WO2004114082A3 - System and method for establishing historical usage-based hardware trust - Google Patents

System and method for establishing historical usage-based hardware trust Download PDF

Info

Publication number
WO2004114082A3
WO2004114082A3 PCT/US2004/019492 US2004019492W WO2004114082A3 WO 2004114082 A3 WO2004114082 A3 WO 2004114082A3 US 2004019492 W US2004019492 W US 2004019492W WO 2004114082 A3 WO2004114082 A3 WO 2004114082A3
Authority
WO
WIPO (PCT)
Prior art keywords
usage history
client device
trust
user
authentication
Prior art date
Application number
PCT/US2004/019492
Other languages
French (fr)
Other versions
WO2004114082A2 (en
Inventor
James A Roskind
Original Assignee
America Online Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by America Online Inc filed Critical America Online Inc
Publication of WO2004114082A2 publication Critical patent/WO2004114082A2/en
Publication of WO2004114082A3 publication Critical patent/WO2004114082A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords.
PCT/US2004/019492 2003-06-18 2004-06-17 System and method for establishing historical usage-based hardware trust WO2004114082A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/465,163 2003-06-18
US10/465,163 US7174454B2 (en) 2002-11-19 2003-06-18 System and method for establishing historical usage-based hardware trust

Publications (2)

Publication Number Publication Date
WO2004114082A2 WO2004114082A2 (en) 2004-12-29
WO2004114082A3 true WO2004114082A3 (en) 2005-06-23

Family

ID=33539012

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/019492 WO2004114082A2 (en) 2003-06-18 2004-06-17 System and method for establishing historical usage-based hardware trust

Country Status (2)

Country Link
US (6) US7174454B2 (en)
WO (1) WO2004114082A2 (en)

Families Citing this family (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004510215A (en) 2000-05-19 2004-04-02 ネットスケープ コミュニケーションズ コーポレーション Adaptable multi-tier authentication system
US7174454B2 (en) 2002-11-19 2007-02-06 America Online, Inc. System and method for establishing historical usage-based hardware trust
US20020141586A1 (en) * 2001-03-29 2002-10-03 Aladdin Knowledge Systems Ltd. Authentication employing the bluetooth communication protocol
US8473355B2 (en) * 2002-12-06 2013-06-25 Facebook, Inc. System and method for electronic wallet conversion
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
JP4039632B2 (en) * 2003-08-14 2008-01-30 インターナショナル・ビジネス・マシーンズ・コーポレーション Authentication system, server, authentication method and program
US20050177724A1 (en) * 2004-01-16 2005-08-11 Valiuddin Ali Authentication system and method
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US20060041507A1 (en) * 2004-08-13 2006-02-23 Sbc Knowledge Ventures L.P. Pluggable authentication for transaction tool management services
US8006288B2 (en) * 2004-11-05 2011-08-23 International Business Machines Corporation Method and apparatus for accessing a computer application program
US20060230279A1 (en) * 2005-03-30 2006-10-12 Morris Robert P Methods, systems, and computer program products for establishing trusted access to a communication network
US8726344B1 (en) * 2005-11-30 2014-05-13 Qurio Holdings, Inc. Methods, systems, and products for measuring trust scores of devices
US20070136792A1 (en) * 2005-12-05 2007-06-14 Ting David M Accelerating biometric login procedures
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
WO2007093813A1 (en) * 2006-02-16 2007-08-23 Weeworld Limited Portable account information
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
JP4096983B2 (en) * 2006-05-01 2008-06-04 コニカミノルタビジネステクノロジーズ株式会社 Data transmission apparatus, destination setting method in the same apparatus, and destination setting processing program
US20120005729A1 (en) * 2006-11-30 2012-01-05 Ofer Amitai System and method of network authorization by scoring
US20080172715A1 (en) * 2007-01-12 2008-07-17 Microsoft Corporation Scalable context-based authentication
US8677479B2 (en) * 2007-04-16 2014-03-18 Microsoft Corporation Detection of adversaries through collection and correlation of assessments
US7953969B2 (en) * 2007-04-16 2011-05-31 Microsoft Corporation Reduction of false positive reputations through collection of overrides from customer deployments
US8769639B2 (en) * 2007-09-04 2014-07-01 Microsoft Corporation History-based downgraded network identification
US8893284B2 (en) * 2007-10-03 2014-11-18 Motorola Mobility Llc Method and system for providing extended authentication
US8606746B2 (en) * 2007-10-19 2013-12-10 Oracle International Corporation Privacy management policy hub
US9349127B2 (en) * 2007-11-29 2016-05-24 Visa Usa Inc. Serial number and payment data based payment card processing
US8396799B2 (en) * 2007-11-29 2013-03-12 Visa U.S.A. Inc. Media device payments remote control personalization and protection
US8001582B2 (en) 2008-01-18 2011-08-16 Microsoft Corporation Cross-network reputation for online services
US7925516B2 (en) * 2008-03-14 2011-04-12 Microsoft Corporation Leveraging global reputation to increase personalization
US20090271606A1 (en) * 2008-04-28 2009-10-29 Kabushiki Kaisha Toshiba Information processing device and information processing system
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9112702B2 (en) 2009-04-29 2015-08-18 Microsoft Technology Licensing, Llc Alternate authentication
US20100306821A1 (en) * 2009-05-29 2010-12-02 Google, Inc. Account-recovery technique
EP2499807A4 (en) * 2009-12-29 2014-05-07 Nokia Corp An apparatus, method, computer program and user interface
US9729930B2 (en) * 2010-01-05 2017-08-08 CSC Holdings, LLC Enhanced subscriber authentication using location tracking
US8973154B2 (en) * 2010-02-02 2015-03-03 Kazu Yanagihara Authentication using transient event data
US8424072B2 (en) 2010-03-09 2013-04-16 Microsoft Corporation Behavior-based security system
US8973113B1 (en) * 2010-04-15 2015-03-03 Crimson Corporation Systems and methods for automatically resetting a password
US9760566B2 (en) 2011-03-31 2017-09-12 Microsoft Technology Licensing, Llc Augmented conversational understanding agent to identify conversation context between two humans and taking an agent action thereof
US10642934B2 (en) 2011-03-31 2020-05-05 Microsoft Technology Licensing, Llc Augmented conversational understanding architecture
US9842168B2 (en) 2011-03-31 2017-12-12 Microsoft Technology Licensing, Llc Task driven user intents
US9244984B2 (en) 2011-03-31 2016-01-26 Microsoft Technology Licensing, Llc Location based conversational understanding
US9064006B2 (en) 2012-08-23 2015-06-23 Microsoft Technology Licensing, Llc Translating natural language utterances to keyword search queries
US9665854B1 (en) 2011-06-16 2017-05-30 Consumerinfo.Com, Inc. Authentication alerts
US9621350B2 (en) * 2011-06-30 2017-04-11 Cable Television Laboratories, Inc. Personal authentication
US9092491B2 (en) * 2011-07-11 2015-07-28 International Business Machines Corporation Searching documentation across interconnected nodes in a distributed network
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
US8863243B1 (en) * 2012-04-11 2014-10-14 Google Inc. Location-based access control for portable electronic device
EP2880619A1 (en) 2012-08-02 2015-06-10 The 41st Parameter, Inc. Systems and methods for accessing records via derivative locators
US9106721B2 (en) 2012-10-02 2015-08-11 Nextbit Systems Application state synchronization across multiple devices
US10057726B2 (en) 2012-10-02 2018-08-21 Razer (Asia-Pacific) Pte. Ltd. Managing user data on an electronic device
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US9015858B2 (en) * 2012-11-30 2015-04-21 nCrypted Cloud LLC Graphical user interface for seamless secure private collaboration
WO2014159905A1 (en) * 2013-03-13 2014-10-02 nCrypted Cloud LLC Multi-identity for secure file sharing
US9420002B1 (en) 2013-03-14 2016-08-16 Mark McGovern Authorization server access system
US9813285B1 (en) * 2013-03-14 2017-11-07 Ca, Inc. Enterprise server access system
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
GB2513125A (en) * 2013-04-15 2014-10-22 Visa Europe Ltd Method and system for transmitting credentials
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
DK3011713T3 (en) * 2013-06-20 2018-08-13 Censornet As PROCEDURE AND SYSTEM FOR PROTECTION AGAINST IDENTI THEFT OR REPLICATION ABUSE
US9386011B2 (en) 2013-08-29 2016-07-05 Aol Inc. Systems and methods for managing resetting of user online identities or accounts
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US10105593B2 (en) 2014-04-08 2018-10-23 Razer (Asia-Pacific) Pte. Ltd. File prefetching for gaming applications accessed by electronic devices
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
US9356914B2 (en) 2014-07-30 2016-05-31 Gracenote, Inc. Content-based association of device to user
US10362136B2 (en) * 2014-08-20 2019-07-23 Visa International Service Association Device profile data usage for state management in mobile device authentication
US10185815B1 (en) * 2014-08-24 2019-01-22 AI Incorporated Method for robotic devices to authenticate users
US10762186B1 (en) 2014-08-24 2020-09-01 AI Incorporated Method for robotic devices to authenticate users
US10255429B2 (en) 2014-10-03 2019-04-09 Wells Fargo Bank, N.A. Setting an authorization level at enrollment
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
CN109951436B (en) * 2014-10-24 2021-04-27 创新先进技术有限公司 Trusted terminal verification method and device
US9736165B2 (en) * 2015-05-29 2017-08-15 At&T Intellectual Property I, L.P. Centralized authentication for granting access to online services
US10063557B2 (en) 2015-06-07 2018-08-28 Apple Inc. Account access recovery system, method and apparatus
US10110583B1 (en) 2015-06-07 2018-10-23 Apple Inc. Selectively specifying account access recovery process based on account activity
US9906511B1 (en) * 2015-06-29 2018-02-27 Bar-Ilan University Secure impersonation detection
US10698947B2 (en) 2015-09-03 2020-06-30 Dmd Marketing Lp User identification and tracking system
US10401831B2 (en) * 2015-12-29 2019-09-03 Flytech Technology Co., Ltd POS system with life-percentage displaying and prompting function
CN106027520B (en) * 2016-05-19 2019-02-26 微梦创科网络科技(中国)有限公司 A kind of detection processing steals the method and device of website account number
US10275590B2 (en) 2016-09-27 2019-04-30 Bank Of America Corporation Distributed trust as secondary authentication mechanism
EP3343418B1 (en) 2016-12-30 2021-02-03 Google LLC Electronic verification system using digital footprint
US11076005B2 (en) * 2017-06-09 2021-07-27 DMD Marketing, LP System and method for identifying and tagging users
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US11310236B2 (en) 2018-11-29 2022-04-19 International Business Machines Corporation Deriving confidence scores based on device sharing
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11818159B2 (en) 2019-12-11 2023-11-14 Target Brands, Inc. Website guest risk assessment and mitigation
US11562084B2 (en) * 2019-12-19 2023-01-24 Augustine Fou System and method for secure, trustful internet interactions
US11528144B1 (en) * 2022-06-09 2022-12-13 Uab 360 It Optimized access in a service environment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6668322B1 (en) * 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials

Family Cites Families (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5214702A (en) * 1988-02-12 1993-05-25 Fischer Addison M Public key/signature cryptosystem with enhanced digital signature certification
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5825880A (en) * 1994-01-13 1998-10-20 Sudia; Frank W. Multi-step digital signature method and system
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5721780A (en) * 1995-05-31 1998-02-24 Lucent Technologies, Inc. User-transparent security method and apparatus for authenticating user terminal access to a network
IL114361A (en) * 1995-06-27 1998-08-16 Veritas Technology Solutions L File encryption method
US5987134A (en) * 1996-02-23 1999-11-16 Fuji Xerox Co., Ltd. Device and method for authenticating user's access rights to resources
US5684951A (en) * 1996-03-20 1997-11-04 Synopsys, Inc. Method and system for user authorization over a multi-user computer system
US6085320A (en) 1996-05-15 2000-07-04 Rsa Security Inc. Client/server protocol for proving authenticity
US5787177A (en) 1996-08-01 1998-07-28 Harris Corporation Integrated network security access control system
US5850443A (en) * 1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments
US5864665A (en) 1996-08-20 1999-01-26 International Business Machines Corporation Auditing login activity in a distributed computing environment
US5751812A (en) * 1996-08-27 1998-05-12 Bell Communications Research, Inc. Re-initialization of an iterated hash function secure password system over an insecure network connection
US6073241A (en) 1996-08-29 2000-06-06 C/Net, Inc. Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
WO1998051029A1 (en) 1997-05-07 1998-11-12 Southwestern Bell Telephone Company Apparatus and method for customized secondary access authentication
US6081893A (en) 1997-05-28 2000-06-27 Symantec Corporation System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
US6070243A (en) * 1997-06-13 2000-05-30 Xylan Corporation Deterministic user authentication service for communication network
US20010056405A1 (en) * 1997-09-11 2001-12-27 Muyres Matthew R. Behavior tracking and user profiling system
US6141759A (en) * 1997-12-10 2000-10-31 Bmc Software, Inc. System and architecture for distributing, monitoring, and managing information requests on a computer network
US6263446B1 (en) 1997-12-23 2001-07-17 Arcot Systems, Inc. Method and apparatus for secure distribution of authentication credentials to roaming users
US6205479B1 (en) * 1998-04-14 2001-03-20 Juno Online Services, Inc. Two-tier authentication system where clients first authenticate with independent service providers and then automatically exchange messages with a client controller to gain network access
US6199113B1 (en) * 1998-04-15 2001-03-06 Sun Microsystems, Inc. Apparatus and method for providing trusted network security
US6334121B1 (en) * 1998-05-04 2001-12-25 Virginia Commonwealth University Usage pattern based user authenticator
US6308273B1 (en) 1998-06-12 2001-10-23 Microsoft Corporation Method and system of security location discrimination
SE512672C2 (en) 1998-06-12 2000-04-17 Ericsson Telefon Ab L M Procedure and system for transferring a cookie
US6308274B1 (en) * 1998-06-12 2001-10-23 Microsoft Corporation Least privilege via restricted tokens
EP1086560A1 (en) 1998-06-19 2001-03-28 Netsafe, Inc. Method and apparatus for providing connections over a network
AU5129599A (en) 1998-07-27 2000-02-21 Veritel Corporation System of accessing crypted data using user authentication
DE69940952D1 (en) 1998-08-31 2009-07-16 Yu Long GENE OF A HUMAN LYSOCYM, OF WHICH CODED P
US6327652B1 (en) * 1998-10-26 2001-12-04 Microsoft Corporation Loading and identifying a digital rights management operating system
US6985953B1 (en) * 1998-11-30 2006-01-10 George Mason University System and apparatus for storage and transfer of secure data on web
US6343280B2 (en) * 1998-12-15 2002-01-29 Jonathan Clark Distributed execution software license server
US6349338B1 (en) * 1999-03-02 2002-02-19 International Business Machines Corporation Trust negotiation in a client/server data processing network using automatic incremental credential disclosure
TW421948B (en) * 1999-03-19 2001-02-11 Winbond Electronics Corp Clock generation method for universal asynchronous receiver-transmitter
US6421768B1 (en) * 1999-05-04 2002-07-16 First Data Corporation Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment
US6678731B1 (en) * 1999-07-08 2004-01-13 Microsoft Corporation Controlling access to a network server using an authentication ticket
US6691232B1 (en) * 1999-08-05 2004-02-10 Sun Microsystems, Inc. Security architecture with environment sensitive credential sufficiency evaluation
US6640238B1 (en) * 1999-08-31 2003-10-28 Accenture Llp Activity component in a presentation services patterns environment
US6351817B1 (en) * 1999-10-27 2002-02-26 Terence T. Flyntz Multi-level secure computer with token-based access control
WO2001038999A1 (en) 1999-11-23 2001-05-31 Escom Corporation Electronic message filter having a whitelist database and a quarantining mechanism
US6734886B1 (en) * 1999-12-21 2004-05-11 Personalpath Systems, Inc. Method of customizing a browsing experience on a world-wide-web site
JP2003529254A (en) * 2000-03-27 2003-09-30 ネットワーク セキュリティー システムズ, インコーポレーテッド Internet / network security method and system for checking customer security from a remote device
US7174454B2 (en) 2002-11-19 2007-02-06 America Online, Inc. System and method for establishing historical usage-based hardware trust
JP2004510215A (en) 2000-05-19 2004-04-02 ネットスケープ コミュニケーションズ コーポレーション Adaptable multi-tier authentication system
AU780201B2 (en) * 2000-10-11 2005-03-10 Trustcopy Pte Ltd. Remote printing of secure and/or authenticated documents
US7197565B2 (en) * 2001-01-22 2007-03-27 Sun Microsystems, Inc. System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection
US7168093B2 (en) * 2001-01-25 2007-01-23 Solutionary, Inc. Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
US6658091B1 (en) * 2002-02-01 2003-12-02 @Security Broadband Corp. LIfestyle multimedia security system
US8204992B2 (en) * 2002-09-26 2012-06-19 Oracle America, Inc. Presence detection using distributed indexes in peer-to-peer networks
US7206934B2 (en) * 2002-09-26 2007-04-17 Sun Microsystems, Inc. Distributed indexing of identity information in a peer-to-peer network
US7213047B2 (en) * 2002-10-31 2007-05-01 Sun Microsystems, Inc. Peer trust evaluation using mobile agents in peer-to-peer networks
US8108455B2 (en) * 2002-10-31 2012-01-31 Oracle America, Inc. Mobile agents in peer-to-peer networks
US8600804B2 (en) 2002-11-07 2013-12-03 Novitaz, Inc. Customer relationship management system for physical locations
US20050132060A1 (en) * 2003-12-15 2005-06-16 Richard Mo Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks
WO2005069823A2 (en) 2004-01-15 2005-08-04 Jun Song Centralized transactional security audit for enterprise systems
US20050188222A1 (en) * 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring user login activity for a server application
US7373524B2 (en) * 2004-02-24 2008-05-13 Covelight Systems, Inc. Methods, systems and computer program products for monitoring user behavior for a server application
US20050188079A1 (en) * 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring usage of a server application
US20050198099A1 (en) * 2004-02-24 2005-09-08 Covelight Systems, Inc. Methods, systems and computer program products for monitoring protocol responses for a server application
US20050187934A1 (en) * 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for geography and time monitoring of a server application user
US20050188080A1 (en) * 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring user access for a server application
US7853456B2 (en) * 2004-03-05 2010-12-14 Health Outcomes Sciences, Llc Systems and methods for risk stratification of patient populations

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6668322B1 (en) * 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials

Also Published As

Publication number Publication date
US20120222105A1 (en) 2012-08-30
US8954730B2 (en) 2015-02-10
WO2004114082A2 (en) 2004-12-29
US7849307B2 (en) 2010-12-07
US20150128235A1 (en) 2015-05-07
US8181015B2 (en) 2012-05-15
US20040199770A1 (en) 2004-10-07
US20070118887A1 (en) 2007-05-24
US20110078765A1 (en) 2011-03-31
US7174454B2 (en) 2007-02-06
US20140041008A1 (en) 2014-02-06
US8612747B2 (en) 2013-12-17
US9397996B2 (en) 2016-07-19

Similar Documents

Publication Publication Date Title
WO2004114082A3 (en) System and method for establishing historical usage-based hardware trust
Neuman et al. Kerberos: An authentication service for computer networks
WO2007040730A3 (en) Methods and systems for using data processing systems in order to authenticate parties
US7757275B2 (en) One time password integration with Kerberos
WO2006099081A3 (en) Method and system for managing account information
WO2001022322A3 (en) Electronic commerce with cryptographic authentication
WO2003001324A3 (en) Authorization services with external authentication
WO2001077792A3 (en) System and method for authenticating a user
WO2001067202A3 (en) Authentication technique for electronic transactions
US20030152254A1 (en) User authenticating system and method using one-time fingerprint template
EP1361497A3 (en) Contents distribution scheme using tamper-resistant processor
WO2004046849A3 (en) Cryptographic methods and apparatus for secure authentication
CA2287857A1 (en) Biometric certificates
WO2000030285A8 (en) Method and apparatus for secure distribution of authentication credentials to roaming users
WO1999060750A3 (en) Preventing unauthorized use of service
TWI256227B (en) Device, system and method to manage security credentials in a protected computer network domain
EP1442555A2 (en) Multi-factor authentication system
US9178880B1 (en) Gateway mediated mobile device authentication
US20170339163A1 (en) System and method for remote authentication with dynamic usernames
CA2552987A1 (en) Security system and method
Boonkrong Internet banking login with multi-factor authentication
NO20012463L (en) Procedure and apparatus for securely distributing authentication credentials to roaming users
KR20140046674A (en) Digital certificate system for cloud-computing environment and providing method thereof
Ahmad et al. Trusted Computing based open environment user authentication model
Pulko et al. USER AUTHENTICATION IN INFORMATION SYSTEMS

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase