$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Multi-channel multi-factor authentication 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • G06F-015/16
  • G06F-021/20
  • H04K-001/00
출원번호 US-0213035 (2011-08-18)
등록번호 US-8516562 (2013-08-20)
발명자 / 주소
  • Headley, Paul
출원인 / 주소
  • Veritrix, Inc.
대리인 / 주소
    Peters Verny, LLP
인용정보 피인용 횟수 : 2  인용 특허 : 64

초록

Systems and methods for authenticating electronic transactions are provided. The authentication methods employ a combination of security features and communication channels. These security features can be based, for example, on unique knowledge of the person being authenticated, a unique thing that

대표청구항

1. A method for authenticating a user comprising: receiving a claimant target over a first channel, the claimant target being associated with a user ID;selecting an entry from a knowledge base associated with the user ID;sending a prompt, where the prompt does not include the entry;receiving a biome

이 특허에 인용된 특허 (64)

  1. Murveit, Hy; Kannan, Ashvin, Adaptation of a speech recognition system across multiple remote sessions with a speaker.
  2. Baird, III, Leemon C.; Harmon, Mance E.; Young, R. Reed; Armstrong, Jr., James E., Apparatus and method for authenticating access to a network resource.
  3. Schmidt, Donald E.; Van Dyke, Clifford P.; Leach, Paul J.; Garg, Praerit; Satagopan, Murli D., Authentication and authorization across autonomous network systems.
  4. Ahern, James; Peirce, Michael, Biometric authentication system.
  5. Peirce, Michael; Ahern, James, Biometric authentication system.
  6. Matyas, Jr., Stephen Michael; Peyravian, Mohammad; Roginsky, Allen Leonid; Zunic, Nevenko, Biometric based multi-party authentication.
  7. Chen Ying-Jye James ; Ferguson David R. ; Hong An N. ; Suleman Dani ; Whittemore Gregory L., Computer-based document management system.
  8. Brown, Michael K.; Little, Herbert A.; Davis, Dinah L. M., Device authentication.
  9. Renaud Benjamin J., Digital signatures for data streams and data archives.
  10. Paul A. Mernyk ; Steven Martin ; Bevra S. Prasad ; David L. Salgado, Displaying thumbnail images of document pages in an electronic folder.
  11. Daniel R. Puchek ; Tianning Xu ; David M. Tumey, Distributed biometric access control apparatus and method.
  12. Tattan, Oliver; Peirce, Michael, Distributed network system using biometric authentication access.
  13. Fieres Helmut ; Merckling Roger ; Klemba Keith, Dynamic classes of service for an international cryptography framework.
  14. Tattan, Oliver; Loughman, Stephen; Murphy, Michael; Peirce, Michael; White, Conor, Electronic data vault providing biometrically protected electronic signatures.
  15. Tattan, Oliver; Loughman, Stephen; Murphy, Michael; Peirce, Michael; White, Conor, Electronic data vault providing biometrically protected electronic signatures.
  16. Tattan, Oliver; Loughman, Stephen; Murphy, Michael; Peirce, Michael; White, Conor, Electronic data vault providing biometrically protected electronic signatures.
  17. Tibor,Joan, Electronic transaction verification system.
  18. Angel, Albert J., Hierarchical authentication process and system for financial transactions.
  19. Jenkins, Paul D.; White, Peter M., Integration of voice messaging and data systems.
  20. Chang Te-An ; Rostock Joseph R., Internet-web link for access to intelligent network service control.
  21. Shipman David W. (Cambridge MA), Method and apparatus for effectively receiving voice input to a voice recognition system.
  22. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for efficiently initializing secure communications among wireless devices.
  23. Lange, Daniel H., Method and apparatus for electro-biometric identity recognition.
  24. Lo,Peter Z.; Bavarian,Behnam, Method and apparatus for enrollment and authentication of biometric images.
  25. Coleman Denis Raymond ; Belov Lev ; Basche Todd Farrell ; Cotte Pierre-Alain,FRX, Method and apparatus for managing and navigating within stacks of document pages.
  26. Hawkes,Philip; Leung,Nikolai K. N.; Rose,Gregory G., Method and apparatus for security in a data processing system.
  27. Langley, Richard Jay, Method and system for conducting identity matching.
  28. Tsantes,George K.; Rohrbaugh,Tim; Kopf,Carolyn E., Method and system for confirming personal identity.
  29. Peirce, Michael, Method and system for confirming the identity of a user.
  30. Nguyen, Binh T.; Paulsen, Craig A., Method and system for gaming and brand association.
  31. Langley, Richard Jay, Method and system for integrating duplicate checks with existing computer systems.
  32. Bolle, Rudolf Maarten; Nunes, Sharon Louise; Pankanti, Sharathchandra; Ratha, Nalini Kanta; Smith, Barton Allen; Zimmerman, Thomas Guthrie, Method for biometric-based authentication in wireless communication for access control.
  33. Monroe, David A., Method for incorporating facial recognition technology in a multimedia surveillance system.
  34. Jespersen,Torben; Bruus,Kirsten, Method for performing a transaction over a network.
  35. Stephen J. Borza CA, Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter.
  36. Li Yang ; Rao D. Ramesh K. ; Subbiah Subramanian, Method of using fingerprints to authenticate wireless communications.
  37. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  38. White, Conor Robert; Peirce, Michael; Cramer, Jason Scott; Steiner, Chet Bradford; Diebes, Suzanna, Methods and systems for authenticating users.
  39. Farrell, Kevin; Mistretta, William, Model adaptation of neural tree networks and other fused models for speaker verification.
  40. Headley, Paul, Multi-channel multi-factor authentication.
  41. Headley, Paul; Collins, Kevin, Multi-channel multi-factor authentication.
  42. Haala,Catherine A., National identification card system and biometric identity verification method for negotiating transactions.
  43. Shinzaki,Takashi; Fujii,Yusaku, Personal authentication system using biometrics information.
  44. Ron Van Os ; Jay W. Hanson ; Rudolph E. Burger, Scanning system and method.
  45. Dean, Jeffrey R.; Giammaria, Alberto, Secure bytecode instrumentation facility.
  46. Anderson ; Jr. Victor C., Security arrangement and method for controlling access to a protected system.
  47. Tamir,Asaf; Sege,Alan; Dvash,Nir; Altman,Nathan; Atsmon,Alon, Sonic/ultrasonic authentication device.
  48. Bernard F. Bareis ; Peter J. Foster ; Thomas B. Schalk, Speech recognition system for electronic switches in a non-wireline communications network.
  49. Manish Sharma ; Richard J. Mammone, System and method for detecting a recorded voice.
  50. Maler, Sophia; Lander, Vadim; Rappaport, Andrew, System and method for multi-context policy management.
  51. Schultz,Paul T.; Sartini,Robert A., System and method for multi-modal authentication using speaker verification.
  52. White, Conor; Peirce, Michael, System and method for protecting the privacy and security of stored biometric data.
  53. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Tapuska, David F., System and method for registering entities for code signing services.
  54. Fedronic, Dominique Louis Joseph; Le Saint, Eric F., System and method for sequentially processing a biometric sample.
  55. Ellingson,Robert E., System and method for thwarting identity theft and other identity misrepresentations.
  56. Dozortsev, D'mitri, System and method of enforcing executable code identity verification over the network.
  57. Inglis, Frank, System, method, and article of manufacture for secure transactions utilizing a computer network.
  58. Headley, Paul, Systems and methods for controlling access to encrypted data stored on a mobile device.
  59. Howard,James V.; Frazier,Francis, Systems and methods for recognition of individuals using multiple biometric searches.
  60. Pare, Jr., David Ferrin; Hoffman, Ned; Lee, Jonathan Alexander, Tokenless biometric electronic check transactions.
  61. Hoffman,Ned; Pare, Jr.,David Ferrin; Lee,Jonathan Alexander; Lapsley,Philip Dean, Tokenless financial access system.
  62. Headley, Paul, User authentication for social networks.
  63. Heck, Larry P., Voice authentication system having cognitive recall mechanism for password verification.
  64. Gilai Atzmon,ILX ; Resnekov Hezi,ILX, Word-containing database accessing system for responding to ambiguous queries, including a dictionary of database words, a dictionary searcher and a database searcher.

이 특허를 인용한 특허 (2)

  1. Chen, Steve Y; Chen, David Y, Image authenticity verification using speech.
  2. Hardy, Philip, System and method for user authentication.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로