Personal Injury Litigation Consumer Protection Workers Compensation Animal & Dog Bites Birth Injury Brain Injury Car Accidents Defective and Dangerous Products Medical Malpractice Motorcycle Accident Nursing Home Abuse and Neglect Slip and Fall Accident Spinal Cord Injury Trucking Accident Wrongful Death Real Estate
ISLN:
1000785378
Admitted:
2017
Law School:
University of Arkansas at Little Rock, William H. Bowen School of Law, Doctor of Jurisprudence/Juris Doctor (J.D.), 2016
Conor Robert White - Fairfax VA, US Michael Peirce - Dublin, IE Jason Scott Cramer - Vienna VA, US Chet Bradford Steiner - McLean VA, US Suzanna Diebes - Sterling VA, US
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
Conor Robert White - Fairfax VA, US Michael Peirce - Dublin, IE Jason Scott Cramer - Vienna VA, US Chet Bradford Steiner - McLean VA, US Suzanna Diebes - Sterling VA, US
Assignee:
Daon Holdings Limited - George Town
International Classification:
G06F 21/00 H04K 1/00
US Classification:
713186, 380258
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
Conor Robert White - Fairfax VA, US Michael Peirce - Dublin, IE Jason Scott Cramer - Vienna VA, US Chet Bradford Steiner - McLean VA, US Suzanna Diebes - Sterling VA, US
International Classification:
H04L 9/32
US Classification:
726 7
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match.
Methods And Systems For Authenticating Users Over Networks
Jason Scott CRAMER - Vienna VA, US Andrew Supplee WEBB - Dover DE, US Christopher Eric HOLLAND - Fairfax VA, US Conor Robert WHITE - Fairfax VA, US
International Classification:
G06F 21/20
US Classification:
726 6
Abstract:
A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal identification number from the entered personal identification number, combining the hashed personal identification number with the replaceable shared secret to generate a modified shared secret, and generating a one-time password with the modified shared secret and the time of requesting the one-time password.
Methods And Systems For Replacing Shared Secrets Over Networks
Christopher Eric HOLLAND - Fairfax VA, US Andrew Supplee WEBB - Dover DE, US Jason Scott CRAMER - Vienna VA, US Conor Robert WHITE - Fairfax VA, US
International Classification:
G06F 21/24
US Classification:
726 28, 726 27
Abstract:
A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life.
Methods And Systems For Increasing The Security Of Electronic Messages
Conor Robert WHITE - Fairfax VA, US Christopher Eric HOLLAND - Fairfax VA, US Jason Scott CRAMER - Vienna VA, US Christopher James MORT - Burke VA, US
International Classification:
G06F 21/24 G06F 15/16
US Classification:
726 28
Abstract:
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.
Conor Robert WHITE - Fairfax VA, US Michael PEIRCE - Dublin, IE Jason Scott CRAMER - Vienna VA, US Chet Bradford STEINER - McLean VA, US Suzanna DIEBES - Sterling VA, US
International Classification:
H04L 29/06
US Classification:
726 1, 726 7
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match.
Conor Robert WHITE - Fairfax VA, US Michael PEIRCE - Dublin, IE Jason Scott CRAMER - Vienna VA, US Chet Bradford STEINER - McLean VA, US Suzanna DIEBES - Sterling VA, US
International Classification:
H04L 29/06
US Classification:
726 7
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
Nov 2012 to 2000 LPNSunrise Senior Living of Worthington Worthington, OH Mar 2012 to Oct 2012 LPNPowell Fitness Powell, OH Sep 2011 to Feb 2012 Certified Strength and Conditioning SpecialistSlim & Fit Powell, OH Mar 2011 to Aug 2011 Personal Trainer
Education:
Fortis College Westerville, OH Dec 2011 Diploma in NursingCapital University Columbus, OH May 2007 Bachelor of Arts in Health and Fitness ManagementColumbus State Community College Columbus, OH Mar 2004 Associate of Applied Science in Sport and Fitness Management
Mar 2012 to 2000 Wellness Nurse (LPN)Franklin County Community Based Correctional Facility Columbus, OH Feb 2012 to Mar 2012 Resident AdvisorPowell Fitness Powell, OH Sep 2011 to Feb 2012 Certified Strength and Conditioning SpecialistMedline Industries Groveport, OH Dec 2007 to Nov 2011 Material HandlerSlim & Fit Powell, OH Mar 2011 to Aug 2011 Personal TrainerSofa Express and More Groveport, OH Dec 2005 to Dec 2007 Receiving ClerkYMCA Gahanna, OH Apr 2004 to Dec 2005 Fitness Monitor/ Personal Trainer
Education:
Fortis College School of Nursing Westerville, OH Jan 2011 to Jan 2011 Diploma in Practical NursingCapital University Columbus, OH May 2007 Bachelor of Arts in Health and Fitness ManagementColumbus State Community College Columbus, OH Mar 2004 Associate of Applied Science in Sport and Fitness Management