Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2011-08-09
2011-08-09
Fischer, Andrew J. (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S056000, C705S059000, C705S064000
Reexamination Certificate
active
07996321
ABSTRACT:
A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user's language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.
REFERENCES:
patent: 4599489 (1986-07-01), Cargile
patent: 4796181 (1989-01-01), Wiedemer
patent: 4890323 (1989-12-01), Beker et al.
patent: 5229764 (1993-07-01), Matchett et al.
patent: 5309359 (1994-05-01), Katz et al.
patent: 5481265 (1996-01-01), Russell
patent: 5487671 (1996-01-01), Shpiro et al.
patent: 5638513 (1997-06-01), Ananda
patent: 5766015 (1998-06-01), Shpiro
patent: 5774525 (1998-06-01), Kanevsky et al.
patent: 5947747 (1999-09-01), Walker et al.
patent: 5963908 (1999-10-01), Chadha
patent: 6029043 (2000-02-01), Ho et al.
patent: 6134529 (2000-10-01), Rothenberg
patent: 6169976 (2001-01-01), Colosso
patent: 6219652 (2001-04-01), Carter et al.
patent: 6296489 (2001-10-01), Blass et al.
patent: 6356437 (2002-03-01), Mitchell et al.
patent: 6415249 (2002-07-01), Blakely et al.
patent: 6438515 (2002-08-01), Crawford et al.
patent: 6654748 (2003-11-01), Rabung et al.
patent: 6661899 (2003-12-01), Phinisee-Washington
patent: 7003466 (2006-02-01), Brown et al.
patent: 7062468 (2006-06-01), Hillegass et al.
patent: 7225264 (2007-05-01), Croman et al.
patent: 2002/0004785 (2002-01-01), Schull
patent: 2002/0007351 (2002-01-01), Hillegass et al.
patent: 2002/0065915 (2002-05-01), Anderson et al.
patent: 2003/0004726 (2003-01-01), Niemoeller et al.
patent: 2007/0011003 (2007-01-01), Shpiro et al.
patent: WO98/44483 (1998-10-01), None
White, “How Computers Work”, Millennium Edition, 1999, Que Corporation, Indianapolis, IN, all pages.
Derfler, “How Networks Work”, Bestseller Edition, 1996, Ziff-Davis Press, Emeryville, CA, all pages.
Gralla, “How the Internet Works”, Millennium Edition, 1999, Que Corporation, Indianapolis, IN, all pages.
Muller, “Desktop Encyclopedia of the Internet”, 1999, Artech House Inc., Norwood, MA, all pages.
Konig, L., et al. “Nonlinear Discriminant Feature Extraction for Robust Text-Independent Speaker Recognition”,Proc. RLA2C-ESCA Speaker Recognition and Its Commercial and Forensic Applications(1998) pp. 72-75, Avignon, France.
Cohen Eric
Shpiro Zeev
Burlington English Ltd.
Coppola Jacob C.
Fischer Andrew J.
Kilpatrick Townsend & Stockton LLP
LandOfFree
Method and apparatus for access control to language learning... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for access control to language learning..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for access control to language learning... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2730681