Security systems for protecting an asset

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S004000, C726S017000, C726S018000, C726S021000, C713S165000, C713S182000, C713S168000, C713S193000, C713S166000

Reexamination Certificate

active

07552467

ABSTRACT:
Security systems for protecting assets are described, including password-based security systems that can provide different levels of access responsive to entry of a primary or secondary password. In some versions, user-configurable security rules can provide customized responses to entry of primary or secondary passwords, including feigned or limited access, security alerts, etc. Passwords comprising overt and covert components can be used to provide enhanced security and improved user control over system response. Improved security systems involving transactions between multiple parties are also considered, with options for user-customized security rules including primary and secondary passwords, and reverse challenge and response methods. Systems for Limited Use Credentials are also disclosed to reduce the risk of identity theft.

REFERENCES:
patent: 3166625 (1965-01-01), Brumley
patent: 3579186 (1971-05-01), Johnson
patent: 3620590 (1971-11-01), Barker
patent: 3676000 (1972-07-01), Mayer, Jr. et al.
patent: 3781109 (1973-12-01), Mayer, Jr. et al.
patent: 3806704 (1974-04-01), Shinal
patent: 3955178 (1976-05-01), Warfel
patent: 4375032 (1983-02-01), Uchida
patent: 4532870 (1985-08-01), Hayman
patent: 4675815 (1987-06-01), Kuroki et al.
patent: 5042067 (1991-08-01), Moriyama
patent: 5195133 (1993-03-01), Kapp et al.
patent: 5241600 (1993-08-01), Hillis
patent: 5326960 (1994-07-01), Tannenbaum
patent: 5350906 (1994-09-01), Brody et al.
patent: 5354974 (1994-10-01), Eisenberg
patent: 5478994 (1995-12-01), Rahman et al.
patent: 5627355 (1997-05-01), Rahman et al.
patent: 5647017 (1997-07-01), Smithies et al.
patent: 5680470 (1997-10-01), Moussa et al.
patent: 5731575 (1998-03-01), Zingher et al.
patent: 5778072 (1998-07-01), Samar
patent: 5818955 (1998-10-01), Smithies et al.
patent: 5847656 (1998-12-01), Dawson et al.
patent: 6006333 (1999-12-01), Nielsen
patent: 6064751 (2000-05-01), Smithies et al.
patent: 6091835 (2000-07-01), Smithies et al.
patent: 6182229 (2001-01-01), Nielsen
patent: 6250549 (2001-06-01), DeFabio, Jr.
patent: 6381344 (2002-04-01), Smithies et al.
patent: 6496111 (2002-12-01), Hosack
patent: 6609197 (2003-08-01), Ketcham et al.
patent: 6679422 (2004-01-01), Brown et al.
patent: 6685087 (2004-02-01), Brown et al.
patent: 6691089 (2004-02-01), Su et al.
patent: 6691231 (2004-02-01), Lloyd et al.
patent: 6715672 (2004-04-01), Tetro
patent: 6732277 (2004-05-01), Vandergeest et al.
patent: 6732278 (2004-05-01), Baird et al.
patent: RE38572 (2004-08-01), Tetro
patent: 6857073 (2005-02-01), French et al.
patent: 6871288 (2005-03-01), Russikoff
patent: 6902116 (2005-06-01), Finkelstein
patent: 6975727 (2005-12-01), Vandergeest
patent: 6996547 (2006-02-01), Tugenberg et al.
patent: 7003991 (2006-02-01), Alizade
patent: 7039812 (2006-05-01), Kawan et al.
patent: 7103912 (2006-09-01), Xia et al.
patent: 7117359 (2006-10-01), Wood et al.
patent: 7127088 (2006-10-01), Grajewski et al.
patent: 7136835 (2006-11-01), Flitcroft et al.
patent: 7149296 (2006-12-01), Brown et al.
patent: 7152693 (2006-12-01), Man et al.
patent: 7155390 (2006-12-01), Fukada et al.
patent: 7155416 (2006-12-01), Shatford
patent: 7161468 (2007-01-01), Hwang et al.
patent: 7165051 (2007-01-01), Ronning et al.
patent: 7165182 (2007-01-01), Excoffier et al.
patent: 7165267 (2007-01-01), Utsumi et al.
patent: 7167553 (2007-01-01), Shaffer et al.
patent: 7167924 (2007-01-01), Symonds et al.
patent: 7170391 (2007-01-01), Lane et al.
patent: 7178025 (2007-02-01), Scheidt et al.
patent: 7194762 (2007-03-01), Challener et al.
patent: 7200761 (2007-04-01), Freeman et al.
patent: 7205883 (2007-04-01), Bailey
patent: 7221258 (2007-05-01), Lane et al.
patent: 7224261 (2007-05-01), Shimomura
patent: 7237117 (2007-06-01), Weiss
patent: 7383570 (2008-06-01), Pinkas et al.
patent: 2002/0169988 (2002-11-01), Vandergeest et al.
patent: 2004/0005914 (2004-01-01), Dear
patent: 2005/0022005 (2005-01-01), McKeeth
patent: 2005/0166263 (2005-07-01), Nanopoulos
patent: 2005/0193208 (2005-09-01), Charrette et al.
patent: 2006/0075230 (2006-04-01), Baird et al.
patent: 2006/0117389 (2006-06-01), Pool
patent: 2006/0253388 (2006-11-01), Newton
patent: 2007/0005964 (2007-01-01), Grosse et al.
patent: 2007/0061266 (2007-03-01), Moore et al.
patent: 2007/0143624 (2007-06-01), Steeves
Julian Assange, “Rubberhose deniable encryption”, Aug. 2000.
Don Child, “Lotus Notes and Domino Server 4.6 Security Overview”, 1997.
ADT Security Services, “ADT Security Manager 2000 User's Manual”, 1999.
TrueCrypt Foundation, “TrueCrypt Disk Encryption Software”, 2004.
Unknown, “Open Specifications Integrate One-Time Passwords with Enterprise Applications,” RSA Security, http://www.rsa.com/rsalabs/otps/datasheets/OTP—WP—0205.pdf, as viewed Feb. 6, 2007.
Kevin Bullis, “Smart Cards with Built-In Fingerprint Scanners,” Technology Review, MIT, Cambridge, Mass., Jun. 27, 2006, available online at http://www.technologyreview.com/read—article.aspx?id=17040&ch=biztech, as viewed Jun. 27, 2006.
Unknown, “Mobile Processing Solutions,” eProcessing Network, available online at http://www.eprocessingnetwork.com/mobile.html, as viewed Jan. 20, 2007.
B. Aboba, “Extensible Authentication Protocol (EAP),” Network Working Group, The Internet Engineering Task Force, available online at http://www.ietf.org/rfc/rfc3748.txt, as viewed Apr. 23, 2006.
Deb Shinder, “Passwords: the Weak Link in Network Security,” Jul. 22, 2004, WindowSecurity.com, available online at http://www.windowsecurity.com/articles/Passwords—Network—Security.html, as viewed Jul. 14, 2007.
Michelle Speir Haase, “Mandylion Takes Password Tokens to Next Level,” Nov. 21, 2005, FCW.com, available online at http://www.fcw.com/article91511-11-21-05-Print.
Unknown, “ARM Report,” Division of Banking, Illinois Department of Financial and Professional Regulation, State of Illinois, 2002, available online at http://www.obre.state.il.us/AGENCY/News/atmrpt.htm.
Unknown, “Keystroke Dynamics,” Wikipedia, http://en.wikipedia.org/wiki/Keystroke—dynamics, as viewed Jul. 14, 2007.
Wael Chatila, “Using AJAX for Image Passwords—AJAX Security Part 1 of 3,” http://waelchatila.com/2005/09/18/1127075317148.html as viewed Jan. 7, 2007.
Unknown, “Factotum System of Bell Labs,” http://plan9.bell-labs.com/magic/man2html/4/factotum as viewed Mar. 24, 2007.
Unknown, “AuthEngine: Embedding Strong Authentication in Existing Applications,” CRYPTOCard, Ottawa, Ontario, available at http://www.cryptocard.com/uploads/Documents%2FSolutionSheets%2FSSNewAuthEngine20070704.pdf, as viewed Jul. 14, 2007.
Unknown, “nC AudioCard: Simplify and Secure Multi-channel Electronic Exchanges,” nCryptone, Boulogne-Billancourt, France, available online at http://www.ncryptone.com/produits
caudiocard.asp as viewed Jan. 19, 2007.
Tom Mashberg, “Smart Pages,” Technology Review, vol. 109, No. 4, Sep./Oct. 2006 p. 15, available online at http://www.technologyreview.com/printer—friendly—article.aspx?id=17403.
H. Guan, J. Chang, L. Chen, R. Feris and M. Turk, “Multi-View Appearance-Based 3D Hand Pose Estimation,” IEEE Workshop on Vision for Human Computer Interaction, New York, NY, Jun. 2006, available at http://ilab.cs.ucsb.edu/publications/GuanV4HCI06.pdf, as viewed Jan. 6, 2007.
Unknown, “Mobile 2x2™: A Mobile, Strong Two-Way and Two-Factor Authentication,” Deep Net Security, London, England, available online at http://www.deepnettechnologies.com/products/mobile2x2.asp, as viewed Jul. 14, 2007.
Uknown, “One-Time Password,” Wikipedia, http://en.wikipedia.org/wiki/One-time—password, as viewed Jul. 14, 2007.
Unknown, “Enabling Compliance with Password Policies,” MandyLion Labs, http://www.mandylionlabs.com
ews/WSJ—pr—10—24—05.htm, as viewed Mar. 24, 2007.
Leslie

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security systems for protecting an asset does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security systems for protecting an asset, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security systems for protecting an asset will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4147336

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.