WO2004114082A3 - System and method for establishing historical usage-based hardware trust - Google Patents
System and method for establishing historical usage-based hardware trust Download PDFInfo
- Publication number
- WO2004114082A3 WO2004114082A3 PCT/US2004/019492 US2004019492W WO2004114082A3 WO 2004114082 A3 WO2004114082 A3 WO 2004114082A3 US 2004019492 W US2004019492 W US 2004019492W WO 2004114082 A3 WO2004114082 A3 WO 2004114082A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- usage history
- client device
- trust
- user
- authentication
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3672—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/465,163 | 2003-06-18 | ||
US10/465,163 US7174454B2 (en) | 2002-11-19 | 2003-06-18 | System and method for establishing historical usage-based hardware trust |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004114082A2 WO2004114082A2 (en) | 2004-12-29 |
WO2004114082A3 true WO2004114082A3 (en) | 2005-06-23 |
Family
ID=33539012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/019492 WO2004114082A2 (en) | 2003-06-18 | 2004-06-17 | System and method for establishing historical usage-based hardware trust |
Country Status (2)
Country | Link |
---|---|
US (6) | US7174454B2 (en) |
WO (1) | WO2004114082A2 (en) |
Families Citing this family (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004510215A (en) | 2000-05-19 | 2004-04-02 | ネットスケープ コミュニケーションズ コーポレーション | Adaptable multi-tier authentication system |
US7174454B2 (en) | 2002-11-19 | 2007-02-06 | America Online, Inc. | System and method for establishing historical usage-based hardware trust |
US20020141586A1 (en) * | 2001-03-29 | 2002-10-03 | Aladdin Knowledge Systems Ltd. | Authentication employing the bluetooth communication protocol |
US8473355B2 (en) * | 2002-12-06 | 2013-06-25 | Facebook, Inc. | System and method for electronic wallet conversion |
US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
JP4039632B2 (en) * | 2003-08-14 | 2008-01-30 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Authentication system, server, authentication method and program |
US20050177724A1 (en) * | 2004-01-16 | 2005-08-11 | Valiuddin Ali | Authentication system and method |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20060041507A1 (en) * | 2004-08-13 | 2006-02-23 | Sbc Knowledge Ventures L.P. | Pluggable authentication for transaction tool management services |
US8006288B2 (en) * | 2004-11-05 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for accessing a computer application program |
US20060230279A1 (en) * | 2005-03-30 | 2006-10-12 | Morris Robert P | Methods, systems, and computer program products for establishing trusted access to a communication network |
US8726344B1 (en) * | 2005-11-30 | 2014-05-13 | Qurio Holdings, Inc. | Methods, systems, and products for measuring trust scores of devices |
US20070136792A1 (en) * | 2005-12-05 | 2007-06-14 | Ting David M | Accelerating biometric login procedures |
US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
WO2007093813A1 (en) * | 2006-02-16 | 2007-08-23 | Weeworld Limited | Portable account information |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
JP4096983B2 (en) * | 2006-05-01 | 2008-06-04 | コニカミノルタビジネステクノロジーズ株式会社 | Data transmission apparatus, destination setting method in the same apparatus, and destination setting processing program |
US20120005729A1 (en) * | 2006-11-30 | 2012-01-05 | Ofer Amitai | System and method of network authorization by scoring |
US20080172715A1 (en) * | 2007-01-12 | 2008-07-17 | Microsoft Corporation | Scalable context-based authentication |
US8677479B2 (en) * | 2007-04-16 | 2014-03-18 | Microsoft Corporation | Detection of adversaries through collection and correlation of assessments |
US7953969B2 (en) * | 2007-04-16 | 2011-05-31 | Microsoft Corporation | Reduction of false positive reputations through collection of overrides from customer deployments |
US8769639B2 (en) * | 2007-09-04 | 2014-07-01 | Microsoft Corporation | History-based downgraded network identification |
US8893284B2 (en) * | 2007-10-03 | 2014-11-18 | Motorola Mobility Llc | Method and system for providing extended authentication |
US8606746B2 (en) * | 2007-10-19 | 2013-12-10 | Oracle International Corporation | Privacy management policy hub |
US9349127B2 (en) * | 2007-11-29 | 2016-05-24 | Visa Usa Inc. | Serial number and payment data based payment card processing |
US8396799B2 (en) * | 2007-11-29 | 2013-03-12 | Visa U.S.A. Inc. | Media device payments remote control personalization and protection |
US8001582B2 (en) | 2008-01-18 | 2011-08-16 | Microsoft Corporation | Cross-network reputation for online services |
US7925516B2 (en) * | 2008-03-14 | 2011-04-12 | Microsoft Corporation | Leveraging global reputation to increase personalization |
US20090271606A1 (en) * | 2008-04-28 | 2009-10-29 | Kabushiki Kaisha Toshiba | Information processing device and information processing system |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US9112702B2 (en) | 2009-04-29 | 2015-08-18 | Microsoft Technology Licensing, Llc | Alternate authentication |
US20100306821A1 (en) * | 2009-05-29 | 2010-12-02 | Google, Inc. | Account-recovery technique |
EP2499807A4 (en) * | 2009-12-29 | 2014-05-07 | Nokia Corp | An apparatus, method, computer program and user interface |
US9729930B2 (en) * | 2010-01-05 | 2017-08-08 | CSC Holdings, LLC | Enhanced subscriber authentication using location tracking |
US8973154B2 (en) * | 2010-02-02 | 2015-03-03 | Kazu Yanagihara | Authentication using transient event data |
US8424072B2 (en) | 2010-03-09 | 2013-04-16 | Microsoft Corporation | Behavior-based security system |
US8973113B1 (en) * | 2010-04-15 | 2015-03-03 | Crimson Corporation | Systems and methods for automatically resetting a password |
US9760566B2 (en) | 2011-03-31 | 2017-09-12 | Microsoft Technology Licensing, Llc | Augmented conversational understanding agent to identify conversation context between two humans and taking an agent action thereof |
US10642934B2 (en) | 2011-03-31 | 2020-05-05 | Microsoft Technology Licensing, Llc | Augmented conversational understanding architecture |
US9842168B2 (en) | 2011-03-31 | 2017-12-12 | Microsoft Technology Licensing, Llc | Task driven user intents |
US9244984B2 (en) | 2011-03-31 | 2016-01-26 | Microsoft Technology Licensing, Llc | Location based conversational understanding |
US9064006B2 (en) | 2012-08-23 | 2015-06-23 | Microsoft Technology Licensing, Llc | Translating natural language utterances to keyword search queries |
US9665854B1 (en) | 2011-06-16 | 2017-05-30 | Consumerinfo.Com, Inc. | Authentication alerts |
US9621350B2 (en) * | 2011-06-30 | 2017-04-11 | Cable Television Laboratories, Inc. | Personal authentication |
US9092491B2 (en) * | 2011-07-11 | 2015-07-28 | International Business Machines Corporation | Searching documentation across interconnected nodes in a distributed network |
US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
US8863243B1 (en) * | 2012-04-11 | 2014-10-14 | Google Inc. | Location-based access control for portable electronic device |
EP2880619A1 (en) | 2012-08-02 | 2015-06-10 | The 41st Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US9106721B2 (en) | 2012-10-02 | 2015-08-11 | Nextbit Systems | Application state synchronization across multiple devices |
US10057726B2 (en) | 2012-10-02 | 2018-08-21 | Razer (Asia-Pacific) Pte. Ltd. | Managing user data on an electronic device |
WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
US9015858B2 (en) * | 2012-11-30 | 2015-04-21 | nCrypted Cloud LLC | Graphical user interface for seamless secure private collaboration |
WO2014159905A1 (en) * | 2013-03-13 | 2014-10-02 | nCrypted Cloud LLC | Multi-identity for secure file sharing |
US9420002B1 (en) | 2013-03-14 | 2016-08-16 | Mark McGovern | Authorization server access system |
US9813285B1 (en) * | 2013-03-14 | 2017-11-07 | Ca, Inc. | Enterprise server access system |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
GB2513125A (en) * | 2013-04-15 | 2014-10-22 | Visa Europe Ltd | Method and system for transmitting credentials |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
DK3011713T3 (en) * | 2013-06-20 | 2018-08-13 | Censornet As | PROCEDURE AND SYSTEM FOR PROTECTION AGAINST IDENTI THEFT OR REPLICATION ABUSE |
US9386011B2 (en) | 2013-08-29 | 2016-07-05 | Aol Inc. | Systems and methods for managing resetting of user online identities or accounts |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US10105593B2 (en) | 2014-04-08 | 2018-10-23 | Razer (Asia-Pacific) Pte. Ltd. | File prefetching for gaming applications accessed by electronic devices |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US9356914B2 (en) | 2014-07-30 | 2016-05-31 | Gracenote, Inc. | Content-based association of device to user |
US10362136B2 (en) * | 2014-08-20 | 2019-07-23 | Visa International Service Association | Device profile data usage for state management in mobile device authentication |
US10185815B1 (en) * | 2014-08-24 | 2019-01-22 | AI Incorporated | Method for robotic devices to authenticate users |
US10762186B1 (en) | 2014-08-24 | 2020-09-01 | AI Incorporated | Method for robotic devices to authenticate users |
US10255429B2 (en) | 2014-10-03 | 2019-04-09 | Wells Fargo Bank, N.A. | Setting an authorization level at enrollment |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
CN109951436B (en) * | 2014-10-24 | 2021-04-27 | 创新先进技术有限公司 | Trusted terminal verification method and device |
US9736165B2 (en) * | 2015-05-29 | 2017-08-15 | At&T Intellectual Property I, L.P. | Centralized authentication for granting access to online services |
US10063557B2 (en) | 2015-06-07 | 2018-08-28 | Apple Inc. | Account access recovery system, method and apparatus |
US10110583B1 (en) | 2015-06-07 | 2018-10-23 | Apple Inc. | Selectively specifying account access recovery process based on account activity |
US9906511B1 (en) * | 2015-06-29 | 2018-02-27 | Bar-Ilan University | Secure impersonation detection |
US10698947B2 (en) | 2015-09-03 | 2020-06-30 | Dmd Marketing Lp | User identification and tracking system |
US10401831B2 (en) * | 2015-12-29 | 2019-09-03 | Flytech Technology Co., Ltd | POS system with life-percentage displaying and prompting function |
CN106027520B (en) * | 2016-05-19 | 2019-02-26 | 微梦创科网络科技(中国)有限公司 | A kind of detection processing steals the method and device of website account number |
US10275590B2 (en) | 2016-09-27 | 2019-04-30 | Bank Of America Corporation | Distributed trust as secondary authentication mechanism |
EP3343418B1 (en) | 2016-12-30 | 2021-02-03 | Google LLC | Electronic verification system using digital footprint |
US11076005B2 (en) * | 2017-06-09 | 2021-07-27 | DMD Marketing, LP | System and method for identifying and tagging users |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11310236B2 (en) | 2018-11-29 | 2022-04-19 | International Business Machines Corporation | Deriving confidence scores based on device sharing |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11818159B2 (en) | 2019-12-11 | 2023-11-14 | Target Brands, Inc. | Website guest risk assessment and mitigation |
US11562084B2 (en) * | 2019-12-19 | 2023-01-24 | Augustine Fou | System and method for secure, trustful internet interactions |
US11528144B1 (en) * | 2022-06-09 | 2022-12-13 | Uab 360 It | Optimized access in a service environment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
Family Cites Families (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5214702A (en) * | 1988-02-12 | 1993-05-25 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5414833A (en) * | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
US5825880A (en) * | 1994-01-13 | 1998-10-20 | Sudia; Frank W. | Multi-step digital signature method and system |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5721780A (en) * | 1995-05-31 | 1998-02-24 | Lucent Technologies, Inc. | User-transparent security method and apparatus for authenticating user terminal access to a network |
IL114361A (en) * | 1995-06-27 | 1998-08-16 | Veritas Technology Solutions L | File encryption method |
US5987134A (en) * | 1996-02-23 | 1999-11-16 | Fuji Xerox Co., Ltd. | Device and method for authenticating user's access rights to resources |
US5684951A (en) * | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system |
US6085320A (en) | 1996-05-15 | 2000-07-04 | Rsa Security Inc. | Client/server protocol for proving authenticity |
US5787177A (en) | 1996-08-01 | 1998-07-28 | Harris Corporation | Integrated network security access control system |
US5850443A (en) * | 1996-08-15 | 1998-12-15 | Entrust Technologies, Ltd. | Key management system for mixed-trust environments |
US5864665A (en) | 1996-08-20 | 1999-01-26 | International Business Machines Corporation | Auditing login activity in a distributed computing environment |
US5751812A (en) * | 1996-08-27 | 1998-05-12 | Bell Communications Research, Inc. | Re-initialization of an iterated hash function secure password system over an insecure network connection |
US6073241A (en) | 1996-08-29 | 2000-06-06 | C/Net, Inc. | Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state |
US5875296A (en) * | 1997-01-28 | 1999-02-23 | International Business Machines Corporation | Distributed file system web server user authentication with cookies |
WO1998051029A1 (en) | 1997-05-07 | 1998-11-12 | Southwestern Bell Telephone Company | Apparatus and method for customized secondary access authentication |
US6081893A (en) | 1997-05-28 | 2000-06-27 | Symantec Corporation | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record |
US6070243A (en) * | 1997-06-13 | 2000-05-30 | Xylan Corporation | Deterministic user authentication service for communication network |
US20010056405A1 (en) * | 1997-09-11 | 2001-12-27 | Muyres Matthew R. | Behavior tracking and user profiling system |
US6141759A (en) * | 1997-12-10 | 2000-10-31 | Bmc Software, Inc. | System and architecture for distributing, monitoring, and managing information requests on a computer network |
US6263446B1 (en) | 1997-12-23 | 2001-07-17 | Arcot Systems, Inc. | Method and apparatus for secure distribution of authentication credentials to roaming users |
US6205479B1 (en) * | 1998-04-14 | 2001-03-20 | Juno Online Services, Inc. | Two-tier authentication system where clients first authenticate with independent service providers and then automatically exchange messages with a client controller to gain network access |
US6199113B1 (en) * | 1998-04-15 | 2001-03-06 | Sun Microsystems, Inc. | Apparatus and method for providing trusted network security |
US6334121B1 (en) * | 1998-05-04 | 2001-12-25 | Virginia Commonwealth University | Usage pattern based user authenticator |
US6308273B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Method and system of security location discrimination |
SE512672C2 (en) | 1998-06-12 | 2000-04-17 | Ericsson Telefon Ab L M | Procedure and system for transferring a cookie |
US6308274B1 (en) * | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Least privilege via restricted tokens |
EP1086560A1 (en) | 1998-06-19 | 2001-03-28 | Netsafe, Inc. | Method and apparatus for providing connections over a network |
AU5129599A (en) | 1998-07-27 | 2000-02-21 | Veritel Corporation | System of accessing crypted data using user authentication |
DE69940952D1 (en) | 1998-08-31 | 2009-07-16 | Yu Long | GENE OF A HUMAN LYSOCYM, OF WHICH CODED P |
US6327652B1 (en) * | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
US6985953B1 (en) * | 1998-11-30 | 2006-01-10 | George Mason University | System and apparatus for storage and transfer of secure data on web |
US6343280B2 (en) * | 1998-12-15 | 2002-01-29 | Jonathan Clark | Distributed execution software license server |
US6349338B1 (en) * | 1999-03-02 | 2002-02-19 | International Business Machines Corporation | Trust negotiation in a client/server data processing network using automatic incremental credential disclosure |
TW421948B (en) * | 1999-03-19 | 2001-02-11 | Winbond Electronics Corp | Clock generation method for universal asynchronous receiver-transmitter |
US6421768B1 (en) * | 1999-05-04 | 2002-07-16 | First Data Corporation | Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment |
US6678731B1 (en) * | 1999-07-08 | 2004-01-13 | Microsoft Corporation | Controlling access to a network server using an authentication ticket |
US6691232B1 (en) * | 1999-08-05 | 2004-02-10 | Sun Microsystems, Inc. | Security architecture with environment sensitive credential sufficiency evaluation |
US6640238B1 (en) * | 1999-08-31 | 2003-10-28 | Accenture Llp | Activity component in a presentation services patterns environment |
US6351817B1 (en) * | 1999-10-27 | 2002-02-26 | Terence T. Flyntz | Multi-level secure computer with token-based access control |
WO2001038999A1 (en) | 1999-11-23 | 2001-05-31 | Escom Corporation | Electronic message filter having a whitelist database and a quarantining mechanism |
US6734886B1 (en) * | 1999-12-21 | 2004-05-11 | Personalpath Systems, Inc. | Method of customizing a browsing experience on a world-wide-web site |
JP2003529254A (en) * | 2000-03-27 | 2003-09-30 | ネットワーク セキュリティー システムズ, インコーポレーテッド | Internet / network security method and system for checking customer security from a remote device |
US7174454B2 (en) | 2002-11-19 | 2007-02-06 | America Online, Inc. | System and method for establishing historical usage-based hardware trust |
JP2004510215A (en) | 2000-05-19 | 2004-04-02 | ネットスケープ コミュニケーションズ コーポレーション | Adaptable multi-tier authentication system |
AU780201B2 (en) * | 2000-10-11 | 2005-03-10 | Trustcopy Pte Ltd. | Remote printing of secure and/or authenticated documents |
US7197565B2 (en) * | 2001-01-22 | 2007-03-27 | Sun Microsystems, Inc. | System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection |
US7168093B2 (en) * | 2001-01-25 | 2007-01-23 | Solutionary, Inc. | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
US6658091B1 (en) * | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US8204992B2 (en) * | 2002-09-26 | 2012-06-19 | Oracle America, Inc. | Presence detection using distributed indexes in peer-to-peer networks |
US7206934B2 (en) * | 2002-09-26 | 2007-04-17 | Sun Microsystems, Inc. | Distributed indexing of identity information in a peer-to-peer network |
US7213047B2 (en) * | 2002-10-31 | 2007-05-01 | Sun Microsystems, Inc. | Peer trust evaluation using mobile agents in peer-to-peer networks |
US8108455B2 (en) * | 2002-10-31 | 2012-01-31 | Oracle America, Inc. | Mobile agents in peer-to-peer networks |
US8600804B2 (en) | 2002-11-07 | 2013-12-03 | Novitaz, Inc. | Customer relationship management system for physical locations |
US20050132060A1 (en) * | 2003-12-15 | 2005-06-16 | Richard Mo | Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks |
WO2005069823A2 (en) | 2004-01-15 | 2005-08-04 | Jun Song | Centralized transactional security audit for enterprise systems |
US20050188222A1 (en) * | 2004-02-24 | 2005-08-25 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user login activity for a server application |
US7373524B2 (en) * | 2004-02-24 | 2008-05-13 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user behavior for a server application |
US20050188079A1 (en) * | 2004-02-24 | 2005-08-25 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring usage of a server application |
US20050198099A1 (en) * | 2004-02-24 | 2005-09-08 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring protocol responses for a server application |
US20050187934A1 (en) * | 2004-02-24 | 2005-08-25 | Covelight Systems, Inc. | Methods, systems and computer program products for geography and time monitoring of a server application user |
US20050188080A1 (en) * | 2004-02-24 | 2005-08-25 | Covelight Systems, Inc. | Methods, systems and computer program products for monitoring user access for a server application |
US7853456B2 (en) * | 2004-03-05 | 2010-12-14 | Health Outcomes Sciences, Llc | Systems and methods for risk stratification of patient populations |
-
2003
- 2003-06-18 US US10/465,163 patent/US7174454B2/en not_active Expired - Lifetime
-
2004
- 2004-06-17 WO PCT/US2004/019492 patent/WO2004114082A2/en active Application Filing
-
2006
- 2006-12-22 US US11/615,858 patent/US7849307B2/en not_active Expired - Fee Related
-
2010
- 2010-12-03 US US12/960,326 patent/US8181015B2/en not_active Expired - Fee Related
-
2012
- 2012-05-09 US US13/467,901 patent/US8612747B2/en not_active Expired - Fee Related
-
2013
- 2013-10-10 US US14/051,221 patent/US8954730B2/en not_active Expired - Fee Related
-
2015
- 2015-01-13 US US14/596,130 patent/US9397996B2/en not_active Expired - Lifetime
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6668322B1 (en) * | 1999-08-05 | 2003-12-23 | Sun Microsystems, Inc. | Access management system and method employing secure credentials |
Also Published As
Publication number | Publication date |
---|---|
US20120222105A1 (en) | 2012-08-30 |
US8954730B2 (en) | 2015-02-10 |
WO2004114082A2 (en) | 2004-12-29 |
US7849307B2 (en) | 2010-12-07 |
US20150128235A1 (en) | 2015-05-07 |
US8181015B2 (en) | 2012-05-15 |
US20040199770A1 (en) | 2004-10-07 |
US20070118887A1 (en) | 2007-05-24 |
US20110078765A1 (en) | 2011-03-31 |
US7174454B2 (en) | 2007-02-06 |
US20140041008A1 (en) | 2014-02-06 |
US8612747B2 (en) | 2013-12-17 |
US9397996B2 (en) | 2016-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004114082A3 (en) | System and method for establishing historical usage-based hardware trust | |
Neuman et al. | Kerberos: An authentication service for computer networks | |
WO2007040730A3 (en) | Methods and systems for using data processing systems in order to authenticate parties | |
US7757275B2 (en) | One time password integration with Kerberos | |
WO2006099081A3 (en) | Method and system for managing account information | |
WO2001022322A3 (en) | Electronic commerce with cryptographic authentication | |
WO2003001324A3 (en) | Authorization services with external authentication | |
WO2001077792A3 (en) | System and method for authenticating a user | |
WO2001067202A3 (en) | Authentication technique for electronic transactions | |
US20030152254A1 (en) | User authenticating system and method using one-time fingerprint template | |
EP1361497A3 (en) | Contents distribution scheme using tamper-resistant processor | |
WO2004046849A3 (en) | Cryptographic methods and apparatus for secure authentication | |
CA2287857A1 (en) | Biometric certificates | |
WO2000030285A8 (en) | Method and apparatus for secure distribution of authentication credentials to roaming users | |
WO1999060750A3 (en) | Preventing unauthorized use of service | |
TWI256227B (en) | Device, system and method to manage security credentials in a protected computer network domain | |
EP1442555A2 (en) | Multi-factor authentication system | |
US9178880B1 (en) | Gateway mediated mobile device authentication | |
US20170339163A1 (en) | System and method for remote authentication with dynamic usernames | |
CA2552987A1 (en) | Security system and method | |
Boonkrong | Internet banking login with multi-factor authentication | |
NO20012463L (en) | Procedure and apparatus for securely distributing authentication credentials to roaming users | |
KR20140046674A (en) | Digital certificate system for cloud-computing environment and providing method thereof | |
Ahmad et al. | Trusted Computing based open environment user authentication model | |
Pulko et al. | USER AUTHENTICATION IN INFORMATION SYSTEMS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
122 | Ep: pct application non-entry in european phase |