$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System, method and computer program product for providing unified authentication services for online applications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
  • H04L-009/00
  • H04K-001/00
출원번호 US-0814971 (2001-03-23)
등록번호 US-7441263 (2008-10-21)
발명자 / 주소
  • Bakshi,Bikram S
  • Helms,David W
  • Rochon,Anthony C
  • Walker,Trevor J
출원인 / 주소
  • Citibank, N.A.
대리인 / 주소
    Marcou,George T.
인용정보 피인용 횟수 : 36  인용 특허 : 119

초록

A system, method and computer program product for providing unified authentication services in an Application Service Provider (ASP) setting to a registered end-user of one or more online (or web) applications. The system includes client side components, a user management component coupled to the c

대표청구항

What is claimed is: 1. A system for providing user authentication to a first account provided by a first server via a communication medium, comprising: client side components; a user management component coupled to said client side components via the communication medium; and server side components

이 특허에 인용된 특허 (119)

  1. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  2. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  3. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud verification system using a data card.
  4. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud voter registration and voting system using a data card.
  5. Cheng Jane (Spring Valley Rockland NY) Martinez Edgar (East White Plains NY) Naik Jayant (Stamford Fairfield CT), Apparatus and accompanying methods for preventing toll fraud through use of centralized caller voice verification.
  6. Kapp Michael A. (New Philadelphia) Protheroe Robert L. (Cambridge) Onega Albert (Lore City OH), Apparatus and method for producing a digitized transaction record including an encrypted signature.
  7. Gray Robert J., Apparatus and method for providing an authentication system.
  8. Hara Tsutomu,JPX ; Kobayashi Yuji,JPX ; Toyoda Haruyoshi,JPX, Apparatus for identifying an individual based on a fingerprint image.
  9. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  10. Benzler Hartwig,DEX, Authentication method.
  11. Burger Paul M., Biometric authentication system.
  12. Price-Francis Stephen, Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives.
  13. DiMaria Peter C., Biometric interface device for upgrading existing access control units.
  14. Daugman John G. (Huntingdon GB2), Biometric personal identification system based on iris analysis.
  15. Brady Mark J., Biometric recognition using a classification neural network.
  16. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  17. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  18. Regnier Barbara Ann ; Youngers David Nicholas ; Dettinger Richard Dean ; Spors Daniel Arlan ; Thorson John David, Client/server computer system having personalizable and securable views of database data.
  19. Itsumi Kazuhiro,JPX ; Uchida Satoshi,JPX ; Nukui Harumi,JPX, Computer network system and personal identification system adapted for use in the same.
  20. Veneklase Brian J., Computer security system.
  21. Gainsboro Jay L. (5 Bancroft Cir. Framingham MA 01701), Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  22. Sehr Richard P. (2276 Creek Bed Ct. Santa Clara CA 95054), Computerized theme park information management system utilizing partitioned smart cards and biometric verification.
  23. Hampton Thomas H. (Lyme NH) Litle ; IV Thomas J. (Nashua NH) Searle Nigel H. (Keene NH), Confirming identity of telephone caller.
  24. Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
  25. Cohen Richard Jay ; Forsberg Richard Allen ; Kallfelz ; Jr. Paul A. ; Meckstroth John Robert ; Pascoe Christopher James ; Snow-Weaver Andrea Lynn, Coordinating user target logons in a single sign-on (SSO) environment.
  26. Mathurin ; Jr. Trevor R. (865 Planders Ave. Uniondale NY 11553), Credit card with digitized finger print and reading apparatus.
  27. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  28. See Michael E. ; Bailey John W. ; Panza Charles L. ; Pikover Yuri ; Stone Geoffrey C., Deterministic user authentication service for communication network.
  29. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  30. Bennett Michael Joseph (Las Vegas NV), Digital image capture system for photo identification cards.
  31. Rosen Sholom S. (New York NY), Electronic-monetary system.
  32. Taylor Bradley (Palo Alto CA), Flexible distributed network database containing configuration information for a network divided into domains.
  33. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  34. Schneider John K. (Snyder NY) Keeney Frank W. (Williamsville NY) Drakes Russell J. (Cheektowaga NY) Gojevic Stephen M. (Buffalo NY) Leszczynski Nicholas G. (Amherst NY) Schneider Mark C. (East Amhers, High resolution ultrasonic imaging apparatus and method.
  35. Lu Daozheng (1903 Dunloe Cir. Dunedin FL 34698) Lu Simon W. (525 S. Berendo St. #303 Los Angeles CA 90020), Identification card verification system.
  36. Kristol David M. (Summit NJ) O\Gorman Lawrence P. (Madison NJ), Identification card verification system and method.
  37. Michel K. Susai ; Rajiv Sinha ; Deepinder S. Setia ; Ajay V. Soni, Internet client-server multiplexer.
  38. Colbert Charles (Yellow Springs OH), Knuckle profile indentity verification system.
  39. Chen Tsuhan ; Civanlar Mehmet Reha, Method and apparatus employing audio and video data from an individual for authentication purposes.
  40. Abtahi Nooral S. (4924 Carmel Rd. Charlotte NC 28226) Shumate ; Sr. Grady C. (Charlotte NC) Heyward Waddie (Charlotte NC) Yang Hedong (Charlotte NC), Method and apparatus for confirming the identity of an individual presenting an identification card.
  41. Hujink Hendrik W. (Aalten NLX), Method and apparatus for producing admission tickets.
  42. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  43. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  44. Penzias Arno A. (Chatham NJ), Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transactio.
  45. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  46. Ray Lawrence A. (Rochester NY) Ellson Richard N. (Rochester NY), Method and apparatus for transaction card verification.
  47. Tal Peter (53 Driftwood Dr. Port Washington NY 11050), Method and apparatus for uniquely identifying individuals by particular physical characteristics and security system uti.
  48. Khello Robert Peter,SEX, Method and apparatus for user authentication.
  49. Costello, Brendan D., Method and apparatus for verifying identity.
  50. Kingdon Kevin (Orem UT) Childers Randal Earl (Orem UT) Higley DeeAnne (Provo UT) Olds Dale R. (Sandy UT), Method and apparatus to secure digital directory object changes.
  51. Veil Leonard Scott, Method and system for authenticating and utilizing secure resources in a computer system.
  52. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  53. Thomas Richard B. (1902 E. Hope St. Mesa AZ 85203), Method and system for controlling use of protected software.
  54. Nevarez Carlos A. ; White Kenneth Paul, Method and system for integrating additional functionality into a login system.
  55. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  56. Smithies Christopher Paul Kenneth (Corfe Mullen ; Wimborne GB2) Newman Jeremy Mark (Frome ; Somerset GB2), Method and system for the verification of handwritten signatures.
  57. Ugon Michel (Maurepas FRX) Oisel Andr (Elancourt FRX), Method for checking the integrity of a program or data, and apparatus for implementing this method.
  58. Holmquist Kurt E. (Largo FL) Smith Richard K. (Seminole FL), Method for dial-in access security using a multimedia modem.
  59. Prokoski Francine J. (1510 Inlet Ct. Reston VA 22090) Coffin Jeffrey S. (Sterling VA) Riedel Robert B. (Great Falls VA), Method for identifying individuals from analysis of elemental shapes derived from biosensor data.
  60. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  61. Fan Jason Chia-Sun (Adelphi MD) Hastie Trevor J. (Berkeley Heights NJ) Kishon Eyal (New York NY), Method for signature verification.
  62. Behnke Alfons,DEX, Method of encoding identification cards and verifying such encoded identification cards, and apparatus for carrying out.
  63. Hillhouse Robert D.,CAX, Method of securing a cryptographic key.
  64. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), Method of verifying fake-proof video identification data.
  65. O'Connor Clint ; Scholder Erica, Mouse with security feature.
  66. Luckenbaugh Gary L., Object-oriented trusted application framework.
  67. Rissanen Eugene L. (Westerville OH), Password verification system based on a difference of scores.
  68. Feix Wolfgang H. (Mt. Laurel NJ) Ruell Hartwig E. (Fuerstenfeldbruck DEX), Personal access control system using speech and face recognition.
  69. Bonneau ; Jr. Walter C. (Missouri City TX), Personal identification.
  70. Davies John H. E. (4A Cowper Road Berkhamsted ; Hertfordshire ; HP4 3DA GB2), Personal identification devices and access control systems.
  71. Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
  72. Houvener Robert C. (Nashua NH), Positive identification system and method.
  73. Herbault Patrick (Paris FRX), Process and device for hierarchized access to a network for transmission of information.
  74. Villa Pierre (Fresnes FRX), Process of identifying and authenticating data characterizing an individual.
  75. Turner Stephen J. (Saffron Walden GB2) Lilley John B. (Brentwood GB2), Recognition procedure and an apparatus for carrying out the recognition procedure.
  76. Brunelli Roberto (Trento ITX) Falavigna Daniele (Buttapietra MA ITX) Poggio Tomaso (Wellesley MA) Stringa Luigi (Villazzano ITX), Recognition system, particularly for recognising people.
  77. Rodwin Andrew S. ; Wenocur Jonathan H. ; Feinstein Michael G., Remote access apparatus and method which allow dynamic internet protocol (IP) address management.
  78. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  79. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Secure delivery of information in a network.
  80. Green Michael W. ; Kruse Ricky Ronald, Secure network proxy for connecting entities.
  81. Aoyama Mitsunobu (Oome JPX), Security administrator for automatically updating security levels associated with operator personal identification data.
  82. Cockburn John B. (16A Bywater Street London ; SW3 GB3), Security system employing digitized personal physical characteristics.
  83. McAllister Alex (Wheaton MD) Cheston Frank (Potomac MD) Young David E. (Silver Spring MD) Hanle John P. (Silver Spring MD), Selection of a voice recognition data base responsive to video data.
  84. Lane William F. (Wilson NC), Self-authenticating identification card with fingerprint identification.
  85. Nappi Bruce ; Schroeder William ; Miller James E., Sensory integrated data interface.
  86. Dean Jeffrey Randell ; Rodriguez Ingrid Milagros, Server and computer network that permit a client to be easily introduced into the computer network.
  87. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  88. Schwalm Robert C. (Plano TX) Deffner Gerhard P. H. (Dallas TX), System and method for authenticating transmission and receipt of electronic information.
  89. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  90. Reid Irving,CAX ; Minear Spencer, System and method for controlling interactions between networks.
  91. Sime Iain R. F. (Tayside GB6), System and method for detecting user fraud in automated teller machine transactions.
  92. Bahler Lawrence G. (San Diego CA) Higgins Alan L. (San Diego CA), System and method for passive voice verification in a telephone network.
  93. Houvener Robert C. ; Hoenisch Ian P., System and method of providing system integrity and positive audit capabilities to a positive identification system.
  94. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  95. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for encoding personalized identification for storage on memory storage devices.
  96. Belluci Barry P. (Ann Arbor MI) Charlip Eliot (West Bloomfield MI), System for producing a personal ID card.
  97. Bergholz Ralf,DEX ; Weisser Hubert,DEX ; Zielke Thomas,DEX, System for recognizing authorization to use a vehicle.
  98. Bogosian ; Jr. Charles A. (Warwick RI), System for verifying use of a credit/identification card including recording of physical attributes of unauthorized user.
  99. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  100. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  101. McAllister Alex (Wheaton MD), Telephone based credit card protection.
  102. Teitelbaum Neil,CAX, Telephone with biometric sensing device.
  103. Katz Penina (Flushing NY), Telephone-based personnel tracking system.
  104. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  105. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  106. Hoffman Ned ; Pare ; Jr. David Ferrin ; Lee Jonathan Alexander, Tokenless biometric electronic rewards system.
  107. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  108. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  109. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  110. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  111. Gilchrist Gary ; Viavant Steven D., Trusted biometric client authentication.
  112. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  113. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
  114. Kikuchi Hiroaki (Kawasaki JPX), User authenticating system and method in wide area distributed environment.
  115. Su, Huan-yu; Assaleh, Khaled, User configurable levels of security for a speaker verification system.
  116. Washington Valdemar L. (Flint MI), Vehicle security system including fingerprint and eyeball part identification.
  117. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.
  118. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.
  119. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based, biometric authetication system and method.

이 특허를 인용한 특허 (36)

  1. Hitchcock, Daniel W.; Campbell, Brad Lee, Account management for multiple network sites.
  2. Hitchcock, Daniel W.; Campbell, Brad Lee, Account management for network sites.
  3. Hitchcock, Daniel W.; Campbell, Brad Lee, Authentication management services.
  4. Nachtrab, Matthew; McCallum, Donald; Zerilli, Anthony J., Automated provisioning and management of cloud services.
  5. Nachtrab, Matthew; McCallum, Donald; Zerilli, Anthony J., Automated provisioning and management of cloud services.
  6. Bergman, Artur; Kasindorf, Alan; Mulhuijzen, Rogier, Enhanced thread handling in security handshaking.
  7. Dureau, Vincent; Hensgen, Debra; Pierre, Ludovic; Menand, Jean-Rene, Generic data processing engine.
  8. Boydstun, Kenneth C.; Grimm, Stephen W.; Hentzen, Steven R.; Peters, Stephen M., Identity management for application access.
  9. Hitchcock, Daniel W.; Campbell, Brad Lee, Logout from multiple network sites.
  10. Junod, Forrest A.; Fly, Robert C.; Dapkus, Peter; Yancey, Scott W.; Lawrance, Steven S.; Fell, Simon Z., Managing access to an on-demand service.
  11. Canavor, Darren E.; Johansson, Jesper M., Managing security credentials.
  12. Chen, James F.; Qian, Chen; Tang, Zilong, Method and system for interoperable identity and interoperable credentials.
  13. Chen, James F.; Qian, Chen; Tang, Zilong, Method and system for interoperable identity and interoperable credentials.
  14. Gao, Feng; Ye, Shuaimin; Hong, Lei; Chen, Yanxia; Li, Huiming, Method for implementing unified authentication.
  15. Fiske, Michael, Method of generating access keys.
  16. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  17. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  18. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  19. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  20. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  21. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  22. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  23. Tkachev, Dmitri, Methods and systems for identifying, verifying, and authenticating an identity.
  24. Novack, Brian; Birkes, Jerry; Drake, Alton; Toretti, Gary, Methods, systems, and computer program products for authenticating an entity through use of a global identity of the entity that serves as a proxy for one or more local identities of the entity.
  25. Hitchcock, Daniel W.; Campbell, Brad Lee, Presenting managed security credentials to network sites.
  26. Hitchcock, Daniel Wade; Campbell, Brad Lee; Bhimanaik, Bharath Kumar, Proxy server-based network site account management.
  27. Hitchcock, Daniel W.; Campbell, Brad Lee, Recovery of managed security credentials.
  28. Hitchcock, Daniel W.; Campbell, Brad Lee, Recovery of managed security credentials.
  29. Hitchcock, Daniel W.; Campbell, Brad Lee, Reset and recovery of managed security credentials.
  30. Tang, Zilong, Strong authentication with feeder robot in a federated identity web environment.
  31. Sawada, Kenichi, Support program for web application server and server.
  32. Buss, Duane, System and method for implementing an extended authentication and authorization credential store.
  33. Hollingsworth, John B., System and methods for universal password control.
  34. Fiske, Michael, System for generating requests to a passcode protected entity.
  35. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  36. Hollingsworth, John B., Systems and methods for universal password control.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로