System and method for establishing historical usage-based...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S003000, C705S066000, C705S067000

Reexamination Certificate

active

10465163

ABSTRACT:
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords.

REFERENCES:
patent: 5214702 (1993-05-01), Fischer
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5721780 (1998-02-01), Ensor et al.
patent: 5751812 (1998-05-01), Anderson
patent: 5751814 (1998-05-01), Kafri
patent: 5825880 (1998-10-01), Sudia et al.
patent: 5850443 (1998-12-01), Van Oorschot et al.
patent: 5875296 (1999-02-01), Shi et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5987134 (1999-11-01), Shin et al.
patent: 6070243 (2000-05-01), See et al.
patent: 6141759 (2000-10-01), Braddy
patent: 6205479 (2001-03-01), Dulai et al.
patent: 6308274 (2001-10-01), Swift
patent: 6327652 (2001-12-01), England et al.
patent: 6349338 (2002-02-01), Seamons et al.
patent: 6421768 (2002-07-01), Purpura
patent: 6425089 (2002-07-01), Tsai
patent: 6640238 (2003-10-01), Bowman-Amuah
patent: 6658091 (2003-12-01), Naidoo
patent: 6668322 (2003-12-01), Wood et al.
patent: 6678731 (2004-01-01), Howard et al.
patent: 6985953 (2006-01-01), Sandhu et al.
patent: 2001/0034847 (2001-10-01), Gaul
patent: 2001/0056405 (2001-12-01), Muyres
patent: 2002/0042884 (2002-04-01), Wu
patent: 2003/0041141 (2003-02-01), Abdelaziz
patent: 2004/0024851 (2004-02-01), Naidoo
patent: 2004/0041910 (2004-03-01), Naidoo
patent: 2004/0064568 (2004-04-01), Arora
patent: 2004/0064693 (2004-04-01), Pabla
patent: 2004/0086088 (2004-05-01), Naidoo
patent: 2004/0086089 (2004-05-01), Naidoo
patent: 2004/0086090 (2004-05-01), Naidoo
patent: 2004/0086091 (2004-05-01), Naidoo
patent: 2004/0088347 (2004-05-01), Yeager
patent: 2004/0088369 (2004-05-01), Yeager
patent: 2004/0093268 (2004-05-01), Ramchandani
patent: 2004/0199770 (2004-10-01), Roskind
patent: 2005/0132060 (2005-06-01), Mo
patent: 2005/0187934 (2005-08-01), Motsinger
patent: 2005/0188079 (2005-08-01), Motsinger
patent: 2005/0188080 (2005-08-01), Motsinger
patent: 2005/0188222 (2005-08-01), Motsinger
patent: 2005/0188423 (2005-08-01), Motsinger
patent: 2005/0198099 (2005-09-01), Motsinger
patent: 2005/0203773 (2005-09-01), Soto
patent: 1 197 828 (2002-04-01), None
patent: WO 98 51029 (1998-11-01), None
patent: WO 99/64967 (1999-12-01), None
patent: WO 99 65207 (1999-12-01), None
patent: WO 00/07087 (2000-02-01), None
patent: WO 01/38999 (2001-05-01), None
patent: WO 01/73553 (2001-10-01), None
patent: WO 01/90859 (2001-11-01), None
patent: WO 02/32047 (2002-04-01), None
patent: WO 2004/044688 (2004-05-01), None
patent: WO 2004/114082 (2004-12-01), None
patent: WO 2005/060138 (2005-06-01), None
patent: WO 2005//069823 (2005-08-01), None
Teresa F. Lunt, R. Jagannathan, Rosanna Lee, Alan Whitehurst, Sherry Listgarten, “Knowledge-Based Intrusion Detection”, AI Systems in Government Conference, 1989, Proceedings of the Annual Washington, DC, Mar. 27-31, 1989, pp. 102-107.
C. Abad and J. Taylor and C. Sengul and W. Yurcik and Y. Zhou and K. Rowe, “Log Correlation for Intrusion Detection: A Proof of Concept”,In Proc. of the 19th Annual Computer Security Applications Conf. (ACSAC 2003).
Lunt; Knowledge-Based Intrusion Detection; Stanford University, Computer Science Department.
Crosbie, M. et al.; Active Defense of a Computer System using Autonomous Agents; Department of Computer Sciences, Purdue University, West Lafayette, IN; Feb. 15, 1995.
Sequeira, K. et al.; ADMIT: Anomaly-Based Data Mining for Intrusions; Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY.
Lane, T. et al.; An Application of Machine Learning to Anomaly Detection; School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN; Feb. 14.
Abad, C. et al.; Log Correlation for Intrusion Detection: A Proof of Concept; Department of Computer Science, University of Illinois at Urbana-Champaign.
Endler, D.; Intrusion Detection Applying Machine Learning to Solaris Audit Data; Department of Electrical Engineering and Computer Science, Tulane University, New Orleans.
Gonzalez, L.; Current Approaches to Detecting Intrusions; Nova Southeastern University, Graduate School of Computer and Information Sciences, Fort Lauderdale, FL; 2002.
Lane, T. et al.; Detecting the Abnormal: Machine Learning in Computer Security; School of Electrical and Computer Engineering, Purdue University, West Lafayetta, IN; Januar.
Furui, Sadaoki. Cepstral Anaylsis Technique For Automatic Speaker Verification. IEEE Transactions on Acoustics. Speech, and Signal Processing. vol. ASSp-9. No. 2. Apr. 1981.
Schalk, Thomas. Speaker Verification Over the Telephone Network. Feb./Mar. 1991. Dallas, TX. pp. 32-35.
Smith, Sidney L. Authenticating Users by Word Association. Dec. 1987. Computers and Security.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for establishing historical usage-based... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for establishing historical usage-based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for establishing historical usage-based... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3873771

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.