the authentication. Location information reported from user devices is not employed, rather, third-party resources are queried about each network address. A man-in-the-middle attack is suggested whenever the two geographic locations are not within a reasonable proximity of one another. | 11-14-2013 |
20130347091 | Single-Channel Multi-Factor Authentication - Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features. These security features can be based, for example, on unique knowledge of the person being authenticated, unique personal features and attributes of the person, the ability of the person to respond, and to do so in a fashion that a machine cannot, and so forth. Methods for enrolling the person prior to authentication are also provided, as well as systems for enrollment and authentication. | 12-26-2013 |
20140344942 | Methods for Activating End-User Software Licenses - Methods for software activation are provided that associate a software license key with one or more authorized individuals such that an authorized individual can readily transfer a license between different platforms. A biometric sample of the individual is stored in an enrollment step upon first activation of the software. Later, the same individual can provide a biometric sample that matches the stored biometric sample in order to activate the software on another platform, rendering the first instance inactive if no additional activations are available. More than one individual can be authorized under a license that allows for multiple activations. | 11-20-2014 |