Movatterモバイル変換


[0]ホーム

URL:


US20120102324A1 - Remote verification of user presence and identity - Google Patents

Remote verification of user presence and identity
Download PDF

Info

Publication number
US20120102324A1
US20120102324A1US13/279,244US201113279244AUS2012102324A1US 20120102324 A1US20120102324 A1US 20120102324A1US 201113279244 AUS201113279244 AUS 201113279244AUS 2012102324 A1US2012102324 A1US 2012102324A1
Authority
US
United States
Prior art keywords
remote computer
user
digital key
key
behavioral data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/279,244
Inventor
Michael James McNeely
Lazaro Rodriguez
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Laz Rod Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US13/279,244priorityCriticalpatent/US20120102324A1/en
Publication of US20120102324A1publicationCriticalpatent/US20120102324A1/en
Priority to US14/525,206prioritypatent/US9197635B2/en
Assigned to LAZ ROD INC.reassignmentLAZ ROD INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RODRIGUEZ, LAZARO
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.

Description

Claims (6)

US13/279,2442010-10-212011-10-21Remote verification of user presence and identityAbandonedUS20120102324A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US13/279,244US20120102324A1 (en)2010-10-212011-10-21Remote verification of user presence and identity
US14/525,206US9197635B2 (en)2010-10-212014-10-27Remote verification of user presence and identity

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US40564310P2010-10-212010-10-21
US201161528024P2011-08-262011-08-26
US13/279,244US20120102324A1 (en)2010-10-212011-10-21Remote verification of user presence and identity

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/525,206ContinuationUS9197635B2 (en)2010-10-212014-10-27Remote verification of user presence and identity

Publications (1)

Publication NumberPublication Date
US20120102324A1true US20120102324A1 (en)2012-04-26

Family

ID=45973989

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/279,244AbandonedUS20120102324A1 (en)2010-10-212011-10-21Remote verification of user presence and identity
US14/525,206Expired - Fee RelatedUS9197635B2 (en)2010-10-212014-10-27Remote verification of user presence and identity

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US14/525,206Expired - Fee RelatedUS9197635B2 (en)2010-10-212014-10-27Remote verification of user presence and identity

Country Status (1)

CountryLink
US (2)US20120102324A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140283007A1 (en)*2013-03-122014-09-18Eric LynchTemporal Security for Controlled Access Systems
CN105450662A (en)*2015-12-252016-03-30小米科技有限责任公司Encryption method and device
US10027645B2 (en)2013-12-162018-07-17Matthew B. RappaportSystems and methods for verifying attributes of users of online systems
US10412070B2 (en)2016-06-212019-09-10Noa, Inc.Method and apparatus of implementing a VPN tunnel
US11070556B2 (en)*2015-01-212021-07-20Thycotic Software, LlcContext-based possession-less access of secure information
US20220217136A1 (en)*2021-01-042022-07-07Bank Of America CorporationIdentity verification through multisystem cooperation

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110417797B (en)*2015-04-022021-07-30创新先进技术有限公司Method and device for authenticating user
US9866545B2 (en)*2015-06-022018-01-09ALTR Solutions, Inc.Credential-free user login to remotely executed applications
US9824208B2 (en)*2015-07-062017-11-21Unisys CorporationCloud-based active password manager
TWI661332B (en)*2018-03-212019-06-01精英電腦股份有限公司Method for remotely authorizing a user to log on a computer system
US10628572B2 (en)*2018-08-242020-04-21Venkatachalam GarimellaComputer and data protection system
DE102019106049A1 (en)*2019-03-082020-09-10Krohne Messtechnik Gmbh Method for secure communication between a field device in automation technology and a terminal and a system for secure communication between a field device and a terminal

Citations (32)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5784463A (en)*1996-12-041998-07-21V-One CorporationToken distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US20020046353A1 (en)*2000-08-182002-04-18Sony CorporationUser authentication method and user authentication server
US6449651B1 (en)*1998-11-192002-09-10Toshiba America Information Systems, Inc.System and method for providing temporary remote access to a computer
US6609115B1 (en)*1999-12-302003-08-19Ge Medical SystemsMethod and apparatus for limited online access to restricted documentation
US20050235144A1 (en)*2004-04-142005-10-20Jacobs James PApparatus and method for computer based examinations
US20070083540A1 (en)*2002-01-282007-04-12Witness Systems, Inc.Providing Access to Captured Data Using a Multimedia Player
US7219138B2 (en)*2002-01-312007-05-15Witness Systems, Inc.Method, apparatus, and system for capturing data exchanged between a server and a user
US20070180507A1 (en)*2006-01-272007-08-02Feitian Technologies, Co., Ltd.Information security device of universal serial bus human interface device class and data transmission method for same
US7260726B1 (en)*2001-12-062007-08-21Adaptec, Inc.Method and apparatus for a secure computing environment
US20070234064A1 (en)*2006-03-292007-10-04Casio Computer Co., Ltd.Identification information output device
US20090029771A1 (en)*2007-07-252009-01-29Mega Brands International, S.A.R.L.Interactive story builder
WO2009025605A2 (en)*2007-08-192009-02-26Yubico AbDevice and method for generating dynamic credit card data
US20090063626A1 (en)*2007-08-272009-03-05Kazushi NakagawaCall management system, call management method, management server, client server, client terminal, and call device
US20090271633A1 (en)*2008-03-102009-10-29Aceinc Pty LimitedData Access and Identity Verification
US7664960B1 (en)*2005-09-232010-02-16Kenneth Wayne ClubbPassword enhancing device
US20100062834A1 (en)*2004-04-072010-03-11Phillip James RyanPlayer controls
US20100199334A1 (en)*2006-04-242010-08-05Cypak AbDevice and method for identification and authentication
US20100198674A1 (en)*2009-02-032010-08-05John BoucardBrand Experience System
US20100325435A1 (en)*2003-06-272010-12-23Young-Man ParkTwo-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
US20110029433A1 (en)*2008-04-102011-02-03Chee Min ThooImport/export transaction facility
US20110119155A1 (en)*2009-05-152011-05-19Ayman HammadVerification of portable consumer devices for 3-d secure services
US20110197266A1 (en)*2005-12-092011-08-11Citicorp Development Center, Inc.Methods and systems for secure user authentication
US8004491B2 (en)*2004-10-052011-08-23Jeff MaynardSystem for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel
US20110265156A1 (en)*2008-12-242011-10-27Gemalto SaPortable security device protection against keystroke loggers
US20110321139A1 (en)*2010-06-232011-12-29K7 Computing Private Ltd.Online Protection Of Information And Resources
US20120018506A1 (en)*2009-05-152012-01-26Visa Intrernational Service AssociationVerification of portable consumer device for 3-d secure services
US8146164B2 (en)*2006-01-242012-03-27Eshun Kobi OMethod and apparatus for thwarting spyware
US8176324B1 (en)*2009-07-022012-05-08Exelis Inc.Method and system for a secure virtual keyboard
US8239679B2 (en)*2007-06-282012-08-07Tencent Technology (Shenzhen) Company LimitedAuthentication method, client, server and system
US20120233684A1 (en)*2011-03-072012-09-13Jerome DenisKey distribution for unconnected one-time password tokens
US20120254955A1 (en)*2009-12-222012-10-04Junko SuginakaPersonal authentication method, personal authentication system, and portable-type communication terminal
US8611544B1 (en)*2011-01-252013-12-17Adobe Systems IncorporatedSystems and methods for controlling electronic document use

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7093137B1 (en)*1999-09-302006-08-15Casio Computer Co., Ltd.Database management apparatus and encrypting/decrypting system
US20020182578A1 (en)*2001-06-012002-12-05Rachman Bruce A.Online course support method and system
US7325134B2 (en)*2002-10-082008-01-29Koolspan, Inc.Localized network authentication and security using tamper-resistant keys
US20040139182A1 (en)*2002-12-022004-07-15Chi-Tung ChangManagement device and method for controlling an internet website browsing
US20120210119A1 (en)*2004-06-142012-08-16Arthur BaxterMethod and Apparatus for Secure Internet Browsing
US7979716B2 (en)*2004-11-182011-07-12Biogy, Inc.Method of generating access keys
US7676584B2 (en)*2005-05-172010-03-09Kid Group LlcMethod and apparatus for providing games and content
US8607045B2 (en)*2005-09-092013-12-10Emc CorporationTokencode exchanges for peripheral authentication
GB0600207D0 (en)*2006-01-052006-02-15Bishop Durrell G BApparatus for direct automated access to a task or content
US7853535B2 (en)*2006-12-272010-12-14Colella Brian ASystem for secure internet access for children
US8275890B2 (en)*2009-06-032012-09-25International Business Machines CorporationDetecting an inactive client during a communication session
US8819170B2 (en)*2011-07-142014-08-26Schneider Electric It CorporationCommunication protocols
WO2013186711A2 (en)*2012-06-132013-12-19Yeara ChristianGatekeeper lock system
US9324242B2 (en)*2013-03-132016-04-26Ergopedia, Inc.Electronic book that can communicate directly with hardware devices via a keyboard API interface
EP2973164B1 (en)*2013-03-152019-01-30Intel CorporationTechnologies for secure storage and use of biometric authentication information
US20150242609A1 (en)*2014-02-242015-08-27Google Inc.Universal Authenticator Across Web and Mobile

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5784463A (en)*1996-12-041998-07-21V-One CorporationToken distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
US6449651B1 (en)*1998-11-192002-09-10Toshiba America Information Systems, Inc.System and method for providing temporary remote access to a computer
US6609115B1 (en)*1999-12-302003-08-19Ge Medical SystemsMethod and apparatus for limited online access to restricted documentation
US20020046353A1 (en)*2000-08-182002-04-18Sony CorporationUser authentication method and user authentication server
US7260726B1 (en)*2001-12-062007-08-21Adaptec, Inc.Method and apparatus for a secure computing environment
US20070083540A1 (en)*2002-01-282007-04-12Witness Systems, Inc.Providing Access to Captured Data Using a Multimedia Player
US7219138B2 (en)*2002-01-312007-05-15Witness Systems, Inc.Method, apparatus, and system for capturing data exchanged between a server and a user
US20100325435A1 (en)*2003-06-272010-12-23Young-Man ParkTwo-factor authenticated key exchange method and authentication method using the same, and recording medium storing program including the same
US20100062834A1 (en)*2004-04-072010-03-11Phillip James RyanPlayer controls
US20050235144A1 (en)*2004-04-142005-10-20Jacobs James PApparatus and method for computer based examinations
US8004491B2 (en)*2004-10-052011-08-23Jeff MaynardSystem for and methods of storing and comparing computer generated continuous vector lines through a non-secure or a secure communication channel
US7664960B1 (en)*2005-09-232010-02-16Kenneth Wayne ClubbPassword enhancing device
US20110197266A1 (en)*2005-12-092011-08-11Citicorp Development Center, Inc.Methods and systems for secure user authentication
US8146164B2 (en)*2006-01-242012-03-27Eshun Kobi OMethod and apparatus for thwarting spyware
US20070180507A1 (en)*2006-01-272007-08-02Feitian Technologies, Co., Ltd.Information security device of universal serial bus human interface device class and data transmission method for same
US20070234064A1 (en)*2006-03-292007-10-04Casio Computer Co., Ltd.Identification information output device
US20100199334A1 (en)*2006-04-242010-08-05Cypak AbDevice and method for identification and authentication
US8239679B2 (en)*2007-06-282012-08-07Tencent Technology (Shenzhen) Company LimitedAuthentication method, client, server and system
US20090029771A1 (en)*2007-07-252009-01-29Mega Brands International, S.A.R.L.Interactive story builder
US20110101093A1 (en)*2007-08-192011-05-05Yubico AbDevice and method for generating dynamic credit card data
WO2009025605A2 (en)*2007-08-192009-02-26Yubico AbDevice and method for generating dynamic credit card data
US20090063626A1 (en)*2007-08-272009-03-05Kazushi NakagawaCall management system, call management method, management server, client server, client terminal, and call device
US20090271633A1 (en)*2008-03-102009-10-29Aceinc Pty LimitedData Access and Identity Verification
US20110029433A1 (en)*2008-04-102011-02-03Chee Min ThooImport/export transaction facility
US20110265156A1 (en)*2008-12-242011-10-27Gemalto SaPortable security device protection against keystroke loggers
US20100198674A1 (en)*2009-02-032010-08-05John BoucardBrand Experience System
US20110119155A1 (en)*2009-05-152011-05-19Ayman HammadVerification of portable consumer devices for 3-d secure services
US20120018506A1 (en)*2009-05-152012-01-26Visa Intrernational Service AssociationVerification of portable consumer device for 3-d secure services
US8313022B2 (en)*2009-05-152012-11-20Ayman HammadVerification of portable consumer device for 3-D secure services
US8176324B1 (en)*2009-07-022012-05-08Exelis Inc.Method and system for a secure virtual keyboard
US20120254955A1 (en)*2009-12-222012-10-04Junko SuginakaPersonal authentication method, personal authentication system, and portable-type communication terminal
US20110321139A1 (en)*2010-06-232011-12-29K7 Computing Private Ltd.Online Protection Of Information And Resources
US8611544B1 (en)*2011-01-252013-12-17Adobe Systems IncorporatedSystems and methods for controlling electronic document use
US20120233684A1 (en)*2011-03-072012-09-13Jerome DenisKey distribution for unconnected one-time password tokens

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140283007A1 (en)*2013-03-122014-09-18Eric LynchTemporal Security for Controlled Access Systems
US9390244B2 (en)*2013-03-122016-07-12Eric LynchTemporal security for controlled access systems
US10402551B2 (en)2013-03-122019-09-03Eric LynchTemporal security for controlled access systems
US10027645B2 (en)2013-12-162018-07-17Matthew B. RappaportSystems and methods for verifying attributes of users of online systems
US10212148B2 (en)2013-12-162019-02-19Mbr Innovations LlcSystems and methods for verifying attributes of users of online systems
US10516658B2 (en)2013-12-162019-12-24Mbr Innovations LlcSystems and methods for verifying attributes of users of online systems
US11070556B2 (en)*2015-01-212021-07-20Thycotic Software, LlcContext-based possession-less access of secure information
CN105450662A (en)*2015-12-252016-03-30小米科技有限责任公司Encryption method and device
US10412070B2 (en)2016-06-212019-09-10Noa, Inc.Method and apparatus of implementing a VPN tunnel
US20220217136A1 (en)*2021-01-042022-07-07Bank Of America CorporationIdentity verification through multisystem cooperation
US12021861B2 (en)*2021-01-042024-06-25Bank Of America CorporationIdentity verification through multisystem cooperation

Also Published As

Publication numberPublication date
US9197635B2 (en)2015-11-24
US20150113273A1 (en)2015-04-23

Similar Documents

PublicationPublication DateTitle
US20120102324A1 (en)Remote verification of user presence and identity
SluskyCybersecurity of online proctoring systems
Farke et al.{“You} still use the password after {all”}–Exploring {FIDO2} Security Keys in a Small Company
Karole et al.A comparative usability evaluation of traditional password managers
Owens et al.User perceptions of the usability and security of smartphones as {FIDO2} roaming authenticators
Kaiiali et al.Designing a secure exam management system (SEMS) for M-learning environments
US10909230B2 (en)Methods for user authentication
Ullah et al.A study into the usability and security implications of text and image based challenge questions in the context of online examination
US20090276839A1 (en)Identity collection, verification and security access control system
TW200533138A (en)Apparatus, system, and method for authorized remote access to a target system
Zhu et al.Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework
Neumann et al.Helios verification: To alleviate, or to nominate: Is that the question, or shall we have both?
İşler et al.User perceptions of security and usability of mobile-based single password authentication and two-factor authentication
Iyanda et al.Development of two-factor authentication login system using dynamic password with SMS verification
CN110070636B (en)Attendance management system and method based on one-card two-dimensional code
KR20200004666A (en)Biometric information authentication system using machine learning and block chain and its method
Ide et al.Personhood Credentials: Human-Centered Design Recommendation Balancing Security, Usability, and Trust
Lane et al.The adoption of single sign-on and multifactor authentication in organisations–a critical evaluation using toe framework
Tellini et al.Two-Factor Authentication: Selecting and implementing a two-factor authentication method for a digital assessment platform
CN107454044A (en)A kind of e-book reading protection of usage right method and system
WieflingUsability, security, and privacy of risk-based authentication
O'Reilly et al.Does the shift to cloud delivery of courses compromise quality control
Ketab et al.E-invigilation of e-assessments
JoshuaA Secure Model for Student Results Verification Using Salted Hash Functions
VINȚE et al.Perspectives of digital identity–the case of online education during the COVID-19 pandemic

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:LAZ ROD INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RODRIGUEZ, LAZARO;REEL/FRAME:036738/0662

Effective date:20150924


[8]ページ先頭

©2009-2025 Movatter.jp