$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Plurality-factor security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
출원번호 US-0831854 (1997-04-02)
발명자 / 주소
  • Moussa Mohamed A.
  • Chan Chih S.
출원인 / 주소
  • Quintet, Inc.
대리인 / 주소
    Swernofsky Law Group
인용정보 피인용 횟수 : 144  인용 특허 : 30

초록

The invention provides a method and system for simultaneously authenticating a user using two or more factors, such as both a password and a physical token or both a password and biometric information. The user presents a physical token including a storage device to a processor and attempts to log i

대표청구항

[ We claim:] [1.] A method for operating a processor to simultaneously authentic a user using a plurality of factors, said method including the steps ofexecuting an operating system on said processor;generating an authentication number N;generating a data block for a physical token;writing said data

이 특허에 인용된 특허 (30)

  1. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  2. Tabuki Takaaki,JPX, Authentication method for networks.
  3. Tabuki Takaaki,JPX, Authentication method for networks.
  4. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  5. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  6. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  7. Veneklase Brian J., Computer security system.
  8. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Connection authorizer for controlling access to system resources.
  9. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Counterfeit-proof identification card.
  10. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  11. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  12. Dauerer Norman J. (Hopewell Junction NY) Kelley Edward E. (Wappingers Falls NY), Front end for file access controller.
  13. Lu Daozheng (1903 Dunloe Cir. Dunedin FL 34698) Lu Simon W. (525 S. Berendo St. #303 Los Angeles CA 90020), Identification card verification system.
  14. Marckini Eugene F., Identification card with delimited usage.
  15. Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication.
  16. Hann J. David (Vienna VA) Holdahl Theodore S. (Bethesda MD) Lum James C. P. (Herndon VA), Method and apparatus for enhancing security of communications in a packet-switched data communications system.
  17. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  18. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  19. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  20. Servi Leslie D. (Lincoln MA), Method of verifying identification.
  21. Kung Kenneth C. (Cerritos CA), One-time logon means and methods for distributed computing systems.
  22. Bonneau ; Jr. Walter C. (Missouri City TX), Personal identification.
  23. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  24. Wu Tajen R. ; Shannon William A. ; Fronberg Paul ; Stephenson Donald R. ; Samar Vipin, Pluggable account management interface with unified login and logout and multiple user authentication services.
  25. Kristol David M. ; O'Gorman Lawrence P., Self-verifying identification card.
  26. Lee David K. ; Riley David W. ; Ryan ; Jr. Frederick W., System and method for managing multiple users with different privileges in an open metering system.
  27. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  28. Matyas Stephen M. (Kingston NY), Technique for reducing RSA Crypto variable storage.
  29. Elliott, John C.; O'Connell, James A.; Ladouceur, Lawrence; Altman, William; Jarett, Keith, Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device.
  30. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.

이 특허를 인용한 특허 (144)

  1. Fillinger,Charles A.; O'Sullivan,Barry, ATM machine and methods with currency conversion capabilities.
  2. Fillinger,Charles A.; O'Sullivan,Barry, ATM machine and methods with currency conversion capabilities.
  3. Fish, Howard; Sterling, Jake, ATM system for receiving cash deposits from non-networked clients.
  4. Scheidt,Edward M.; Domanque,Ersin; Butler,Roger; Tsang,Wai, Access system utilizing multiple factor identification and authentication.
  5. Rinkevich,Debora; Garrison,John Michael, Aggregated authenticated identity apparatus for and method therefor.
  6. Blair, Paul; Hansen, Kurt L.; Seifert, Dean, Airline ticket payment and reservation system and methods.
  7. Blair,Paul; Hansen,Kurt L.; Seifert,Dean, Airline ticket payment and reservation system and methods.
  8. Baird, III, Leemon C.; Harmon, Mance E.; Young, R. Reed; Armstrong, Jr., James E., Apparatus and method for authenticating access to a network resource.
  9. Baird, III, Leemon C.; Harmon, Mance E.; Young, R. Reed; Armstrong, Jr., James E., Apparatus and method for authenticating access to a network resource.
  10. Hagiwara, Mikio; Itoh, Kishiko; Oka, Kenji; Hino, Akira; Obinata, Masaki, Associating biometric information with passwords.
  11. Hinoue, Sadahiko; Harada, Kouichi, Authentication apparatus using a display/fingerprint reader.
  12. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  13. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  14. Dholakia, Mehul; Talmor, Ron, Authentication techniques.
  15. Neofytides,Cheryl L.; Baig,Aamer Ali; Karas,Peter M.; Cowell,James E.; Yoder,James R.; Golub,Matt F., Automated group payment.
  16. Algiene, Kenneth; Abelman, Henry M.; Karas, Peter M., Automated transfer with stored value.
  17. Tomita, Hiroshi, Barcode and decreased-resolution reproduction of a document image.
  18. Tomita, Hiroshi, Barcode for two-way verification of a document.
  19. Mozer,Todd F., Biometric client-server security system and method.
  20. Mascavage, III, John Joseph; Dravenstott, Robert Edwin; Vega, Joris, Buttons for person to person payments.
  21. Hansen, Kurt; Stoutenburg, Earney E.; Saylor, Thomas B., Cash payment for remote transactions.
  22. Hansen, Kurt; Stoutenburg, Earney E.; Sayor, Thomas B., Cash payment for remote transactions.
  23. Hansen, Kurt; Stoutenburg, Earney E.; Sayor, Thomas B., Cash payment for remote transactions.
  24. Bhagavatula, Ravishankar S.; Balasubramanian, Chandra S.; Sherwin, Francis M.; Keresman, III, Michael A.; Bowman, Jeffry J., Centralized identity authentication for electronic communication networks.
  25. Bhagavatula, Ravishankar S.; Balasubramanian, Chandra; Sherwin, Francis M.; Keresman, III, Michael A.; Bowman, Jeffry J., Centralized identity authentication for electronic communication networks.
  26. Bhagavatula, Ravishankar S.; Balasubramanian, Chandra; Sherwin, Francis M.; Keresman, III, Michael A.; Bowman, Jeffry J., Centralized identity authentication for electronic communication networks.
  27. Bhagavatula, Ravishankar S.; Balasubramanian, Chandra; Sherwin, Francis M.; Keresman, III, Michael A.; Bowman, Jeffry J., Centralized identity authentication for electronic communication networks.
  28. Bhagavatula, Ravishankar S.; Balasubramanian, Chandra; Sherwin, Francis M.; Keresman, III, Michael A.; Bowman, Jeffry J., Centralized identity authentication for electronic communication networks.
  29. Bhagavatula, Ravishankar S.; Balasubramanian, Chandra; Sherwin, Francis M.; Keresman, III, Michael A.; Bowman, Jeffry J., Centralized identity authentication for electronic communication networks.
  30. Bhagavatula,Ravishankar S.; Balasubramanian,Chandra S.; Sherwin,Francis M.; Keresman, III,Michael A.; Bowman,Jeffry J., Centralized identity authentication for electronic communication networks.
  31. Ming, Wei; Tomita, Hiroshi, Color barcode producing method and apparatus, color barcode reading method and apparatus and color barcode reproducing method and apparatus.
  32. Ming, Wei, Color barcode producing, reading and/or reproducing method and apparatus.
  33. Ming, Wei, Color barcode producing, reading and/or reproducing method and apparatus.
  34. Ming, Wei, Color barcode producing, reading and/or reproducing method and apparatus.
  35. Berkovitz, Darren; Disraeli, Ryan Parker; Stubblefield, Stacy Lyn, Comprehensive authentication and identity system and method.
  36. Grajek, Garret Florian; Moore, Stephen; Lambiase, Mark V.; Lund, Craig J., Configuring a valid duration period for a digital certificate.
  37. Grajek, Garret Florian; Moore, Stephen; Lambiase, Mark V.; Lund, Craig J., Configuring a valid duration period for a digital certificate.
  38. Moore, Stephen; Graiek, Garret; Lambiase, Mark; Lund, Craig, Configuring a valid duration period for a digital certificate.
  39. Tokunaga,Keiichiro, Content data processing system, electronic device apparatus, and server device.
  40. Al-Salqan, Yayha; Varma, Sangeeta; Ranganathan, Aravindan, Cryptographic authorization with prioritized authentication.
  41. Karas,Peter M.; Cowell,James E.; Yoder,James R.; Golub,Matt F.; Baig,Aamer Ali, Electronic gift greeting.
  42. Karas,Peter M.; Cowell,James Everett; Abelman,Henry M.; Thompson,Mark, Electronic gift linking.
  43. Karas,Peter M.; Cowell,James Everett; Abelman,Henry M.; Thompson,Mark, Electronic gift linking.
  44. Diveley,Keith W.; Hansen,Kurt, Electronic identifier payment systems and methods.
  45. Dively,Keith W.; Hansen,Kurt L., Electronic identifier payment systems and methods.
  46. Diveley, Keith W.; Hansen, Kurt, Electronic indentifier payment systems and methods.
  47. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  48. Lund, Craig J.; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  49. Lund, Craig; Grajek, Garret F.; Moore, Stephen; Lambiase, Mark V., Facilitating secure online transactions.
  50. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  51. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  52. Loveland,Shawn Domenic, Granular authorization for network user sessions.
  53. Grajek, Garret Florian; Lo, Jeffrey Chiwai; Lambiase, Mark V., Identity-based certificate management.
  54. Grajek, Garret Florian; Lo, Jeffrey Chiwai; Lambiase, Mark V., Identity-based certificate management.
  55. Grajek, Garrett F.; Lo, Jeff C.; Lambiase, Mark V., Identity-based certificate management.
  56. Fujii,Yusaku; Shinzaki,Takashi, Illegal access discriminating apparatus and method.
  57. Hansen, Kurt; Sayor, Thomas, In-lane money transfer systems and methods.
  58. Hansen, Kurt; Sayor, Thomas, In-lane money transfer systems and methods.
  59. Hansen,Kurt; Sayor,Thomas, In-lane money transfer systems and methods.
  60. Sumino, Toru, Individual authentication system performing authentication in multiple steps.
  61. Felsher, David Paul, Information record infrastructure, system and method.
  62. Tulluri, Gupta Sesha Raghavendra; Thompson, Mark; Seifert, Dean A., Internet funds transfer system using ATM pickup.
  63. Smith,Scott J.; Nowlin,Jeffrey G.; Bennett,Bruce A.; Prchal,Ronald L., Mail handling equipment and methods.
  64. Ito, Masafumi, Memory device.
  65. Snible,Edward C.; Chess,David Michael; Whalley,Ian Nicholas, Method and apparatus for assigning roles to devices using physical tokens.
  66. McKeeth, James, Method and system for authenticating a user of a computer system.
  67. Miura, Junichi, Method and system for electronic authentification.
  68. Earney E. Stoutenburg ; Dean A. Seifert, Method and system for performing money transfer transactions.
  69. Stoutenburg, Earney E.; Seifert, Dean A., Method and system for performing money transfer transactions.
  70. Stoutenburg, Earney E.; Seifert, Dean A., Method and system for performing money transfer transactions.
  71. Stoutenburg, Earney E.; Seifert, Dean A., Method and system for performing money transfer transactions.
  72. Stoutenburg,Earney E.; Seifert,Dean A., Method and system for performing money transfer transactions.
  73. McKeeth, James, Method for controlling user access to an electronic device.
  74. Neofytides, Cheryl L.; Baig, Aamer Ali, Method for providing a money transfer service through a payment enabler system.
  75. Seifert, Dean A.; Stoutenburg, Earney E., Method for receiving electronically transferred funds using an automated teller machine.
  76. Neofytides, Cheryl L.; Baig, Aamer Ali, Method for requesting and receiving an online payment through a payment enabler system.
  77. Barron, Robert H., Method, apparatus, and system for secure data transport.
  78. Collier, David C., Methods and systems for slant compensation in handwriting and signature recognition.
  79. Wood, Richard Glee; Wood, Christine Taunya, Methods of registration for programs using verification processes with biometrics for fraud management and enhanced security protection.
  80. Milberger, Susan M.; Sherrard, Jeff D.; Dunker, Amy M.; Macfarlane, Jackie M.; Platte, Eric L.; Abrahams, Susan F.; Neofytides, Cheryl L.; Baig, Aamer Ali; Karas, Peter M.; Cowell, James E.; Yoder, James R.; Golub, Matt F., Money order debit from stored value fund.
  81. Seifert, Dean A.; Sayor, Thomas B.; Baumgart, Mark, Money transfer cards, systems and methods.
  82. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  83. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  84. Hanna, Assaad G.; Hansen, Kurt L.; Seifert, Dean A., Money transfer system and method.
  85. Hanna, Assaad G.; Hansen, Kurt L.; Seifert, Dean A., Money transfer system and method.
  86. Bulawa, Kurt; Bohler, Corey Allen; Seifert, Dean A.; Sayor, Thomas B.; Baumgart, Mark; Crawford, Erik S., Money transfer systems and methods.
  87. Hansen, Kurt L.; Seifert, Dean A.; Thompson, Mark; Michelsen, Mike, Money transfer systems and methods for travelers.
  88. Hansen, Kurt; Seifert, Dean A.; Thompson, Mark; Michelsen, Mike, Money transfer systems and methods for travelers.
  89. Hoffberg, Steven M., Multifactorial optimization system and method.
  90. Scheidt, Edward M.; Domangue, Ersin, Multiple factor-based user identification and authentication.
  91. Diveley,Keith W.; Hansen,Kurt, Payment service method and system.
  92. Lowensohn,Brent A.; Bellenger,David A.; Braun,Jimmy E.; Grosser,Richard C.; Thompson,David L.; Woodmancy,William J.; Pomerantz,Steven R., Portable wireless access to computer-based systems.
  93. Akkermans, Antonius Hermanus Maria; Conrado, Claudine Viegas; Denteneer, Theodorus Jacobus Johannes, Renewable and private biometrics.
  94. Novoa, Manuel; Crisan, Adrian, Secure and dynamic biometrics-based token generation for access control and authentication.
  95. Yeap, Tet Hin; Dafu, Lou; O'Brien, William G., Security access device and method.
  96. Quach, Allen Yu; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark, Security device provisioning.
  97. Quach, Allen Yu; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark V., Security device provisioning.
  98. Lambiase, Mark V.; Grajek, Garret Florian; Lo, Jeffrey Chiwai; Hsiang Wu, Tommy Ching, Single sign on with multiple authentication factors.
  99. Lambiase, Mark V.; Grajek, Garret Florian; Lo, Jeffrey Chiwai; Hsiang Wu, Tommy Ching, Single sign on with multiple authentication factors.
  100. Rae, Peter; Loomis, Nancy; Algiene, Ken; Hansen, Kurt L.; Dively, Keith W., Staged transaction system for mobile commerce.
  101. Hansen, Kurt L.; Sayor, Thomas B.; Vialpando, Sharon K.; Algiene, Ken, Staged transactions systems and methods.
  102. Hansen,Kurt L.; Sayor,Thomas B.; Vialpando,Sharon K.; Algiene,Kenneth, Staged transactions systems and methods.
  103. Abelman, Henry M.; Algiene, Kenneth; Karas, Peter M., Stored value payouts.
  104. Lindemann, Rolf, System and method for bootstrapping a user binding.
  105. Grajek, Garret; Lund, Craig; Moore, Steven; Lambiase, Mark, System and method for configuring a valid duration period for a digital certificate.
  106. McKeeth, James, System and method for controlling user access to an electronic device.
  107. McKeeth, James, System and method for controlling user access to an electronic device.
  108. McKeeth, James, System and method for controlling user access to an electronic device.
  109. McKeeth, James, System and method for controlling user access to an electronic device.
  110. McKeeth, James, System and method for controlling user access to an electronic device.
  111. McKeeth, James, System and method for controlling user access to an electronic device.
  112. Hoffberg, Steven M., System and method for determining contingent relevance.
  113. Azar, Cyrus; Brostoff, George, System and method for disabling secure access to an electronic device using detection of a predetermined device orientation.
  114. Azar, Cyrus; Brostoff, George, System and method for enabling a camera used with an electronic device using detection of a unique motion.
  115. Lund, Craig; Grajek, Garret; Moore, Stephen, System and method for facilitating secure online transactions.
  116. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  117. Stoutenburg, Earney E.; Seifert, Dean A., System and method for performing money transfer transaction using TCP/IP.
  118. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  119. Yu Quach, Allen; Lo, Jeffrey Chiwai; Grajek, Garret Florian; Lambiase, Mark V., System and method for provisioning a security token.
  120. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  121. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  122. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  123. Lindemann, Rolf, System and method for sharing keys across authenticators.
  124. Hansen, Kurt; Seifert, Dean A.; Thompson, Mark; Michelsen, Mike, System and method for transferring money from one country to a stored value account in a different country.
  125. Gantman, Alexander, System and method for using acoustic digital signature generator as oracle.
  126. Ellingson, John F., System and method for verification of identity.
  127. Prokupets, Rudy; Regelski, Michael, System for integrating security and access for facilities and information systems.
  128. Prokupets,Rudy; Regelski,Michael, System for integrating security and access for facilities and information systems.
  129. Gary S. Brown, System for remote pass-phrase authentication.
  130. Hansen, Kurt L.; Diveley, Keith W., Systems and methods for enrolling consumers in goods and services.
  131. Hansen,Kurt L.; Diveley,Keith W., Systems and methods for enrolling consumers in goods and services.
  132. Tomita, Hiroshi, Systems and methods for preserving and maintaining document integrity.
  133. Tomita, Hiroshi, Systems and methods for preserving and maintaining document integrity.
  134. Tomita, Hiroshi, Systems and methods for preserving and maintaining document integrity.
  135. Seifert, Dean A.; Stoutenburg, Earney E., Systems and methods for price matching on funds transfers.
  136. Seifert, Dean A.; Stoutenburg, Earney E., Systems and methods for price matching on funds transfers.
  137. Blair, Paul; Hansen, Kurt; Moore, Gary, Systems and methods for staging transactions, payments and collections.
  138. Blair,Paul; Hansen,Kurt; Moore,Gary, Systems and methods for staging transactions, payments and collections.
  139. Seifert, Dean A.; Thompson, Mark, Systems and methods of introducing and receiving information across a computer network.
  140. Wang, Sheng-Yih; Talmor, Ron, Techniques for preventing attacks on computer systems and networks.
  141. Lee,Jong ha; Hwang,Eui hyeon, User authentication method and apparatus.
  142. Hansen, Kurt; Seifert, Dean A.; Thompson, Mark; Frazier, Patricia A., Value transfer systems and methods.
  143. Baig, Aamer Ali; Cowell, James E.; Karas, Peter M.; Neofytides, Cheryl L.; Golub, Matthew F.; Yoder, James R.; Milberger, Susan M.; Sherrard, Jeff D.; Dunker, Amy M.; Macfarlane, Jackie M.; Platte, Eric L.; Abrahams, Susan F., Wide area network person-to-person payment.
  144. Baig, Aamer Ali; Cowell, James E.; Karas, Peter M.; Neofytides, Cheryl L.; Golub, Matthew F.; Yoder, James R.; Milberger, Susan M.; Sherrard, Jeff D.; Dunker, Amy M.; Macfarlane, Jackie M.; Platte, Eric L.; Abrahams, Susan F., Wide area network person-to-person payment.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로