Sanft
Lee Sanft, Davie, FL US
Patent application number | Description | Published |
---|---|---|
20110306319 | Telephone Security System - Novel methods and devices for securing telephone access. A security code is associated with a phone number that is to be secured. A securing device that stores the security code is connected with the phone line of the phone number, and intercepts each calling to the phone number by requesting inputting of a security code and comparing the input code with the stored security code. The calls with a matching security code would be allowed to go through to the phone number's owner. | 12-15-2011 |
Ted Sanft, Franklin, TN US
Patent application number | Description | Published |
---|---|---|
20130167225 | GRAPHICAL IMAGE PASSWORD AUTHENTICATION METHOD - A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network select from among a plurality of randomly displayed images, having different background colors, the correct image and background color which correspond to the user's computer account. In one advantageous form, in addition to selecting the correct image, the user must first enter a username and password. In an alte rnative form, if a user is seeking access to a computer network by using a preapproved access point or computer having an approved IP address, a user is allowed to gain access to the computer network without being prompted to select a correct image. | 06-27-2013 |
Theodore Sanft, Franklin, TN US
Patent application number | Description | Published |
---|---|---|
20130247149 | Internet protocol address authentication method - A method for secure authentication is provided which includes having a user who wishes to gain access to a computer or computer network have the IP address associated with the device to which the user wishes to gain access be in a whitelist of IP addresses associated with the user computer account. If the IP address is not associated initially with the user's computer account, the user is presented with a contact address, e.g., a telephone number, which a user uses to be presented with secondary authentication questions. Upon the user answering the secondary authentication question(s) correctly, the IP address of the user is added to the whitelist of IP addresses associated with the user's computer account and the user is provided access to the user account. | 09-19-2013 |