Method and system for securing a computer network and...

Electrical computers and digital processing systems: support – System access control based on user identification by... – Using record or token

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S193000, C713S176000, C380S270000, C726S005000

Reexamination Certificate

active

09775205

ABSTRACT:
An improved computer network security system and a personal identifier device used for controlling network with real time authentication of both a person's identity and presence at a computer workstation is provided. A new user is registered to a portable personal digital identifier device and, within the portable personal digital identifier device, an input biometric of the user is received and a master template is derived therefrom and securely maintained in storage. A private key and public key encryption system is utilized to authenticate a user registered to the portable personal digital identifier device. The personal digital identifier device verifies the origin of a digitally signed challenge message from the network security manager component. A digitally and biometrically signed challenge response message is produced and transmitted by the personal digital identifier device in response to the verified challenge message.

REFERENCES:
patent: 4582985 (1986-04-01), Lofberg
patent: 4816653 (1989-03-01), Anderl et al.
patent: 4816654 (1989-03-01), Anderl et al.
patent: 5131038 (1992-07-01), Puhl et al.
patent: 5229764 (1993-07-01), Matchett et al.
patent: 5568552 (1996-10-01), Davis
patent: 5579393 (1996-11-01), Conner et al.
patent: 5613012 (1997-03-01), Hoffman et al.
patent: 5623552 (1997-04-01), Lane
patent: 5787186 (1998-07-01), Schroeder
patent: 5823948 (1998-10-01), Ross, Jr. et al.
patent: 5877675 (1999-03-01), Rebstock et al.
patent: 5960085 (1999-09-01), de la Huerga
patent: 6016476 (2000-01-01), Maes et al.
patent: 6018801 (2000-01-01), Palage et al.
patent: 6028950 (2000-02-01), Merjanian
patent: 6037879 (2000-03-01), Tuttle
patent: 6039251 (2000-03-01), Holowko et al.
patent: 6040783 (2000-03-01), Houvener et al.
patent: 6045039 (2000-04-01), Stinson et al.
patent: 6088450 (2000-07-01), Davis et al.
patent: 6092202 (2000-07-01), Veil et al.
patent: 6122625 (2000-09-01), Rosen
patent: 6131090 (2000-10-01), Basso, Jr. et al.
patent: RE36946 (2000-11-01), Diffie et al.
patent: 6148342 (2000-11-01), Ho
patent: 6195564 (2001-02-01), Rydbeck et al.
patent: 6255944 (2001-07-01), Addy
patent: 6353889 (2002-03-01), Hollingshead
patent: 6400996 (2002-06-01), Hoffberg et al.
patent: 6408330 (2002-06-01), DeLaHuerga
patent: 6418424 (2002-07-01), Hoffberg et al.
patent: 6480096 (2002-11-01), Gutman et al.
patent: 6484260 (2002-11-01), Scott et al.
patent: 6577734 (2003-06-01), Etzel et al.
patent: 6594762 (2003-07-01), Doub et al.
patent: 6607136 (2003-08-01), Atsmon et al.
patent: 6754504 (2004-06-01), Reed
patent: 6763315 (2004-07-01), Xydis
patent: 6819219 (2004-11-01), Bolle et al.
patent: 2001/0020254 (2001-09-01), Blumenau et al.
patent: 2001/0036821 (2001-11-01), Gainsboro et al.
patent: 2002/0039907 (2002-04-01), McKenna et al.
patent: 2002/0073042 (2002-06-01), Maritzen et al.
patent: 2002/0191765 (2002-12-01), Labaton
patent: 2003/0005300 (2003-01-01), Noble et al.
patent: 0973 125 (1995-05-01), None
patent: 1 045 346 (2000-10-01), None
patent: 2 312 040 (1997-10-01), None
patent: 2 348 309 (2000-09-01), None
patent: WO 98/13791 (1998-04-01), None
patent: WO 99/13415 (1999-03-01), None
patent: WO 99/22330 (1999-05-01), None
patent: WO 99/56429 (1999-11-01), None
patent: WO 00/26823 (2000-05-01), None
patent: WO 00/42678 (2000-07-01), None
Identification and Authentication when Users have Multiple Accounts, W.R. Shockely, 1993 ACM 0-89791-635-2, pp. 185 to 191.
A survey of routing techniques for mobile communications netwworks, S. Ramanathan and Martha Steenstrup, Mobile Networks and Applications 1 (1996) pp. 89-104.
Trust and Traceability in Electronic Commerce, Dennis D. Steinauer, Shukri A. Wakid, Stanley Raspberry, StandardView vol. 5, No. 3, Sep. 1997, pp. 118 to 124.
Authentication via Keystroke Dynamics, Fabian Monrose, Aviel Rubin, 1997 ACM 0-89791-912-2/97/04, pp. 48 to 56.
Experiences with network-based used agents for mobile applications, Thomas F. La Porta, Ramachandran Ramjee, Thomas Woo and Krishnan K. Sabnani, Mobile Networks and Applications 3 (1998) pp. 123 to 141.
A public-key based secure Mobile IP*, John Zao, Stephen Kent, Joshua Gahm, Gregory Toxel, Matthew Condell, Pam Helinek, Nina Yuan and Isidro Castineyra, Wireless Networks 5 (1999) pp. 373 to 390.
Biometric Identification, Anil Jain, Lin Hong and Sharath Pankanti, 2000 ACM 0002-0782/00/0200.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for securing a computer network and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for securing a computer network and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for securing a computer network and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3834589

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.