Patent application number | Description | Published |
20110219230 | SYSTEM AND METHOD OF NOTIFYING MOBILE DEVICES TO COMPLETE TRANSACTIONS - A method including registering an authority device for an account on an auth platform; receiving transaction request from an initiator to the auth platform; messaging the authority device with the transaction request; receiving an authority agent response from the authority device to the auth platform; if the authority agent response confirms the transaction, communicating a confirmed transaction to the initiator; and if the authority agent response denies the transaction, communicating a denied transaction to the initiator. | 09-08-2011 |
20120198228 | SYSTEM AND METHOD FOR DIGITAL USER AUTHENTICATION - A method according to preferred embodiment can include receiving a request at a server from a private key module associated with a first user device; directing a request for a first portion of the private key from the server to a second user device; and in response to a successful user challenge creating a first portion of a digital signature and a second portion of a digital signature at the server. The method of the preferred embodiment can further include combining the first portion of the digital signature and the second portion of the digital signature; and delivering the digital signature to the first user device. The method of the preferred embodiment can function to secure the digital signature process by splitting or dividing the user's private key into two or more portions, each of which require independent authorization from the user in order to create the digital signature. | 08-02-2012 |
20120198535 | SYSTEM AND METHOD FOR EMBEDDED AUTHENTICATION - Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface. | 08-02-2012 |
20130091544 | SYSTEM AND METHOD FOR ENFORCING A POLICY FOR AN AUTHENTICATOR DEVICE - A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance. | 04-11-2013 |
20130212387 | SYSTEM AND METHOD FOR DELIVERING A CHALLENGE RESPONSE IN AN AUTHENTICATION PROTOCOL - A system and method for authenticating a user that includes receiving an access-request of a network protocol at a challenge-response server; determining if an access-challenge message is required; delivering an active script component through a parameter of an access-challenge message of the network protocol when an access-challenge is required; receiving a challenge-response of a user; validating the challenge-response; and selectively sending an access-accept response for a valid challenge-response and sending an access-denied response for an invalid challenge-response. | 08-15-2013 |
20130312078 | SYSTEM AND METHOD FOR EMBEDDED AUTHENTICATION - Various systems and methods of embedded authentication are described herein. One method of the preferred embodiment can include receiving at an authentication server a transaction token from a host website, the host website including an embeddable interface and prompting a user challenge by the authentication server at the embeddable interface. The method of the preferred embodiment can also include creating a signed authentication token in response to a successful user challenge, and transmitting the signed authentication token from the authentication server to the embeddable interface. | 11-21-2013 |
20140245389 | SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS - A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider. | 08-28-2014 |
20140245396 | SYSTEM AND METHOD FOR INTEGRATING TWO-FACTOR AUTHENTICATION IN A DEVICE - A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider. | 08-28-2014 |
20140245450 | SYSTEM AND METHOD FOR PATCHING A DEVICE THROUGH EXPLOITATION - A system and method that includes identifying a vulnerability in a computing device; accessing a vulnerability exploitation mapped to the identified vulnerability; at the computing device, executing the vulnerability exploitation and entering an operating mode of escalated privileges; and while in the operating mode of escalated privileges, updating the system with a vulnerability resolution. | 08-28-2014 |
20150040190 | SYSTEM AND METHOD FOR PROXYING FEDERATED AUTHENTICATION PROTOCOLS - A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider. | 02-05-2015 |
20150046989 | SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE - A system and method that includes receiving a first device profile and associating the first device profile with a first application instance that is assigned as an authentication device of a first account; receiving a second device profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second device profile to the first device profile; and completing the request of the second application instance according to results of comparing the second device profile and the first device profile. | 02-12-2015 |
20150046990 | SYSTEM AND METHOD FOR VERIFYING STATUS OF AN AUTHENTICATION DEVICE THROUGH A BIOMETRIC PROFILE - A system and method that includes receiving a first biometric profile and associating the first biometric profile with a first application instance that is assigned as an authentication device of a first account; receiving a second biometric profile for a second application instance, wherein the second application instance is making a request on behalf of the first account; comparing the second biometric profile to the first biometric profile; and completing the request of the second application instance according to results of comparing the second biometric profile to the first biometric profile. | 02-12-2015 |
20150074408 | SYSTEM AND METHOD FOR CENTRALIZED KEY DISTRIBUTION - A system and method for distributing key pair credentials that includes receiving a public key message at a key master service, wherein the public key message originates from a first client application; associating a key identifier with the public key; storing the public key at the key master service indexed at least by a key identifier; receiving a request for a public key from an outside service, wherein the request specifies a key identifier; and responding to the request with a public key according to the key identifier. | 03-12-2015 |
20150074644 | SYSTEM AND METHOD FOR DETERMINING COMPONENT VERSION COMPATIBILITY ACROSS A DEVICE ECOSYSTEM - A system and method that include collecting device version profiles from a plurality of device sources; classifying the device version profiles into a device profile repository; receiving a component version query request; querying the device profile repository according to the version query request; and responding to the query request with results of the query. | 03-12-2015 |