Conor Robert White - Fairfax VA, US Michael Peirce - Dublin, IE Jason Scott Cramer - Vienna VA, US Chet Bradford Steiner - McLean VA, US Suzanna Diebes - Sterling VA, US
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
Conor Robert White - Fairfax VA, US Michael Peirce - Dublin, IE Jason Scott Cramer - Vienna VA, US Chet Bradford Steiner - McLean VA, US Suzanna Diebes - Sterling VA, US
Assignee:
Daon Holdings Limited - George Town
International Classification:
G06F 21/00 H04K 1/00
US Classification:
713186, 380258
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
Conor Robert White - Fairfax VA, US Michael Peirce - Dublin, IE Jason Scott Cramer - Vienna VA, US Chet Bradford Steiner - McLean VA, US Suzanna Diebes - Sterling VA, US
International Classification:
H04L 9/32
US Classification:
726 7
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match.
Methods And Systems For Authenticating Users Over Networks
Jason Scott CRAMER - Vienna VA, US Andrew Supplee WEBB - Dover DE, US Christopher Eric HOLLAND - Fairfax VA, US Conor Robert WHITE - Fairfax VA, US
International Classification:
G06F 21/20
US Classification:
726 6
Abstract:
A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal identification number from the entered personal identification number, combining the hashed personal identification number with the replaceable shared secret to generate a modified shared secret, and generating a one-time password with the modified shared secret and the time of requesting the one-time password.
Methods And Systems For Replacing Shared Secrets Over Networks
Christopher Eric HOLLAND - Fairfax VA, US Andrew Supplee WEBB - Dover DE, US Jason Scott CRAMER - Vienna VA, US Conor Robert WHITE - Fairfax VA, US
International Classification:
G06F 21/24
US Classification:
726 28, 726 27
Abstract:
A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life.
Methods And Systems For Increasing The Security Of Electronic Messages
Conor Robert WHITE - Fairfax VA, US Christopher Eric HOLLAND - Fairfax VA, US Jason Scott CRAMER - Vienna VA, US Christopher James MORT - Burke VA, US
International Classification:
G06F 21/24 G06F 15/16
US Classification:
726 28
Abstract:
A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.
Conor Robert WHITE - Fairfax VA, US Michael PEIRCE - Dublin, IE Jason Scott CRAMER - Vienna VA, US Chet Bradford STEINER - McLean VA, US Suzanna DIEBES - Sterling VA, US
International Classification:
H04L 29/06
US Classification:
726 1, 726 7
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction, inputting information in a workstation, and determining whether the inputted information is known. Moreover, the method includes determining a state of a communications device when the inputted information is known, and transmitting a biometric authentication request from a server to a workstation when the state of the communications device is enrolled. Additionally, the method includes obtaining biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and conducting the transaction when the transmitted and stored one-time pass-phrases match.
Conor Robert WHITE - Fairfax VA, US Michael PEIRCE - Dublin, IE Jason Scott CRAMER - Vienna VA, US Chet Bradford STEINER - McLean VA, US Suzanna DIEBES - Sterling VA, US
International Classification:
H04L 29/06
US Classification:
726 7
Abstract:
A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communications device when the inputted information is known, and transmits a biometric authentication request from a server to an authentication system when the state of the communications device is enrolled. Additionally, the method includes validating the communications device, capturing biometric authentication data in accordance with a biometric authentication data capture request with the communications device, biometrically authenticating the user, generating a one-time pass-phrase and storing the one-time pass-phrase on the authentication system when the user is authenticated, comparing the transmitted one-time pass-phrase against the stored one-time pass-phrase, and granting access to the protected resources when the transmitted and stored one-time pass-phrases match.
Personal Injury Litigation Consumer Protection Workers Compensation Animal & Dog Bites Birth Injury Brain Injury Car Accidents Defective and Dangerous Products Medical Malpractice Motorcycle Accident Nursing Home Abuse and Neglect Slip and Fall Accident Spinal Cord Injury Trucking Accident Wrongful Death Real Estate
ISLN:
1000785378
Admitted:
2017
Law School:
University of Arkansas at Little Rock, William H. Bowen School of Law, Doctor of Jurisprudence/Juris Doctor (J.D.), 2016