Multichannel device utilizing a centralized out-of-band authentication system (COBAS)
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/04
G06F-021/00
H04L-029/06
출원번호
US-0958126
(2010-12-01)
등록번호
US-8484698
(2013-07-09)
발명자
/ 주소
Pemmaraju, Ram
출원인 / 주소
StrikeForce Technologies, Inc.
대리인 / 주소
Blank Rome LLP
인용정보
피인용 횟수 :
11인용 특허 :
11
초록▼
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the securit
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the security system. The access-seeker initially presents identification and password data over an access channel which is intercepted and transmitted to the security computer. The security computer then communicates with the access-seeker. A biometric analyzer—a voice or fingerprint recognition device—operates upon instructions from the authentication program to analyze the monitored parameter of the individual. In the security computer, a comparator matches the biometric sample with stored data, and, upon obtaining a match, provides authentication. The security computer instructs the host computer to grant access and communicates the same to the access-seeker, whereupon access is initiated over the access channel.
대표청구항▼
1. A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving at an interception device in a first channel a login identification demand to access a host computer also in the first channel;verifying the login identification;rece
1. A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving at an interception device in a first channel a login identification demand to access a host computer also in the first channel;verifying the login identification;receiving at a security computer in a second channel the demand for access and the login identification;outputting from the security computer a prompt requesting transmission of data;receiving the transmitted data at the security computer;comparing the transmitted data to predetermined data; anddepending on the comparison of the transmitted and the predetermined data, outputting an instruction from the security computer to the host computer to grant access to the host computer or deny access thereto. 2. The method according to claim 1, wherein the security computer receives the demand and login identification from the interception device. 3. The method according to claim 1, wherein the demand is received from a client computer, and wherein the host computer is a web server. 4. The method according to claim 1, wherein the step of verifying comprises retrieving from a database having at least one address record a record corresponding to the login identification. 5. The method according to claim 1, wherein the transmitted data is received from a peripheral device. 6. The method according to claim 5, wherein the peripheral device is one of a wired telephone, a wireless telephone, and a PDA. 7. The method according to claim 1, wherein the step of outputting the prompt comprises outputting an audible message. 8. The method according to claim 1, wherein the step of outputting the prompt comprises requesting a biometric signal. 9. The method according to claim 8, wherein the audible message comprises an audible instruction to speak a statement using a peripheral device, and wherein the biometric signal is the spoken statement transmitted by the peripheral device. 10. The method according to claim 8, further comprising receiving in a biometric analyzer the biometric signal. 11. The method according to claim 10, wherein the biometric analyzer comprises one of a voice recognition program, a fingerprint verification program, or both. 12. The method according to claim 8, further comprising retrieving a previously registered sample corresponding to the login identification and comparing the same to the biometric signal. 13. The method according to claim 12, wherein the previously registered sample is stored in a biometric parameter database. 14. The method according to claim 12, wherein the previously registered sample comprises one of a speech sample and a fingerprint sample. 15. The method according to claim 1, wherein the step of outputting the prompt comprises transmitting a message. 16. The method according to claim 1, further comprising connecting or disconnecting the security computer to and from a peripheral device. 17. The method according to claim 1, wherein the step of outputting the prompt comprises retrieving from an announcement database a prerecorded audible message that requests entry of the transmitted data and playing the message using a peripheral device. 18. The method according to claim 1, wherein the step of outputting an instruction from the security computer comprises selecting and transmitting an access-granted message selected from an announcement database. 19. The method according to claim 1, further comprising the step of synthesizing an audible message from a stored message and playing the synthesized message over a telephone. 20. The method according to claim 1, wherein the security computer comprises an authentication program for authenticating access to the host computer. 21. The method according to claim 1, wherein the interception device is a router. 22. The method according to claim 1, wherein the first channel comprises one of a wide area network and a local area network. 23. The method according to claim 1, wherein the transmitted data is a dual tone multi frequency (DTMF) personal identification number. 24. The method according to claim 23, wherein the dual tone multi frequency (DTMF) personal identification number is a password. 25. A software method for controlling access to a host computer, comprising the steps of: receiving a request from a client computer for access to the host computer;outputting an instruction to present a login screen at the client computer;receiving an identification and first password from the client computer;retrieving a predetermined password from a subscriber database associated with the identification;verifying the first password matches the predetermined password;outputting a call-back request to a peripheral device comprising initiating a communication to the peripheral device and receiving a signal indicating a connection with the peripheral device;outputting an instruction to retrieve a predetermined second password;outputting to the peripheral device a prompt to enter a user-entered password;receiving from the peripheral device the user-entered password;verifying the received user-entered password;outputting to the peripheral device a second prompt to speak a password;receiving from the peripheral device the spoken password;verifying the received spoken password; andoutputting an announcement that access to the host computer is granted. 26. The method according to claim 25, wherein the step of receiving the identification and the first password from the client computer comprises receiving the identification and the first password from the client computer in a client module. 27. The method according to claim 25, further comprising the steps of transmitting the identification and first password to a server module or transmitting the identification and first password to a control module. 28. The method according to claim 25, further comprising the steps of outputting a verification signal from a server module to a client module; or outputting the verification signal from the client module to the host computer; or outputting the verification signal from the host computer to the client computer. 29. The method according to claim 25, wherein the step of outputting a call-back request comprises outputting the call-back request from a control module. 30. The method according to claim 25, wherein the step of outputting an instruction to retrieve a predetermined second password comprises outputting an instruction from a control module an instruction to a speech module to retrieve the predetermined second password. 31. The method according to claim 25, wherein the step of outputting a prompt to enter a user-entered password comprises outputting from a speech module to the peripheral device a prompt to enter the user-entered password. 32. The method according to claim 25, further comprising transmitting the received user-entered password to a control module. 33. The method according to claim 25, wherein the step of outputting a second prompt to speak a password comprises outputting from a speech module to the peripheral device a second prompt to speak the password. 34. The method according to claim 25, wherein the step of outputting an announcement that access to the host computer is granted comprises outputting from a control module an instruction to a speech module to output the announcement that access to the host computer is granted. 35. The method according to claim 25, further comprising the step of disconnecting from the peripheral device. 36. The method according to claim 25, further comprising the step of outputting from a control module to a server module an authentication message. 37. The method according to claim 25, further comprising the step of outputting from a server module to a client module an authentication message. 38. The method according to claim 25, further comprising the step of outputting from a client module to the host computer an authentication message. 39. A multichannel security system for granting and denying access to a host computer in a network environment comprising: a security computer for communicating data via an authentication channel and an access channel;a line module program for intercepting a login identification accompanying a demand from an accessor in the access channel to access the host computer also in the access channel, verifying the login identification, and transmitting the login identification to an authentication channel;an authentication program in the authentication channel for authenticating the login identification received from the line module program;a prompt module program for selecting an announcement, outputting to a peripheral device or computer the announcement, verifying a speech or dual tone multi frequency (DTMF) password received, and optionally converting the speech to text; anda granting module program for granting and denying access to the host computer based on the received speech or password. 40. The multichannel security system according to claim 39, further comprising a client/server module program for enabling the host computer or web server to interface with hardware of the security system. 41. The multichannel security system according to claim 39, further comprising an announcement module program for selecting and storing predetermined data. 42. The multichannel security system according to claim 39, further comprising an alarm module program for terminating processing of the demand for access. 43. The multichannel security system according to claim 39, further comprising a management module program for remotely accessing the security system. 44. The multichannel security system according to claim 39, further comprising a database module program for retrieving and storing in a subscriber database one or more addresses corresponding to the login identification. 45. The multichannel security system according to claim 39, further comprising a control module program for controlling the functions and interconnects between the line module and the authentication programs. 46. A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving at a security computer predetermined data sent via an authentication channel from a peripheral device;identifying the peripheral device from a subscriber database and verifying the predetermined data by comparing it to stored data associated with the peripheral device;receiving a demand to access a host computer via an access channel comprising a login identification of an accessor;receiving the login identification at an interception device and routing the login identification to the security computer; andat the security computer, verifying that the login identification matches the predetermined data, and if it does, outputting an instruction to either grant or deny access to the access channel. 47. The software method according to claim 46, further comprising outputting to the peripheral device over the authentication channel a prompt to enter the predetermined data, and receiving the predetermined data via the authentication channel from the peripheral device. 48. A software method for employing a multichannel security system to control access to a host computer in an access channel using a mobile device in an authentication channel, comprising the steps of: providing a first software module on an Internet-connected web server in an access channel, the server being associated with a commercial institution, wherein the first software module receives a user ID associated with a subscriber account, and outputs information about the user ID; andproviding a second software module on a security computer different than the web server, wherein the security computer is in an authentication channel, and wherein the second software module receives the user ID from the access channel, retrieves predetermined data from a subscriber database associated with the user ID, including at least a telephone number or IP address of a mobile device, and outputs in the authentication channel an instruction to the mobile device,wherein when a subscriber attempts to logon to a host computer in the access channel at the commercial institution, the second software module compares an input from the mobile device to the predetermined data and outputs an instruction to the first software module to grant access to the host computer or deny access thereto. 49. The software method according to claim 48, wherein the instruction to the mobile device comprises an instruction to press a key on the mobile device as a dual tone multi frequency (DTFM) password. 50. The software method according to claim 48, further comprising the step of: providing a third software module for installing on the mobile device in the authentication channel, wherein the third software module receives the instruction outputted to the mobile device from the second software module, displays a message to the subscriber, and receives the input from the mobile device. 51. The software method according to claim 50, wherein the displayed message is a message containing a password and instruction for the subscriber to reply to the message by entering the password using the mobile device. 52. The software method according to claim 50, wherein the displayed message is a notification containing an instruction for the subscriber to reply to the notification using the mobile device's input device. 53. A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving in a first channel a login identification demand to access a host computer also in the first channel;verifying the login identification;receiving at a security computer in a second channel the demand for access and the login identification;outputting from the security computer a prompt requesting a transmission of data;receiving the transmitted data at the security computer;comparing the transmitted data to predetermined data; anddepending on the comparison of the transmitted and the predetermined data, outputting an instruction from the security computer to the host computer to grant access to the host computer or deny access thereto. 54. Apparatus for implementing a multichannel security system to control access to a computer, comprising: a device for receiving a login identification and demand to access a host computer, wherein the device and the host computer are in a first channel; anda security computer in a second channel for receiving the login identification and the access demand and outputting a prompt requesting a transmission of data once said login identification is verified by said security computer,wherein said security computer comprises a component for receiving the transmitted data and comparing said transmitted data to predetermined data, such that, depending on the comparison of the transmitted and the predetermined data, said security computer outputs an instruction to the host computer to grant access to the host computer or deny access thereto.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (11)
Schwob Pierre R.,HKX, Method and system to provide internet access to users via non-home service providers.
Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
Woodhill, James R., System and method of using the public switched telephone network in providing authentication or authorization for online transactions.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.