This invention relates generally to the field of digital authentication. More specifically, this invention relates to mobile device enabled desktop tethered and tetherless authentication.
Presently, an individual can log onto their computing device via a mobile device by means such as proximity of the mobile device to the computer. For example, rohos (SafeJKA S.R.L.) performs authentication in a computing device with a Bluetooth® (Bluetooth SIG, Inc., Kirkland, WA) device, in which the mobile device is required to be equipped with Bluetooth®. Proximity identification is limiting because suppose a thief gets hold of a mobile device and brings it close to the computing device. If the computing device allows logging in, because the mobile device is near, the thief then has access to the laptop, which is not a good result.
As well, many organizations rely on technological identity and access management solutions to keep pace with the growth of their organizations, e.g. gaming and hospitality enterprises. Thus, for example, such organizations deploy automated user de-provisioning or password policy enforcement.
In today's environment, partner enterprises allow an external user from one organization outside of their network to have access to an internal application of their organization within their own network. This type of partnership can be referred to as federated identity management. With using federated identity management, an internal application written at Company A can be made publicly available. For a user at Company B on one type of network to access on an entirely different network the internal application written at Company A, the user has to perform the following procedure. The user creates an internal ID at Company A, enters the internal application and maps his external ID from his own network to his internal ID on Company A's network. Further, Company A can allow the user to access their internal application by the user using a social network account, such as a LinkedIn (Mountain View, CA; “LinkedIn”) account for example. Then, Company A can link the external user's social network account sign on to Company A's internal application.
The technique described above allows Company A to manage their partners' access to their internal applications.
Today, there's a technology known as federation, which allows an enterprise to manage their partners' access to their internal applications. However, federation requires high maintenance for every partner company and a lot of initial effort to set up and configure.
A technique is provided that integrates authentication from a mobile device (e.g., using biometrics, social informational data, questions and answers, and more) to allow login to laptops and desktops while they are disconnected from the Internet using a USB cable connection, Bluetooth or local wifi or any other similar protocol and/or connected to Internet without USB. The technique provides a cloud clearinghouse that ties a person's or entity's mobile device(s) to an identity that's used to authenticate a person (could be the same person) on a laptop, desktop, or similar computer system.
One or more embodiments of the present invention are illustrated by way of example and not limitation in the figures of the accompanying drawings.
A technique is provided that integrates authentication from a mobile device (e.g., using biometrics, social informational data, questions and answers, and more) to allow login to laptops and desktops while they are disconnected from the Internet using a USB cable connection, Bluetooth or local wifi or any other similar protocol and/or connected to Internet without USB. The technique provides a cloud clearinghouse that ties a person's or entity's mobile device(s) to an identity that's used to authenticate a person (could be the same person) on a laptop, desktop, or similar computer system.
Also introduced here is a technique with which to access a user's web applications. The user registers and signs on to an aggregator system using any supported login identity provider username and password. When the user registers for the first time, the system collects additional information to verify the user for a subsequent access to the system. The system also automatically creates a system secret username and secret, highly securely generated password, both of which are unknown and inaccessible to the user. The secret username and password are stored in a lightweight directory access protocol (LDAP) server or database or in a distributed cloud database system. The system also maps the login identity provider user name to the secret user name and password for subsequent usage.
References in this description to “an embodiment”, “one embodiment”, or the like, mean that the particular feature, function, structure or characteristic being described is included in at least one embodiment of the present invention. Occurrences of such phrases in this specification do not necessarily all refer to the same embodiment. On the other hand, the embodiments referred to also are not necessarily mutually exclusive.
An exemplary embodiment of an aggregator platform without usernames and passwords is a social single sign-on (“sSSO”) platform. It should be appreciated that the technique discussed herein can also refer to the aggregator system or application, depending on the context of the discussion. Such platform comprises a server that aggregates a plurality of web applications both internal to an organization and that are public facing to login identity providers including social networking sites such as for example LinkedIn or Facebook (Menlo Park, CA; “Facebook”). The platform presents the aggregation of such web applications as links provided to a particular user.
Examples of login identity providers include but are not limited to social networking sites, Linkedin and Facebook. A sample non-exhaustive list can be found in
Non-exhaustive examples of web applications that can be aggregated by the server can be found in
It should be appreciated that the aggregator platform is not limited to the social single sign-on environment. The techniques introduced herein are applicable to aggregators that allow end users to add an application, such that to link to the application at any future time, and from any device, would not need to reenter an ID and/or password. However, employing the social single sign-on implementation of the technique as discussion herein is for purposes of understanding the innovation herein and not for limiting purposes.
To access any of the user's web applications, the user registers and signs on to a social sign-on system (“sSSO”) using any supported login identity provider user name and password. For example, the user can register to sSSO using his user name and password that he uses for his Linkedin account. If the user is registering for the first time, the sSSO collects additional information to verify the user later such as for a subsequent access to sSSO. For example, sSSO can collect but is not limited to collecting the user's mobile phone number, questions and answers related to information unique to the user, pictures, biometric data, and/or social information from the identity providers, such as for example information regarding friends, pictures, dates, and conversations. sSSO also automatically creates an sSSO secret user name and a sSSO secret, highly securely generated password. Both such secret user name and secret password are unknown and inaccessible to the user. In an embodiment, this secret user name and secret password are stored in an lightweight directory access protocol (LDAP) server or database or in a distributed cloud database system, etc. sSSO also maps or links the login identity provider user name to the secret user name and password of sSSO system for subsequent usage.
After the user has registered, the user can start using signal sign-on to login automatically to web applications available to the sSSO system. The login identity provider is mapped to the sSSO secret internal user name for purposes of displaying the configured SSO enabled web applications to the appropriate sSSO logged in user. In short, the sSSO secret internal user name is used to display the right apps (web applications) to the right user. Thus, for example, when the user obtains a new, upgraded smartphone, the user does not need to download and reenter the user ID and password for each of his web applications. The user can access any and all of his applications registered in the sSSO from the sSSO application.
In an embodiment, to enable a web application for sSSO requires entering a user name and optionally a password. An example implementation can be found in
If the SSO web application, e.g. Office Depot in
If the sSSO user decides to login using a new unregistered login identity provider, e.g. Facebook, and the user never enabled that login identity provider web application for SSO, the sSSO system will attempt to identify the end user. For example, the sSSO system can go to and use a stored list of usernames and related metadata such as email addresses, actual names, etc., and display candidate selections, e.g. a list of users with similar names from the registered login identity providers, e.g. FACEBOOK: Julie@yahoo.com. That is, the sSSO system prompts the user to pick the login identity provider user name that they recognize. The login identity provider user name can be received by other input means such as for example the user entering his or her user name in a text box, audibly providing the user name, selecting an image that is recognized by the user, providing biometric data such as a finger print, and so on. In addition to using the received user input, the sSSO verifies the identity of the sSSO user by using additional registration information, that is information which was provided by the user when the user registered. For example, such additional registration information can include but is not limited to SMS, Questions/Answers, already registered login identity provider information, biometric information, etc.
An embodiment can be understood with reference to
Social Federation social single sign-on (“sFed”) can be a system, API, or service that enables an organization such as a company, a university, or a government agency, etc. or end user to easily and securely enable an external party such as a contractor, vendor, alumni, family, friends, etc. access to internal (private) and external (public) web applications without using traditional federation technologies or manyually requiring setting up a new user name and password. sFed combined with sSSO easily and securely shares web site login-related data with any user who already has a username and password on a login identity provider website.
An embodiment of the invention can be understood with reference to
An embodiment of the invention can be understood with reference to
In an embodiment, sSSO enables a user to share login capability along with sharing an application.
An embodiment provides a sSSO delegation administrator model and corresponding functionality. An administrator can delegate a particular sSSO user to a particular sSSO application, as shown in
If the sFed administrator or sSSO end user is delegating (sharing) a SSO enabled web application, that is using a fixed username and password or a known user name and password to multiple people or shared within the organization to the sSSO user, then system is configured to cause the shared web application to automatically appear on the sSSO users' sSSO interface. For example, sFed uses an API or direct database calls to add the new SSO enabled web application to the user's sSSO interface.
If the sFed administrator is delegating a SSO enabled web application that is using a username and password that is unique to the sSSO user, then sFed automatically creates a user name and password on the enabled web application. For example, sFed can use a format for exchanging authentication and authorization data between parties such as between an identity provider and a service provider, e.g. Security Assertion Markup Language (SAML). Or sFed can use internal methods. Then the SSO enabled web application automatically appears enabled on the sSSO user's sSSO interface.
A technique is introduced by which a web crawler system crawls for web applications that require logons, regardless of content. Each identified web application is added to a database, such as for example the sSSO databases 410 or 414, of such type of applications. In accordance to one technique, the web crawler system discovers a web application and then attempts to logon to the application with a bogus ID and a bogus password. If the attempt is unsuccessful, the web crawler system creates a definition for the web application, where the definition defines attributes of the web application. The web crawler system uses these attributes to categorize the web application within the database. Based on matching the categorization and user profiles, the web crawler system offers the web application to a particular user to add the web application to the user's aggregation of web applications. For instance, the web crawler system can display or send a message to the particular user indicating, “You like bicycles. Perhaps you′d like to add this bicycle application (′bikeapp.com) to your aggregated applications.”
A smartphone or tablet paradigm or environment illustrates how the innovation solves the technical problem of using computer network resources and bandwidth efficiently by streamlining user interactions with the network.
For any new device and in particular for the devices shown, the innovation streamlines user interactions with network, because the user does not need to download and reenter a user ID and password for each of the user's applications. With the technique introduced herein, the user can launch any application already registered in the aggregator platform with a single click, for instance as shown in
A further efficiency, among others, is afforded the technique introduced here by enabling a user from any device the ability to login with one click to the aggregator system, e.g. as shown in
A further efficiency is afforded the technique by allowing the user, in addition to launching with one click to a designated application, to add and configure a new application to his already registered applications, as shown in
The computer system 1500 includes a processor 1502, a main memory 1504 and a static memory 1506, which communicate with each other via a bus 1508. The computer system 1500 may further include a display unit 1510, for example, a liquid crystal display (LCD) or a cathode ray tube (CRT). The computer system 1500 also includes an alphanumeric input device 1512, for example, a keyboard; a cursor control device 1514, for example, a mouse; a disk drive unit 1516, a signal generation device 1518, for example, a speaker, and a network interface device 1528.
The disk drive unit 1516 includes a machine-readable medium 1524 on which is stored a set of executable instructions, i.e. software, 1526 embodying any one, or all, of the methodologies described herein below. The software 1526 is also shown to reside, completely or at least partially, within the main memory 1504 and/or within the processor 1502. The software 1526 may further be transmitted or received over a network 1530 by means of a network interface device 1528.
In contrast to the system 1500 discussed above, a different embodiment uses logic circuitry instead of computer-executed instructions to implement processing entities. Depending upon the particular requirements of the application in the areas of speed, expense, tooling costs, and the like, this logic may be implemented by constructing an application-specific integrated circuit (ASIC) having thousands of tiny integrated transistors. Such an ASIC may be implemented with CMOS (complementary metal oxide semiconductor), TTL (transistor-transistor logic), VLSI (very large systems integration), or another suitable construction. Other alternatives include a digital signal processing chip (DSP), discrete circuitry (such as resistors, capacitors, diodes, inductors, and transistors), field programmable gate array (FPGA), programmable logic array (PLA), programmable logic device (PLD), and the like.
It is to be understood that embodiments may be used as or to support software programs or software modules executed upon some form of processing core (such as the CPU of a computer) or otherwise implemented or realized upon or within a machine or computer readable medium. A machine-readable medium includes any mechanism for storing or transmitting information in a form readable by a machine, e.g. a computer. For example, a machine readable medium includes read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other form of propagated signals, for example, carrier waves, infrared signals, digital signals, etc.; or any other type of media suitable for storing or transmitting information.
Further, it is to be understood that embodiments may include performing computations with cloud computing. For the purposes of discussion herein, cloud computing may mean executing algorithms on any network that is accessible by internet-enabled devices, servers, or clients and that do not require complex hardware configurations, e.g. requiring cables, and complex software configurations, e.g. requiring a consultant to install. For example, embodiments may provide one or more cloud computing solutions that enable users, e.g. users on the go, to login to sSSO web applications using social network identity providers or share sSSO web applications anywhere on such internet-enabled devices, servers, or clients. It further should be appreciated that one or more cloud computing embodiments include allowing a user to login to sSSO web applications using social network identity providers or share sSSO web applications using mobile devices, tablets, and the like, as such devices are becoming standard consumer devices.
In accordance with an embodiment, a technique or system integrates authentication from a mobile device (e.g., using biometrics, social, questions and answers, and more) to allow login to laptops and desktops while disconnected from the Internet using a USB cable connection, Bluetooth or local wifi and/or connected to Internet without USB. The innovation provides a cloud clearinghouse that ties a person's or entity's mobile device(s) to an identity that's used to authenticate a person (could be the same person) on a laptop, desktop, or similar computer system.
In an embodiment, an application is installed on the laptop or desktop to recognize the mobile device.
In an embodiment, a Cloud Universal Identification (“Cloud UID”) system stores various identifying attributes and aspects of a user or device. For example, in an embodiment, Cloud UID stores and can retrieve for matching: an email address, a social login, an ID from the Cloud UID's database, a numeric ID, a Windows login, or Active Directory ID.
In an embodiment, prior to a login attempt, a credential provider is installed on the user's PC, laptop, Mac, or similar device. The PC, laptop, Mac, or similar device is communicably connected with Cloud UID and this connection allows the credential provider to authenticate the user. In an embodiment, the credential provider communicates with Cloud UID such that it is able to validate a user is who the user claims to be or that the device is what the device claims to be.
In an embodiment, during a login process, the PC, laptop, Mac, or similar device is turned on by a user. It should be appreciated that the user can be any user, not necessarily the person whose account is associated with the PC, laptop, Mac, or similar device. At the display of the PC, laptop, Mac, or similar device, the user is presented with an option to login via mobile device (“mobile login”). Upon selection of mobile login, an alert is sent to the mobile device registered or associated with the PC, laptop, Mac, or similar device. The alert can indicate something like, “Someone is trying to log in to your laptop. Ok to proceed? If so, please reply by clicking the Yes button, otherwise do nothing or click the No button.” Thus, for example, suppose Parent 1 is working late at the office, but Child 1 needs to log in to Parent 1's desktop at home. Upon Child 1's turning on the desktop, the credential provider can send a message to Cloud UID requesting authentication. Cloud UID can identify the desktop or any other related identifying data (e.g., an associated email address, etc.) from the message by the credential provider and, because “mobile login” was selected and indicated in the message from the credential provider, look up in its database for a way to communication with the registered mobile device. Upon receiving an affirmative indication from the mobile device via any network, the Cloud UID can retrieve and send the log in information (e.g., ID and password) registered for or associated with the desktop automatically and without user intervention to the desktop, resulting in the desktop being logged into.
In an embodiment, the Cloud UID is configured to implement 1, 2, 3, or N factor authentication in conjunction with sending an alert to the mobile device. That is, the Cloud UID requests further and specific data (e.g., email address, active directory ID, social login, etc.) from the turned-on PC, laptop, Mac, or similar device based on is configured factor authentication.
In an embodiment, an app is provided that can be downloaded from an app store onto the mobile device, in which a user enters an ID, which then ties the ID in the cloud to the mobile device, such as for example, via the phone number of the device.
In an embodiment, a credential provider app can be downloaded from a business site and stored on the computing device to cause the computing device to communicate with the Cloud UID.
In an embodiment, in execution, the laptop or desktop sends a notification to the mobile device to perform the authentication process. Thus, for example, suppose a woman is on a social date and brought her laptop with her. Suppose the woman went to the bathroom and left the laptop with the other person with whom she is out on a date. If this other person tries to logon to the laptop while the woman is out of sight, the innovation causes the woman's cell phone to notify or alert her that someone is requesting authentication to log onto the laptop. The woman can choose to proceed or deny the request to log into the laptop.
In an embodiment, a credential provider installed on the computing device talks to the CUID server to obtain clearance to allow a login request. Once the credential provider program obtains clearance, the credential provider allows the requestor to log in to the computing device.
An embodiment can be understood with reference to
In an embodiment, the entity 1610 trying to log into computing device 1606 does not have to be the same entity 1608 to which computing device 1606 belongs or is otherwise authorized to use or own computing device 1606. For example, entity 1610 can be a child trying to log into his parent's 1608 computing device 1606 and, yet, in accordance with the innovation, it is the parent 1608 who authorizes the logging in process.
In an embodiment, entity 1608 has previously registered with and has had stored data reflective of a plurality of identity attributes as discussed within this application. For example, entity 1608 could be the parent of the example above who already has housing loan information, color preferences, social media friends, birthdate, biometric data such as fingerprints, etc., previously stored in a secure storage (not shown) communicably connected to cloud universal identification server 1602.
In an embodiment, cloud universal identification server 1602 is system 400 described in detail above and/or any of its subparts such as for example LDAP 412 or database 414.
In an embodiment, cloud universal identification server 1602 continually updates information about entity 1608 as entity 1608 continues to directly or indirectly provide identity information, such as new or updated medical records, new job applications, and the like. Such digital information can be available to cloud universal identification server 1602 via APIs.
In an embodiment, cloud universal identification server 1602 receives registration information that associates a mobile device with the plurality of identifying attributes associated with the user. For example, entity 1608 can register their mobile device 1604 with cloud universal identification server 1602. In another embodiment, entity 1608 can register their mobile device 1604 with code previously installed on computing device 1606. In an embodiment, entity 1608 registers a plurality of mobile devices 1608 with either or both of cloud universal identification server 1602 and computing device 1606.
In an embodiment, entity 1608 can register a plurality of computing devices 1606 with cloud universal identification server 1602.
Thus, authentication can occur on any registered computing device via any registered mobile device of entity 1608.
In an embodiment, cloud universal identification server 1602 receives, during a login process by entity 1610 to computing device 1606, a request to authenticate the login process at computing device 1606.
In an embodiment, the request is received from mobile device 1604. In the embodiment, computing device 1606 had previously installed code, which initially presents to a user a login option to log in via mobile device. Computing device 1606 is configured to send a type of login request or notification of a login to mobile device 1604, upon receiving user input that mobile device login is selected. Computing device 1606 can know which mobile device to send the request or notification to by various means. Computing device 1606 can detect the presence of mobile device 1604 and be configured to send the request or notification to the detected device. Computing device 1606 can be pre-configured to send any request or notification to specifically mobile device 1604. Computing device 1606 can make a call to cloud universal identification server 1602 to ask to which mobile device to send the request or notification. Other configurations for identifying which mobile device to notify of the login process are contemplated within this discussion.
In an embodiment, mobile device 1604 is tethered to computing device 1606 and computing device 1606 is not connected to the Internet. In this embodiment, computing device 1606 sends the request or notification to mobile device 1604 which has wifi, Bluetooth or other capabilities to communicate over a network with cloud universal identification server 1602 to complete the login process as discussed herein.
In an embodiment, the request is received from code previously installed on computing device 1606.
In an embodiment, cloud universal identification server 1602 confirms, via a parameter in the request, the identity of computing device 1606. For example, cloud universal identification server 1602 can compare and match the identity of computing device 1606 received in the request for authentication with one of previously registered computing devices.
In an embodiment, in response to identifying computing device 1606, mobile device 1604, and their relationship, cloud universal identification server 1602 transmits to mobile device 1604 authentication factors associated with the entity 1608. In an embodiment, the authentication factors were previously stored in the storage of the cloud universal identification server 1602. An example identity authentication system is described in co-assigned patent application titled, “METHOD AND APPARATUS FOR AN IDENTITY ASSURANCE SCORE WITH TIES TO AN ID-LESS AND PASSWORD-LESS AUTHENTICATION SYSTEM,” which is incorporated herein by reference in its entirety. For example, entity 1608 is asked to provide their favorite color, the model of their current car, and a fingerprint to the touchscreen of mobile device 1604.
In an embodiment, cloud universal identification server 1602 receives data which reflects answers to or satisfaction of the authentication factors from mobile device 1604. Subsequently, cloud universal identification server 1602 confirms such received data by comparing and matching such data with data previously stored on the storage of cloud universal identification server 1602. In another embodiment, cloud universal identification server 1602 confirms such received data by comparing and matching such data with data on the Internet in real-time.
After confirming the authentication of entity 1604, cloud universal identification server 1602 transmits to computing device 1606, informational data causing the login process to be successful. For example, the informational data can be presented on a screen on computing device 1606 to entity 1610, indicated a login and password that entity 1610 needs to type in to log into computing device 1606. In another embodiment, cloud universal identification server 1602 transmits the login information computing device 1606 and computing devices 1606 applies that information to complete the login process, without intervention of entity 1610.
In an embodiment, a computer-implemented method (or in alternative embodiments, a system or non-transitory computer-readable medium) is provided, the method comprising: receiving and storing, at a cloud universal identification server having a digital storage, a plurality of identifying attributes associated with a user; receiving and storing, at the cloud universal identification server, registration information that associates a mobile device with the plurality of identifying attributes associated with the user; during a login process to a computing device associated with the user, receiving a request to authenticate the login process at the computing device, the request received from either the mobile device or from code previously installed on the computing device; confirming, at the cloud universal identification server, the identity of computing device of the request for authentication by positively matching the identity of the computing device with one of previously registered computing devices, registered at the cloud universal identification server; transmitting, by the cloud universal identification server, at least three authentication factors associated with the user, the at least three authentication factors for delivery to the mobile device, and the at least three authentication factors obtained or derived from authentication factors associated with the user previously stored in the storage of the cloud universal identification server; and upon receiving, at the cloud universal identification server and from the mobile device, data that satisfies the at least three authentication factors, transmitting for delivery to the computing device, authentication data causing the login process to be successful; wherein one or more steps are performed on at least a processor coupled to at least a memory. The exemplary method can further comprise wherein the computing device is communicably connected to the cloud universal identification server via the previously installed code and wherein such code recognizes the mobile device via a previous registration of the mobile device to the code. The exemplary method can further comprise wherein the entity initiating the login process is not the user. The exemplary method can further comprise wherein the computing device is any of: a desktop or laptop computer. The exemplary method can further comprise wherein an attribute of the plurality of identifying attributes is any of: an email address, a social login, an ID from the digital storage, a numeric ID, a computer login, or Active Directory ID. The exemplary method can further comprise wherein an app was previously downloaded on mobile device for purposes of associating the mobile device with the cloud universal identification server and with the computing device. The exemplary method can further comprise wherein the computing device is configured to send a notification to the mobile device causing the mobile device to request authentication at the cloud universal identification server. The exemplary method can further comprise wherein a plurality of computing devices associated with the user are registered at the cloud universal identification server. The exemplary method can further comprise wherein a plurality of mobile devices associated with the user are registered at the cloud universal identification server.
In an embodiment, biometric authentication may be offered on any network attached Windows PC (the user is not assumed to be an Enterprise user or part of a corporate network, but is a personal user on a home computer, e.g. “grandma” and “kids”).
Herein, the innovation is collectively referred to as “the system.”
How
In an embodiment, biometric authentication calls are incorporated into the credential provider (“CP”) product. When attached to a network, the CP will make calls to a provided biometric partner to validate the user's identity from the CP and allow access.
In an embodiment, the following hold:
The user can download a CP installer from a system web site. The file would be an MSI and would require the user to install with administrative authority (using UAC)
Downloading App from MS App Store
The user can download a CP installer from the MS App store. The app would have to pass any Microsoft-imposed limitations/restrictions in order to be added to the store. Updates to the app would require recertification from MS.
Installation Authority
The user must have administrator authority to install the CP. The CP code will be called from the windows LoginUl, which runs as Administrator, so anything it calls must be installed as Administrator (otherwise any user on the system could install anything they wanted (e.g. keyboard logger, hard disk formatter, etc.) and it might end up being run as Administrator anytime anyone attempts to log in to the box.
OAuth Configuration Use Cases
Initial Downloading of OAuth URL and Credentials
During installation of the CP, the installer will retrieve the current OAuth credentials from the system's Bio Credential cloud service. The CP will only function after credentials have been downloaded, validated, and installed. The credentials will consist of a digitally signed credential file and a*.cer file containing the public certificate that the CP can use to validate the signature of the credential file.
Updating to Current OAuth URL and Credentials
The first time the CP is launched on a given day (i.e., at most, once per day) the CP will query the system's Bio Credential cloud service to check for any updates to the credentials. If updates are available, the CP will download the latest credentials and associated*.cer file, validate the signature, and install them. All future bio authentication calls will use the updated OAuth credentials.
OAuth URL
In order to perform a bio challenge against a user, AIMS currently sends http requests to the base URL of the bio web service:
https://gmi-ha.iwsinc.com
Based on the type of call AIMS is making to the web service, AIMS adds additional components to the URL:
In the text above, the bold items come from the downloaded OAuth credential file. The item is user specific and is specified by the user during a login attempt with the CP.
Partitioning of OAuth Credentials
It may be desirable/required for some CP users to send bio requests with one set of OAuth credentials, while other users send with another. However, if the target audience for the product is individuals, then all individuals would most likely send with the same credentials. For load balancing purposes, CP might not send requests with a comment set of credentials. There is contemplated other reasons to do so (e.g. offering different QoS for a fee).
Security Use Cases
Protecting OAuth Credentials From Tampering
It the OAuth credentials were to be tampered with, then the CP could end up contacting a malicious server to service bio requests, which could lead to revealing user's bio information to a hacker (MITM attack) and could lead to allowing malicious users access to a PC (by using a fake server to return fake positive results). The OAuth credentials need to be protected from being tampering (must be encrypted and/or signed).
Using private/public key signing, the OAuth credential providing service should digitally sign each credential file and provide an associated public key
Protecting OAuth Calls From DNS or/etc/hosts Attack
As the end user's machine contacts the bio server, it needs to be provable that it is communicating with the correct server, otherwise a MITM could collect information and/or provide invalid responses to bio challenges. The code sends requests to the host gmi-ha.iwsinc.com, but if the client were to resolve the host to the IP address of a malicious server, then the server could log user's bio information and/or return false positive results.
May indicate a high level of security:
In one use case a requestor's server talks to the system's authentication server using OAuth 2 credentials through an SSL/TLS framework. Using OAuth2 is a standard mechanism for securing communications and should make hijacking that communications channel more difficult.
On the mobile client-side communication is initiated through APN or GMC networks, which is secured with KPI and then the messages themselves are pulled from our authentication server, which is protected using OAuth 2 credentials through an SSL/TLS framework.
Responses are polled from our servers (using the same security mechanism mentioned above) or sent through postback to designated servers (when using the polling method.) Additionally, each authentication request generates a transactionlD and a responselD, so that can independently verify transaction requests and responses from the server.
Identifying Source of Bio Challenge to End User
Assuming two bio challenges are issued at about the same time (perhaps from two PCs, or may be from a PC and from a web page or a credit card transaction), as the user is presented with the challenges on their device, can the user distinguish which challenge came from which service? What if 2 challenges came at roughly the same time, one from a fraudulent device and one from the real device? If the user could not distinguish between the two, they may approve the first (i.e. the fraudulent one).
Similarly, if an attacker could time things correctly or if they could insert a MITM or even a simple proxy in the network, they could detect that a bio challenge was sent for the user and then immediately send a similar fraudulent challenge just ahead of the true one. This could cause the fraudulent challenge to arrive at the user's device first. The user would be expecting the challenge to arrive and would answer it without suspecting it is fraudulent. The attacker could then use the response to “legitimately” gain access to a resource that they truly don't have the rights to. To solve this issue, the challenge must state from what machine it came; it would be even better if the challenging client displayed a random code and as the challenge arrives, it also contains the same random code to validate which client it came from.
Enrollment Use Cases
Initial Enrollment
After installing the CP, the user first enrolls their biometrics against a local account and then they will be allowed to log into the enrolled local account with biometrics alone. The CP login tile will include field allowing the user to specify who they are and a login button.
In order to unenroll (remove BioEnrollment Data), the user must pass a bio challenge first. The requirement to pass a bio challenge stops a malicious person from removing the BioEnrollment data without the true user's consent. The unenrollment works as follows:
Alternative: So as not to reveal the existence of a given account name, the link can always be enabled.
Alternative: So as not to reveal the existence of a given account name, the link can always be enabled
It shall be possible for a user to reenroll. Reenrollment might be required or desired for reasons such as:
Alternative: So as not to reveal the existence of a given account name, the link can always be enabled.
Alternative: So as not to reveal the existence of a given account name, the link can always be enabled
It shall be possible for a user to rename a previously saved authentication. The user may have mistyped the name previously or might have provided a vague name (such as “thumb”) and would like to refine it to a more specific value (such as “left thumb”).
Authentication Use Cases
BioAuthentication with Single Enrollment
A user may authenticate into their PC by providing their local userid and passing a biometric challenge. The user must first be enrolled at the local machine once prior to doing a bioauthentication. Bioauthentication works as follows:
A user may enroll multiple times (with different fingers, facial, voice, etc) and may wish to choose into their PC by providing their local userid and passing a biometric challenge. The user must first be enrolled at the local machine once prior to doing a bioauthentication. Bioauthentication works as follows:
Following are user scenarios, according to an embodiment:
The function of a typical CP is to capture credentials (typically userid and password) and serialize them into a known buffer format so that they can be submitted to the LSA (Local Security Administrator).
In the case of a smartcard login, the smartcard appears to contain the needed credentials. The smartcard CP would then get the (encrypted) credentials off of the smart card and provide them, along with a user-entered PIN to the LSA.
There appear to be other ways to authenticate the user (e.g., without a password).
http://stackoverflow.com/questions/41869313/how-to-write-a-ksp-to-hook-up-into-kerb-certificate-logon
RSA provides a CP for logging in to a PC without a password. An embodiment involves an RSA server.
LSA supports custom Authentication Packages. An Authentication Package is a DLL that
Vendors can create a custom Security Support Provider (SSP) using the MS SSP Interface. For example, Microsoft ships a sample SampSSP with the Platform Software Development Kit (SDK) (in win 7 SDK at C:\Program Files\Microsoft SDKs\Windows\v7.1\Samples\security\authentication\sampssp).
A Security Package is deployed as a DLL of one of the following types:
The following describes an example (includes code) of a CP that allows one to log in with just an RFID card, however one must store your userid/password on one's machine ahead of time. Then, when one does a ctrl-alt-del, one sees an RFID CP tile. If one holds one's RFID card near the reader, it confirms one's identity, decrypts one's stored credentials, and submits them to LSA for normal authentication.
See https://www.codeandsec.com/Windows-RFID-Login-Credential-Provider
In an embodiment,
A similar RFID example exists, but with a lot more code in it. It appears to work the same as the first example, in that one must store the userid and password and then use the RFID authentication to indicate that one may decrypt the credentials and submit to LSA for authentication.
https://github.com/tylermenezes/Rfid-Credential-Provider and https://medium.comi@tylermenezes/rfid-credential-provider-d0bf8ef29b16
MySmartLogon has a youtube showing how an rfid can be treated similarly to a smartcard to authenticate without a password. It appears to generate PKI certificates for the user during enrollment/provisioning and then the user can log on with the certificate later without a password. It appears that the certificate is stored either in the RFID (not likely) or the RFID's value is used as a key to look up the certificate from somewhere else.
Windows 10 Hello
Windows 10 Hello provides new Authentication and user identity support. (C #SDK is included for windows 10 and Universal Windows Platform (UWP) apps).
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention. Accordingly, the invention should only be limited by the Claims included below.
This patent application is a continuation of U.S. patent application Ser. No. 17/521,611, filed Nov. 8, 2021, which is a continuation of U.S. patent application Ser. No. 15/970,780, MOBILE DEVICE ENABLED DESKTOP TETHERED AND TETHERLESS AUTHENTICATION, filed May 3, 2018, now U.S. Pat. No. 11,171,941, which is a continuation-in-part of U.S. patent application Ser. No. 15/626,997, AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS, filed Jun. 19, 2017, now U.S. Pat. No. 9,979,715, which is incorporated herein by reference in its entirety, which is a divisional of U.S. patent application Ser. No. 15/052,747, now U.S. Pat. No. 9,686,273, AGGREGATOR TECHNOLOGY WITHOUT USERNAMES AND PASSWORDS, filed Feb. 24, 2016, which is incorporated herein by reference in its entirety, and additionally claims priority from U.S. Provisional Patent Application No. 62/120,153, SOCIAL SINGLE SIGN-ON AGGREGATOR WITHOUT USERNAMES AND PASSWORDS, filed Feb. 24, 2015, which is also incorporated herein by this reference in its entirety, and this patent application claims priority from U.S. Provisional Patent Application No. 62/501,027, MOBILE DEVICE ENABLED DESKTOP TETHERED AND TETHERLESS AUTHENTICATION AND METHOD AND APPARATUS FOR A SOCIAL NETWORK SCORE AND IDENTITY ASSURANCE SCORE TIES TO ID-LESS AND PASSWORD-LESS AUTHENTICATION SYSTEM, filed May 3, 2017, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6606627 | Guthrie et al. | Aug 2003 | B1 |
7058817 | Ellmore | Jun 2006 | B1 |
7103666 | Royer et al. | Sep 2006 | B2 |
7240364 | Branscomb et al. | Jul 2007 | B1 |
7260724 | Dickinson et al. | Aug 2007 | B1 |
7346923 | Atkins et al. | Mar 2008 | B2 |
7490347 | Schneider et al. | Feb 2009 | B1 |
7536389 | Prabhakar et al. | May 2009 | B1 |
8073810 | Maes | Dec 2011 | B2 |
8533773 | Maes | Sep 2013 | B2 |
8589338 | Maes | Nov 2013 | B2 |
8779890 | Mueck | Jul 2014 | B2 |
9026521 | Daniel | May 2015 | B1 |
9026592 | Marra | May 2015 | B1 |
9060057 | Danis | Jun 2015 | B1 |
9064376 | Rubin | Jun 2015 | B1 |
9065827 | Taylor et al. | Jun 2015 | B1 |
9130910 | Logue | Sep 2015 | B1 |
9294456 | Timmermans | Mar 2016 | B1 |
9301140 | Costigan et al. | Mar 2016 | B1 |
9356924 | Shahbazi et al. | May 2016 | B1 |
9357022 | Chou et al. | May 2016 | B1 |
9363283 | Herrera-yagüe et al. | Jun 2016 | B1 |
9386009 | Marion et al. | Jul 2016 | B1 |
9461991 | Brand | Oct 2016 | B2 |
9497312 | Johansson et al. | Nov 2016 | B1 |
9628576 | Agarwal et al. | Apr 2017 | B1 |
9645789 | Lee et al. | May 2017 | B1 |
9659062 | Kapoor et al. | May 2017 | B1 |
9686273 | Cicchitto | Jun 2017 | B2 |
9722996 | Kolman et al. | Aug 2017 | B1 |
9747434 | Avital | Aug 2017 | B1 |
9749305 | Sharifi Mehr et al. | Aug 2017 | B1 |
9801066 | Hanley et al. | Oct 2017 | B1 |
9807073 | Miller | Oct 2017 | B1 |
9838379 | Bryan | Dec 2017 | B1 |
9979715 | Cicchitto | May 2018 | B2 |
10032037 | Allen | Jul 2018 | B1 |
10050976 | Disraeli | Aug 2018 | B2 |
10068082 | Zheng et al. | Sep 2018 | B1 |
10148619 | Zolfonoon | Dec 2018 | B1 |
10255419 | Kragh | Apr 2019 | B1 |
10469487 | Griffin et al. | Nov 2019 | B1 |
10496810 | Lewis et al. | Dec 2019 | B2 |
10530646 | Hecht | Jan 2020 | B1 |
10609022 | Park | Mar 2020 | B2 |
10715528 | Leblang et al. | Jul 2020 | B1 |
10742634 | Shahbazi et al. | Aug 2020 | B1 |
10891372 | Shahbazi et al. | Jan 2021 | B1 |
11122034 | Cicchitto | Sep 2021 | B2 |
11171941 | Cicchitto | Nov 2021 | B2 |
11206248 | Watson et al. | Dec 2021 | B2 |
11245679 | Su | Feb 2022 | B1 |
11811750 | Cicchitto | Nov 2023 | B2 |
11816672 | Singh et al. | Nov 2023 | B1 |
20020087894 | Foley et al. | Jul 2002 | A1 |
20020112183 | Baird et al. | Aug 2002 | A1 |
20030163738 | Couillard et al. | Aug 2003 | A1 |
20030182212 | Moscone et al. | Sep 2003 | A1 |
20030182548 | Xiong et al. | Sep 2003 | A1 |
20040168059 | Patrick | Aug 2004 | A1 |
20040181670 | Thune et al. | Sep 2004 | A1 |
20050066199 | Lin | Mar 2005 | A1 |
20050071685 | Ho | Mar 2005 | A1 |
20050075135 | Cromer | Apr 2005 | A1 |
20050149520 | De | Jul 2005 | A1 |
20050204405 | Wormington et al. | Sep 2005 | A1 |
20050235044 | Tazuma | Oct 2005 | A1 |
20050238159 | Halsell et al. | Oct 2005 | A1 |
20050273850 | Freund | Dec 2005 | A1 |
20060075230 | Baird et al. | Apr 2006 | A1 |
20060085840 | Bruck | Apr 2006 | A1 |
20060190486 | Zhou et al. | Aug 2006 | A1 |
20070143860 | Hardt | Jun 2007 | A1 |
20070214494 | Uruta et al. | Sep 2007 | A1 |
20070239730 | Vigelette et al. | Oct 2007 | A1 |
20080263632 | Keon | Oct 2008 | A1 |
20080289006 | Hock et al. | Nov 2008 | A1 |
20090017847 | Mendiola et al. | Jan 2009 | A1 |
20090127332 | Park et al. | May 2009 | A1 |
20090282256 | Rakic et al. | Nov 2009 | A1 |
20090288143 | Stebila et al. | Nov 2009 | A1 |
20090292814 | Ting et al. | Nov 2009 | A1 |
20090292927 | Wenzel et al. | Nov 2009 | A1 |
20100088696 | Stoev et al. | Apr 2010 | A1 |
20100107229 | Najafi et al. | Apr 2010 | A1 |
20100317320 | Sakargayan | Dec 2010 | A1 |
20110010701 | Cooper et al. | Jan 2011 | A1 |
20110125511 | Bakst | May 2011 | A1 |
20110125550 | Erhart et al. | May 2011 | A1 |
20110130172 | Rao | Jun 2011 | A1 |
20110142234 | Rogers | Jun 2011 | A1 |
20110153740 | Smith et al. | Jun 2011 | A1 |
20110197287 | Hess et al. | Aug 2011 | A1 |
20110246196 | Bhaskaran | Oct 2011 | A1 |
20110282706 | Ezra et al. | Nov 2011 | A1 |
20120047147 | Redstone et al. | Feb 2012 | A1 |
20120054357 | Kuritzky et al. | Mar 2012 | A1 |
20120072979 | Cha et al. | Mar 2012 | A1 |
20120110072 | de Villiers | May 2012 | A1 |
20120124367 | Ota et al. | May 2012 | A1 |
20120137340 | Jakobsson et al. | May 2012 | A1 |
20120201381 | Miller et al. | Aug 2012 | A1 |
20120215621 | Heffernan et al. | Aug 2012 | A1 |
20120226678 | Park et al. | Sep 2012 | A1 |
20120264405 | Bravo et al. | Oct 2012 | A1 |
20120278241 | Brown | Nov 2012 | A1 |
20130035982 | Zhang et al. | Feb 2013 | A1 |
20130036459 | Liberman et al. | Feb 2013 | A1 |
20130055348 | Strauss et al. | Feb 2013 | A1 |
20130090084 | Cherubini et al. | Apr 2013 | A1 |
20130097651 | Rendahl et al. | Apr 2013 | A1 |
20130110765 | Heidasch | May 2013 | A1 |
20130111208 | Sabin | May 2013 | A1 |
20130122934 | Branch et al. | May 2013 | A1 |
20130124539 | Lin et al. | May 2013 | A1 |
20130166918 | Shahbazi et al. | Jun 2013 | A1 |
20130173333 | Zhang et al. | Jul 2013 | A1 |
20130179681 | Benson et al. | Jul 2013 | A1 |
20130232543 | Cheng et al. | Sep 2013 | A1 |
20130254283 | Garcia-Martinez et al. | Sep 2013 | A1 |
20130254849 | Alison | Sep 2013 | A1 |
20130263021 | Dunn et al. | Oct 2013 | A1 |
20130268994 | Cooper et al. | Oct 2013 | A1 |
20130276125 | Bailey | Oct 2013 | A1 |
20130282589 | Shoup et al. | Oct 2013 | A1 |
20130290475 | Flagg et al. | Oct 2013 | A1 |
20130311301 | Grant et al. | Nov 2013 | A1 |
20130314208 | Risheq et al. | Nov 2013 | A1 |
20130337773 | Nozulak | Dec 2013 | A1 |
20140007196 | Lin | Jan 2014 | A1 |
20140020078 | Canning et al. | Jan 2014 | A1 |
20140032758 | Barton et al. | Jan 2014 | A1 |
20140040020 | Shanmugam et al. | Feb 2014 | A1 |
20140047510 | Belton et al. | Feb 2014 | A1 |
20140059029 | Magill et al. | Feb 2014 | A1 |
20140095874 | Desai | Apr 2014 | A1 |
20140123157 | Keskitalo et al. | May 2014 | A1 |
20140130159 | Raman | May 2014 | A1 |
20140157390 | Lurey et al. | Jun 2014 | A1 |
20140157401 | Alameh et al. | Jun 2014 | A1 |
20140172837 | Sommer | Jun 2014 | A1 |
20140173754 | Barbir | Jun 2014 | A1 |
20140221012 | Uetabira | Aug 2014 | A1 |
20140223009 | Ohkuma | Aug 2014 | A1 |
20140223532 | Satoh | Aug 2014 | A1 |
20140241519 | Watson et al. | Aug 2014 | A1 |
20140250499 | Vercruysse | Sep 2014 | A1 |
20140258547 | Scavo et al. | Sep 2014 | A1 |
20140273963 | Su et al. | Sep 2014 | A1 |
20140279038 | Lombard | Sep 2014 | A1 |
20140282870 | Markwordt et al. | Sep 2014 | A1 |
20140282964 | Stubblefield | Sep 2014 | A1 |
20140282977 | Madhu et al. | Sep 2014 | A1 |
20140297342 | Ogata et al. | Oct 2014 | A1 |
20140317689 | Mogush | Oct 2014 | A1 |
20140330651 | Klemm et al. | Nov 2014 | A1 |
20140355039 | Tsujimoto et al. | Dec 2014 | A1 |
20140365782 | Beatson et al. | Dec 2014 | A1 |
20150025980 | Zaretsky et al. | Jan 2015 | A1 |
20150026477 | Malatack et al. | Jan 2015 | A1 |
20150028996 | Agrafioti et al. | Jan 2015 | A1 |
20150046340 | Dimmick | Feb 2015 | A1 |
20150066745 | Lee | Mar 2015 | A1 |
20150074118 | Garcia-sanchez et al. | Mar 2015 | A1 |
20150089585 | Novack | Mar 2015 | A1 |
20150089613 | Tippett et al. | Mar 2015 | A1 |
20150095137 | Savelli et al. | Apr 2015 | A1 |
20150106924 | Shahbazi | Apr 2015 | A1 |
20150113007 | Hatchard et al. | Apr 2015 | A1 |
20150113627 | Curtis | Apr 2015 | A1 |
20150119002 | Chen et al. | Apr 2015 | A1 |
20150121504 | Lin | Apr 2015 | A1 |
20150124963 | Mccusker et al. | May 2015 | A1 |
20150127678 | Alvi et al. | May 2015 | A1 |
20150134433 | Muller | May 2015 | A1 |
20150135296 | Cason et al. | May 2015 | A1 |
20150149373 | Chhaya et al. | May 2015 | A1 |
20150149529 | Loader et al. | May 2015 | A1 |
20150195295 | Sandler et al. | Jul 2015 | A1 |
20150199528 | Bobinski | Jul 2015 | A1 |
20150199645 | Sulur et al. | Jul 2015 | A1 |
20150205794 | Allen et al. | Jul 2015 | A1 |
20150220718 | Hong | Aug 2015 | A1 |
20150227725 | Grigg et al. | Aug 2015 | A1 |
20150229624 | Grigg et al. | Aug 2015 | A1 |
20150242605 | Du et al. | Aug 2015 | A1 |
20150245204 | Heydon | Aug 2015 | A1 |
20150261756 | Klemm et al. | Sep 2015 | A1 |
20150264084 | Kashyap et al. | Sep 2015 | A1 |
20150302302 | Kim et al. | Oct 2015 | A1 |
20150304330 | Soamboonsrup et al. | Oct 2015 | A1 |
20150310434 | Cheung | Oct 2015 | A1 |
20150324563 | Deutschmann et al. | Nov 2015 | A1 |
20150332067 | Gorod | Nov 2015 | A1 |
20150372995 | Hefter | Dec 2015 | A1 |
20160012194 | Prakash et al. | Jan 2016 | A1 |
20160019546 | Eisen | Jan 2016 | A1 |
20160027108 | Addison | Jan 2016 | A1 |
20160028688 | Chizhov et al. | Jan 2016 | A1 |
20160048662 | Arnoud et al. | Feb 2016 | A1 |
20160050203 | Hefetz | Feb 2016 | A1 |
20160050234 | Choyi et al. | Feb 2016 | A1 |
20160055326 | Votaw et al. | Feb 2016 | A1 |
20160055487 | Votaw et al. | Feb 2016 | A1 |
20160070704 | Yu | Mar 2016 | A1 |
20160087952 | Tartz et al. | Mar 2016 | A1 |
20160087955 | Mohamad Abdul et al. | Mar 2016 | A1 |
20160087957 | Shah et al. | Mar 2016 | A1 |
20160105801 | Wittenberg et al. | Apr 2016 | A1 |
20160110083 | Kranendonk et al. | Apr 2016 | A1 |
20160112389 | Bortolamiol | Apr 2016 | A1 |
20160112397 | Mankovskii | Apr 2016 | A1 |
20160117328 | Mondal et al. | Apr 2016 | A1 |
20160117355 | Krishnamurthy | Apr 2016 | A1 |
20160132904 | Mondal et al. | May 2016 | A1 |
20160134599 | Ross et al. | May 2016 | A1 |
20160140466 | Sidebottom et al. | May 2016 | A1 |
20160142405 | Deffeyes | May 2016 | A1 |
20160142532 | Bostick et al. | May 2016 | A1 |
20160149891 | Kuper et al. | May 2016 | A1 |
20160155089 | Nakashima et al. | Jun 2016 | A1 |
20160164922 | Boss et al. | Jun 2016 | A1 |
20160171513 | Takeda et al. | Jun 2016 | A1 |
20160173500 | Sharabi et al. | Jun 2016 | A1 |
20160180068 | Das et al. | Jun 2016 | A1 |
20160182556 | Tatourian et al. | Jun 2016 | A1 |
20160183092 | Carlson | Jun 2016 | A1 |
20160217489 | Allard et al. | Jul 2016 | A1 |
20160219027 | Kaplan et al. | Jul 2016 | A1 |
20160226911 | Boss et al. | Aug 2016 | A1 |
20160239573 | Albert et al. | Aug 2016 | A1 |
20160239649 | Zhao | Aug 2016 | A1 |
20160239657 | Loughlin-mchugh et al. | Aug 2016 | A1 |
20160262013 | Redberg et al. | Sep 2016 | A1 |
20160285633 | Allinson et al. | Sep 2016 | A1 |
20160328216 | Leonelli et al. | Nov 2016 | A1 |
20160337351 | Spencer et al. | Nov 2016 | A1 |
20160337403 | Stoops et al. | Nov 2016 | A1 |
20160350309 | Chatterjee et al. | Dec 2016 | A1 |
20160366589 | Jean | Dec 2016 | A1 |
20160381227 | Singh et al. | Dec 2016 | A1 |
20160381548 | Lauer et al. | Dec 2016 | A1 |
20170006012 | Deluca et al. | Jan 2017 | A1 |
20170006020 | Falodiya | Jan 2017 | A1 |
20170019873 | Britt | Jan 2017 | A1 |
20170034160 | Brands et al. | Feb 2017 | A1 |
20170039476 | Eyring et al. | Feb 2017 | A1 |
20170046714 | Van De Velde et al. | Feb 2017 | A1 |
20170053280 | Lishok et al. | Feb 2017 | A1 |
20170064020 | Obukhov et al. | Mar 2017 | A1 |
20170076293 | Cage et al. | Mar 2017 | A1 |
20170085568 | Rolfe et al. | Mar 2017 | A1 |
20170091289 | Ohazulike et al. | Mar 2017 | A1 |
20170093829 | Gitlin et al. | Mar 2017 | A1 |
20170099280 | Goel et al. | Apr 2017 | A1 |
20170099358 | Perez et al. | Apr 2017 | A1 |
20170111349 | Sun | Apr 2017 | A1 |
20170118209 | Saravanan | Apr 2017 | A1 |
20170118211 | Murthy et al. | Apr 2017 | A1 |
20170126509 | Jones-mcfadden et al. | May 2017 | A1 |
20170132203 | Kim et al. | May 2017 | A1 |
20170134366 | Genner et al. | May 2017 | A1 |
20170140141 | Yan et al. | May 2017 | A1 |
20170140643 | Puppo | May 2017 | A1 |
20170142035 | Bradley et al. | May 2017 | A1 |
20170149776 | Hyun | May 2017 | A1 |
20170149843 | Amulothu et al. | May 2017 | A1 |
20170154359 | Zukerman | Jun 2017 | A1 |
20170161272 | Tada et al. | Jun 2017 | A1 |
20170169264 | Britt | Jun 2017 | A1 |
20170169433 | De Magalhaes et al. | Jun 2017 | A1 |
20170169640 | Britt | Jun 2017 | A1 |
20170171181 | Britt | Jun 2017 | A1 |
20170180539 | Payack | Jun 2017 | A1 |
20170195879 | Jones-mcfadden | Jul 2017 | A1 |
20170201520 | Chandoor | Jul 2017 | A1 |
20170201550 | Benson et al. | Jul 2017 | A1 |
20170221156 | Mingarelli et al. | Aug 2017 | A1 |
20170272941 | Hanay | Sep 2017 | A1 |
20170277691 | Agarwal | Sep 2017 | A1 |
20170279789 | Miao | Sep 2017 | A1 |
20170300946 | Wilkinson et al. | Oct 2017 | A1 |
20170308902 | Quiroga | Oct 2017 | A1 |
20170318007 | Cleeve | Nov 2017 | A1 |
20170324729 | Hon et al. | Nov 2017 | A1 |
20170339631 | Pugaczewski et al. | Nov 2017 | A1 |
20170347264 | Holland et al. | Nov 2017 | A1 |
20170353442 | Burch et al. | Dec 2017 | A1 |
20170353456 | Coronel et al. | Dec 2017 | A1 |
20170364912 | Ross et al. | Dec 2017 | A1 |
20170374090 | Mcgrew et al. | Dec 2017 | A1 |
20180007062 | Maheshwari et al. | Jan 2018 | A1 |
20180032722 | Carlson et al. | Feb 2018 | A1 |
20180034798 | Vincent | Feb 2018 | A1 |
20180048472 | Pirrwitz et al. | Feb 2018 | A1 |
20180054467 | Abou Mahmoud et al. | Feb 2018 | A1 |
20180089318 | Chatterjee et al. | Mar 2018 | A1 |
20180110475 | Shaya | Apr 2018 | A1 |
20180113952 | Brown | Apr 2018 | A1 |
20180114216 | Joseph et al. | Apr 2018 | A1 |
20180124033 | Greenspan et al. | May 2018 | A1 |
20180130002 | Dekoekkoek et al. | May 2018 | A1 |
20180139206 | Ezell et al. | May 2018 | A1 |
20180158061 | Edelstein et al. | Jun 2018 | A1 |
20180158100 | Barak et al. | Jun 2018 | A1 |
20180176212 | Nair | Jun 2018 | A1 |
20180196813 | Lin et al. | Jul 2018 | A1 |
20180197128 | Carstens et al. | Jul 2018 | A1 |
20180204260 | Mcgregor et al. | Jul 2018 | A1 |
20180218356 | Grassadonia et al. | Aug 2018 | A1 |
20180227128 | Church | Aug 2018 | A1 |
20180232641 | Bostick et al. | Aug 2018 | A1 |
20180234411 | Masiero et al. | Aug 2018 | A1 |
20180247271 | Van Hoang et al. | Aug 2018 | A1 |
20180247312 | Loganathan et al. | Aug 2018 | A1 |
20180262471 | Pereira et al. | Sep 2018 | A1 |
20180262484 | Kesari | Sep 2018 | A1 |
20180287883 | Joshi et al. | Oct 2018 | A1 |
20180293670 | Yin | Oct 2018 | A1 |
20180295128 | Drake et al. | Oct 2018 | A1 |
20180295146 | Kovega et al. | Oct 2018 | A1 |
20180309752 | Villavicencio et al. | Oct 2018 | A1 |
20180324126 | Grant et al. | Nov 2018 | A1 |
20180337932 | Juster et al. | Nov 2018 | A1 |
20180351925 | Badri et al. | Dec 2018 | A1 |
20180359244 | Cockerill | Dec 2018 | A1 |
20180367526 | Huang et al. | Dec 2018 | A1 |
20190034976 | Hamedi et al. | Jan 2019 | A1 |
20190042656 | Germishuys | Feb 2019 | A1 |
20190052722 | Gasking | Feb 2019 | A1 |
20190087746 | Jain et al. | Mar 2019 | A1 |
20190102459 | Patterson | Apr 2019 | A1 |
20190108209 | Ahuja et al. | Apr 2019 | A1 |
20190109842 | Kumar et al. | Apr 2019 | A1 |
20190124023 | Conroy et al. | Apr 2019 | A1 |
20190132323 | Williams et al. | May 2019 | A1 |
20190139148 | Piel | May 2019 | A1 |
20190146773 | Attard | May 2019 | A1 |
20190158491 | Burmester et al. | May 2019 | A1 |
20190188617 | Copeland et al. | Jun 2019 | A1 |
20190197231 | Meier | Jun 2019 | A1 |
20190228178 | Sharma et al. | Jul 2019 | A1 |
20190245871 | Ward et al. | Aug 2019 | A1 |
20190253243 | Zimmerman et al. | Aug 2019 | A1 |
20190334943 | Arvanites et al. | Oct 2019 | A1 |
20210224799 | Ongpin et al. | Jul 2021 | A1 |
Number | Date | Country |
---|---|---|
1089516 | Apr 2001 | EP |
Entry |
---|
Grassi, Paul A, et al., “Digital Identity Guidelines”, NIST Special Publication 800-63A, Jun. 2017, 1-32. |
Grassi, Paul A, et al., “Digital Identity Guidelines”, NIST Special Publication 800-63C, Jun. 2017, 1-34. |
Grassi, Paul A, et al., “Digital Identity Guidelines”, NIST Special Publication 800-63 Revision 3, Jun. 2017, 1-53. |
Grassi, Paul A, et al., “Digital Identity Guidelines”, NIST Special Publication 800-63B, Jun. 2017, 1-55. |
Number | Date | Country | |
---|---|---|---|
20240031352 A1 | Jan 2024 | US |
Number | Date | Country | |
---|---|---|---|
62501027 | May 2017 | US | |
62120153 | Feb 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15052747 | Feb 2016 | US |
Child | 15626997 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17521611 | Nov 2021 | US |
Child | 18375429 | US | |
Parent | 15970780 | May 2018 | US |
Child | 17521611 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15626997 | Jun 2017 | US |
Child | 15970780 | US |