$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System, method and computer program product for an authentication management infrastructure 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/00
  • H04L-029/06
출원번호 US-0187887 (2014-02-24)
등록번호 US-9398013 (2016-07-19)
발명자 / 주소
  • Bianco, Peter Garrett
  • Boon, William Taylor
  • Rochon, Anthony C.
  • Sherman, Marc A.
  • Sterling, Robert Brewster
  • Ware, Karl Roger
출원인 / 주소
  • Citibank, N.A.
대리인 / 주소
    Sophir, Eric L.
인용정보 피인용 횟수 : 1  인용 특허 : 134

초록

A system and method for allowing a user to access enterprise resources comprising authentication devices and an authentication server. The authentication devices allow a user to enter authentication data. The authentication server is in communication with the authentication devices. The authenticati

대표청구항

1. A method for allowing a user to access enterprise resources, the method comprising: implementing, by an authentication server, a policy that sets forth a plurality of guidelines for determining whether to authenticate the user and to allow the user to gain access to the enterprise resources, wher

이 특허에 인용된 특허 (134)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  3. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  4. Win Teresa ; Belmonte Emilio, Administrative roles that govern access to administrative functions.
  5. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud verification system using a data card.
  6. Drexler Jerome (Los Altos Hills CA) Dyball Christopher J. (Half Moon Bay CA), Anti-fraud voter registration and voting system using a data card.
  7. Cheng Jane (Spring Valley Rockland NY) Martinez Edgar (East White Plains NY) Naik Jayant (Stamford Fairfield CT), Apparatus and accompanying methods for preventing toll fraud through use of centralized caller voice verification.
  8. Heath ; Jr. William D. (Bremen GA), Apparatus and method for controlled access to a secured location.
  9. Kapp Michael A. (New Philadelphia) Protheroe Robert L. (Cambridge) Onega Albert (Lore City OH), Apparatus and method for producing a digitized transaction record including an encrypted signature.
  10. Gray Robert J., Apparatus and method for providing an authentication system.
  11. Tuck David ; Weier Bruce ; Stojka John, Apparatus and method for trading electric energy.
  12. Hara Tsutomu,JPX ; Kobayashi Yuji,JPX ; Toyoda Haruyoshi,JPX, Apparatus for identifying an individual based on a fingerprint image.
  13. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  14. Crane, Michael A.; Milman, Ivan Matthew, Authentication framework for managing authentication requests from multiple authentication devices.
  15. Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
  16. Benzler Hartwig,DEX, Authentication method.
  17. Burger Paul M., Biometric authentication system.
  18. Price-Francis Stephen, Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives.
  19. DiMaria Peter C., Biometric interface device for upgrading existing access control units.
  20. Daugman John G. (Huntingdon GB2), Biometric personal identification system based on iris analysis.
  21. Brady Mark J., Biometric recognition using a classification neural network.
  22. Gressel Carmi David,ILX, Biometric system and techniques suitable therefor.
  23. Gullman Lawrence S. (Lahonda CA) Edwards Eric (Menlo Park CA) Fast Norman (Newton MA), Biometric token for authorizing access to a host system.
  24. Osten David W. ; Carim Hatim M. ; Arneson Michael R. ; Blan Bradford L., Biometric, personal authentication system.
  25. Regnier Barbara Ann ; Youngers David Nicholas ; Dettinger Richard Dean ; Spors Daniel Arlan ; Thorson John David, Client/server computer system having personalizable and securable views of database data.
  26. Moncreiff Craig T., Computer network chat room based on channel broadcast in real time.
  27. Itsumi Kazuhiro,JPX ; Uchida Satoshi,JPX ; Nukui Harumi,JPX, Computer network system and personal identification system adapted for use in the same.
  28. Veneklase Brian J., Computer security system.
  29. Gainsboro Jay L. (5 Bancroft Cir. Framingham MA 01701), Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access.
  30. Sehr Richard P. (2276 Creek Bed Ct. Santa Clara CA 95054), Computerized theme park information management system utilizing partitioned smart cards and biometric verification.
  31. Hampton Thomas H. (Lyme NH) Litle ; IV Thomas J. (Nashua NH) Searle Nigel H. (Keene NH), Confirming identity of telephone caller.
  32. Matchett Noel D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910) Kehoe Brian D. (1001 Spring St. ; Ste. 123 Silver Spring MD 20910), Continuous biometric authentication matrix.
  33. Holt Robert Hugh,CAX ; Gibson Robert Thomas,CAX ; Myers Robert,CAX, Control in a data access transport service.
  34. Mathurin ; Jr. Trevor R. (865 Planders Ave. Uniondale NY 11553), Credit card with digitized finger print and reading apparatus.
  35. Bozzo Ferdinando,ATX, Credit document connected to a document or customized card, independent customized credit card and associated issuance and validation equipment.
  36. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  37. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  38. Bennett Michael Joseph (Las Vegas NV), Digital image capture system for photo identification cards.
  39. Rosen Sholom S. (New York NY), Electronic-monetary system.
  40. Feldman Daniel J., Entitlement management and access control system.
  41. Bjorn Vance C. ; Belongie Serge J., Fingerprint recognition system.
  42. Taylor Bradley (Palo Alto CA), Flexible distributed network database containing configuration information for a network divided into domains.
  43. Loucks Larry K. (Austin TX) Smith Todd A. (Austin TX), Flexible interface to authentication services in a distributed data processing environment.
  44. Schneider John K. (Snyder NY) Keeney Frank W. (Williamsville NY) Drakes Russell J. (Cheektowaga NY) Gojevic Stephen M. (Buffalo NY) Leszczynski Nicholas G. (Amherst NY) Schneider Mark C. (East Amhers, High resolution ultrasonic imaging apparatus and method.
  45. Lu Daozheng (1903 Dunloe Cir. Dunedin FL 34698) Lu Simon W. (525 S. Berendo St. #303 Los Angeles CA 90020), Identification card verification system.
  46. Kristol David M. (Summit NJ) O\Gorman Lawrence P. (Madison NJ), Identification card verification system and method.
  47. Colbert Charles (Yellow Springs OH), Knuckle profile indentity verification system.
  48. Rothermel, Peter M.; Bonn, David Wayne; Marvais, Nick T., Managing multiple network security devices from a manager device.
  49. Chen Tsuhan ; Civanlar Mehmet Reha, Method and apparatus employing audio and video data from an individual for authentication purposes.
  50. Abtahi Nooral S. (4924 Carmel Rd. Charlotte NC 28226) Shumate ; Sr. Grady C. (Charlotte NC) Heyward Waddie (Charlotte NC) Yang Hedong (Charlotte NC), Method and apparatus for confirming the identity of an individual presenting an identification card.
  51. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  52. Lewis Lundy ; Malik Rajiv ; Sycamore Steve ; Thebaut Suzanne ; Scott Walter ; Rustici Eric ; Kaikini Prasan, Method and apparatus for defining and enforcing policies for configuration management in communications networks.
  53. Hujink Hendrik W. (Aalten NLX), Method and apparatus for producing admission tickets.
  54. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  55. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  56. Penzias Arno A. (Chatham NJ), Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transactio.
  57. Tomko George J.,CAX ; Stoianov Alexei,CAX, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniq.
  58. Jose Gutman ; Thomas Ray Braxton, Method and apparatus for theft deterrence and secure data retrieval in a communication device.
  59. Ray Lawrence A. (Rochester NY) Ellson Richard N. (Rochester NY), Method and apparatus for transaction card verification.
  60. Tal Peter (53 Driftwood Dr. Port Washington NY 11050), Method and apparatus for uniquely identifying individuals by particular physical characteristics and security system uti.
  61. Costello, Brendan D., Method and apparatus for verifying identity.
  62. Kingdon Kevin (Orem UT) Childers Randal Earl (Orem UT) Higley DeeAnne (Provo UT) Olds Dale R. (Sandy UT), Method and apparatus to secure digital directory object changes.
  63. Veil Leonard Scott, Method and system for authenticating and utilizing secure resources in a computer system.
  64. Shockley William R. (Salinas CA) Gajnak George E. (Harvard MA), Method and system for certificate based alias detection.
  65. Thomas Richard B. (1902 E. Hope St. Mesa AZ 85203), Method and system for controlling use of protected software.
  66. Borza Stephen J.,CAX, Method and system for improving security in network applications.
  67. Nevarez Carlos A. ; White Kenneth Paul, Method and system for integrating additional functionality into a login system.
  68. Smithies Christopher Paul Kenneth (Corfe Mullen ; Wimborne GB2) Newman Jeremy Mark (Frome ; Somerset GB2), Method and system for the verification of handwritten signatures.
  69. Leslie D. Owens ; Mark S. Plecity ; Alvah B. Davis ; David T. Kiswani ; I-Hsiang Yu, Method and system for validating subscriber identities in a communications network.
  70. Ugon Michel (Maurepas FRX) Oisel Andr (Elancourt FRX), Method for checking the integrity of a program or data, and apparatus for implementing this method.
  71. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  72. Holmquist Kurt E. (Largo FL) Smith Richard K. (Seminole FL), Method for dial-in access security using a multimedia modem.
  73. Prokoski Francine J. (1510 Inlet Ct. Reston VA 22090) Coffin Jeffrey S. (Sterling VA) Riedel Robert B. (Great Falls VA), Method for identifying individuals from analysis of elemental shapes derived from biosensor data.
  74. Sudia Frank Wells (New York NY), Method for securely using digital signatures in a commercial cryptographic system.
  75. Fan Jason Chia-Sun (Adelphi MD) Hastie Trevor J. (Berkeley Heights NJ) Kishon Eyal (New York NY), Method for signature verification.
  76. Behnke Alfons,DEX, Method of encoding identification cards and verifying such encoded identification cards, and apparatus for carrying out.
  77. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), Method of verifying fake-proof video identification data.
  78. Beecham James E., Method, apparatus and system for verification of infectious status of humans.
  79. Takhar Harinder S., Modifying a database using an identification form.
  80. O'Connor Clint ; Scholder Erica, Mouse with security feature.
  81. Luckenbaugh Gary L., Object-oriented trusted application framework.
  82. Rissanen Eugene L. (Westerville OH), Password verification system based on a difference of scores.
  83. Feix Wolfgang H. (Mt. Laurel NJ) Ruell Hartwig E. (Fuerstenfeldbruck DEX), Personal access control system using speech and face recognition.
  84. Bonneau ; Jr. Walter C. (Missouri City TX), Personal identification.
  85. Davies John H. E. (4A Cowper Road Berkhamsted ; Hertfordshire ; HP4 3DA GB2), Personal identification devices and access control systems.
  86. Caputo Anthony A. ; Amoruso Victor P., Pocket encrypting and authenticating communications device.
  87. Stevens, Mark L.; Weiss, Walter Johan, Policy-enabled communications networks.
  88. Puhl Larry C. (Sleepy Hollow IL) Comroe Richard A. (Dundee IL) Furtaw Robert W. (Arlington Heights IL) Cantarutti Tracey L. (Barrington IL), Portable authentification system.
  89. Houvener Robert C. (Nashua NH), Positive identification system and method.
  90. Herbault Patrick (Paris FRX), Process and device for hierarchized access to a network for transmission of information.
  91. Villa Pierre (Fresnes FRX), Process of identifying and authenticating data characterizing an individual.
  92. Turner Stephen J. (Saffron Walden GB2) Lilley John B. (Brentwood GB2), Recognition procedure and an apparatus for carrying out the recognition procedure.
  93. Brunelli Roberto (Trento ITX) Falavigna Daniele (Buttapietra MA ITX) Poggio Tomaso (Wellesley MA) Stringa Luigi (Villazzano ITX), Recognition system, particularly for recognising people.
  94. Carlos DeLaHuerga, Remote data collecting and address providing method and apparatus.
  95. Hsu Shi-Ping ; Ling James M. ; Messenger Arthur F. ; Evans Bruce W., Remote identity verification technique using a personal identification device.
  96. Schneider David S. ; Lipstone Laurence R. ; Jensen Daniel ; Ribet Michael B., Secure delivery of information in a network.
  97. Aoyama Mitsunobu (Oome JPX), Security administrator for automatically updating security levels associated with operator personal identification data.
  98. Cockburn John B. (16A Bywater Street London ; SW3 GB3), Security system employing digitized personal physical characteristics.
  99. McAllister Alex (Wheaton MD) Cheston Frank (Potomac MD) Young David E. (Silver Spring MD) Hanle John P. (Silver Spring MD), Selection of a voice recognition data base responsive to video data.
  100. Lane William F. (Wilson NC), Self-authenticating identification card with fingerprint identification.
  101. Nappi Bruce ; Schroeder William ; Miller James E., Sensory integrated data interface.
  102. Dean Jeffrey Randell ; Rodriguez Ingrid Milagros, Server and computer network that permit a client to be easily introduced into the computer network.
  103. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  104. Mann Stewart ; Mann L. Maribel, System and method for aircraft passenger check-in and boarding using iris recognition.
  105. Schwalm Robert C. (Plano TX) Deffner Gerhard P. H. (Dallas TX), System and method for authenticating transmission and receipt of electronic information.
  106. Brown, Timothy J.; Rivers, Rodney; Nelson, Dan, System and method for authenticating users in a computer network.
  107. Sime Iain R. F. (Tayside GB6), System and method for detecting user fraud in automated teller machine transactions.
  108. Bahler Lawrence G. (San Diego CA) Higgins Alan L. (San Diego CA), System and method for passive voice verification in a telephone network.
  109. Houvener Robert C. ; Hoenisch Ian P., System and method of providing system integrity and positive audit capabilities to a positive identification system.
  110. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  111. Monroe Midori J. (Vancouver IL CAX) Huang George Y. (Chicago IL) Martin Tony D. (Arlington Heights IL), System for encoding personalized identification for storage on memory storage devices.
  112. Belluci Barry P. (Ann Arbor MI) Charlip Eliot (West Bloomfield MI), System for producing a personal ID card.
  113. Bergholz Ralf,DEX ; Weisser Hubert,DEX ; Zielke Thomas,DEX, System for recognizing authorization to use a vehicle.
  114. Bogosian ; Jr. Charles A. (Warwick RI), System for verifying use of a credit/identification card including recording of physical attributes of unauthorized user.
  115. Bianco Peter Garrett ; Boon William Taylor ; Sterling Robert Brewster ; Ware Karl Roger, System, method and computer program product for allowing access to enterprise resources using biometric devices.
  116. Robert Daniel Buch ; Ryan Brice Cunningham, Targeted network video download interface.
  117. McAllister Alex (Wheaton MD), Telephone based credit card protection.
  118. Teitelbaum Neil,CAX, Telephone with biometric sensing device.
  119. Katz Penina (Flushing NY), Telephone-based personnel tracking system.
  120. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless biometric ATM access system.
  121. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  122. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  123. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  124. Hoffman Ned (2529A College Ave. Berkeley CA 94704), Tokenless security system for authorizing access to a secured computer system.
  125. Gilchrist Gary ; Viavant Steven D., Trusted biometric client authentication.
  126. Piosenka Gerald V. (Scottsdale AZ) Chandos Ronald V. (Tempe AZ), Unforgeable personal identification system.
  127. Frailong Jean-Marc ; Price Charles A. ; Tardo Joseph John, Upgrading a secure network interface.
  128. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Use sensitive identification system.
  129. Washington Valdemar L. (Flint MI), Vehicle security system including fingerprint and eyeball part identification.
  130. Tabuki Takaaki,JPX, Verification server for use in authentication on networks.
  131. Andrew T. Busey ; Peter Novosel ; Govind Balakrishnan ; Peter Bunyan ; Brett Morrison ; Dwight M Moore ; Kirschen Alcyone Seah ; Rickey E. Chevrie ; George Currie ; Yuan Sylvia Tien, Web response unit including computer network based communication.
  132. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based biometric authentication system and method.
  133. Yu Yuan-Pin ; Wong Stephen ; Hoffberg Mark B., Web-based, biometric authetication system and method.
  134. Joseph C. Kawan, Wireless transaction and information system.

이 특허를 인용한 특허 (1)

  1. Ahlawat, Samit, Biometric facial recognition for accessing device and authorizing event processing.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로