In an online computing environment, backup authentication mechanisms help users or account holders who have forgotten their passwords regain access to their accounts. The security and reliability of today's backup authentication mechanisms have significant room for improvement.
Website accounts have typically allowed access thereto by authenticating account holders using credentials that are either memorized or stored, e.g. passwords or smartcards, by the users. In such a system, there are always account holders that will forget or lose these memorized or stored credentials.
Passwords are frequently used as a means of primary authentication, meaning passwords are the typical day-to-day means for accessing an account holder's account. Some password mismatches result when account holders mistype passwords or cannot remember which of their passwords to use.
Modern web browsers have integrated password managers that remember and enter account holders' passwords for them. Those who use these features need not enter their passwords as often, and thus may be less likely to remember their passwords when they do need to enter them. These account holders may resort to backup authentication if they lose the data in their password managers, replace their computers, or start working from new computers.
Existing backup systems may use ‘secret’ personal questions and alternate email addresses for backup authentication in the event users forget or loses his access credentials. However, these methods are frequently unreliable. For personal questions, users often forget their answers, especially when answers are case and punctuation sensitive. It is also common for acquaintances of the respective users to be able to guess the answers, even acquaintances not closely associated with the respective account holders or users. In existing methods, many times the questions are not applicable to the general public, not memorable, ambiguous, easily guessable with no knowledge of the account holder, or easily guessable with minimal knowledge of the account holder.
An account holder who tries to authenticate an account using an alternate email address many times finds that the configured address expired upon a change of job, school or Internet service provider. Since other websites rely on email addresses to authenticate their account holders when passwords fail, it is especially important for webmail providers to have a secure and reliable authentication mechanism of last resort.
The ubiquity of mobile phones has made them an attractive option for backup authentication. Some entities already send SMS messages containing authorization codes to supplement primary authentication for high-risk transactions. However, authenticating users by their mobile phones alone is risky as phones are frequently shared or lost.
Some websites offer last-resort backup authentication through their customer-support departments. However, introducing human customer support teams may not provide a strong advantage over automated systems, as information used by support staff to authenticate account holders may be no better than the information available to the automated systems.
The concept of shifting the responsibility to authenticate an individual from one party to another is not new. Authenticating users via alternate email addresses shifts the responsibility to authenticate to the providers of those alternate addresses. In organizations, the responsibility to authenticate users who fail primary authentication is often shifted to system administrators, corporate security, or other support staff
Other systems have used a two-factor primary authentication system (PIN and token) for enterprise use in which account holders who lose tokens can receive help from a pre-selected trustee called a “helper.” In this system, the trustee authenticates using the two factors, PIN and token, in order to generate a “vouchcode” that substitutes for the account holder's lost token. This system is designed for primary authentication and it cannot be assumed that a system administrator is always available if the system fails and a backup authentication is necessary. This system requires the system administrator or trustee to be on the same system as the account holder.
A social authentication system for backup account recovery is described. The backup account recovery system provides for an account holder to obtain his or her password in the event the account holder is unable to gain access to an account using the primary authentication method. The social authentication system allows the account holder to contact several trustees that were previously selected and identified.
Upon being unable to gain access to an account, the account holder contacts one or more trustees to inform them that the account holder needs to regain access to the account and therefore needs to obtain an account recovery code from each trustee. Each trustee may then contact the account recovery system which resides in servers accessible on the Internet. The account recovery system then verifies that the trustee's contact information matches that of a previously identified trustee for the specified account holder. Once the trustee's contact information has been verified to match that of a previously identified trustee for the specified account holder, the account recovery system begins a back and forth dialog with the trustee, whereby the trustees provide information, transmit a link and code provided by the account recovery system, vouch for their contact with the account holder and pledge that the statements they have provided are accurate and that the trustees agree on the course of action. Once this dialog is successfully completed, each trustee is provided with a unique account recovery code, which is then provided to the account holder. Once the required number of account recovery codes has been received, the account holder is able to use them to obtain access to the account.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
The detailed description is described with reference to accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items.
Overview
This document describes a complete social authentication system for backup account recovery. The social authentication system is a system in which account holders initially appoint and later rely on account trustees to help them authenticate. To regain access to their accounts, account holders contact their trustees by phone or in person, so that their trustees may recognize them by their appearance or voice. A trustee who recognizes an account holder may provide the account holder with an account recovery code once the trustee has accessed the account recovery system and complied with its various requirements. An account holder must present a sufficient number of these codes (e.g. two codes from any of four possible trustees) to authenticate.
The overall success of any authentication system depends on four measurement categories:
Setup and maintenance costs: The time or effort required of the account holder to configure or reconfigure the authentication system.
Efficiency: The time or effort required of the account holder each time he or she authenticates to the system.
Reliability: The likelihood that the account holder can successfully authenticate his or her identity.
Security: The time or effort required to impersonate (falsely authenticate as) an account holder, or likelihood of doing so successfully.
Reliability is especially important for a backup authentication system of last resort. Account holders that need to use a backup authentication system of last resort may have no other chance to regain access to their accounts. If a backup authentication system is less secure than the primary mechanism it supports, its very existence will make users' accounts less secure. Fortunately, backup authentication occurs less often than primary authentication, and efficiency may be sacrificed to achieve reliability and security. While the system described below addresses all four measurement categories, it is more focused on the reliability and security aspects.
Illustrative Architecture
The account recovery system of
The account recovery system may also work with as few as one trustee when it is combined with other mechanisms for authenticating the account holder. For example, the account holder might be able to recover an account by answering a personal authentication question and obtaining a single account recovery code. Likewise, a as few as one account recovery code from one trustee may be used in combination with an old account password or a printed code sheet stored in a safe.
In the event an account holder needs to recover an account, the account holder 102 obtains account recovery codes 108 from the trustees 104. An account holder 102 initiates a request 110 to the trustees 104 that instructs them to visit the account recovery system via the network 112 at some network or Internet address provided by the account holder 102 to the trustees 104. Account holders 102 should contact trustees using methods that allow the trustees 104 to verify their identity. Such methods include either voice or visual appearance, i.e., in person, by telephone, by video teleconference, etc. The request 110 alerts the trustees 104 to the fact that account recovery codes 108 must be obtained for account holder 102. Again, depending on the level of security required, the trustees 104 can receive the request 110 from the account holder 102 in-person or by telephone. These methods are preferred in the case of higher levels of security. If security is less critical and expedience is more important, the user interface/email method 114 may be used.
After receiving the request 108 from the account holder 102, the trustees 104 individually contact the network or Internet address provided by the account holder 102. This communication begins the account recovery authentication process 116 located on servers 106. The account recovery authentication process 116 begins with the initial request process 118. After the request 108 is received by the servers 106, the initial request process 118 sends an email or other type of communication to the trustee 104. The trustee 104 is asked to enter the trustee's own email address as well as the address of the account holder 102 the trustee 104 is assisting. An illustrative example of this screen is set forth in
Referring back to
The codes used to authenticate trustees 104 may be contained in a web link as described above. However, the codes do not need to be specific to web links. The trustee 104 may also be asked to copy the code alone and send the code via SMS message or another similar type of communication where the code would be then be entered into a web page.
Referring back to
The trustee authentication email process 120 also causes the servers to create a record to track the request and the email sent to the respective trustee 104 will contain a code pointing to this record. The trustee copies this link into her browser's address bar to continue. This emailed link and code are all that are required to prove the trustee's identity and retrieve the account recovery code 108. An attacker who could convince a trustee 104 to forward the email would be able to retrieve the code. Two countermeasures against this attack are the email's subject, which may begin with a message such as, but not limited to, “**FOR YOU ONLY**”, and the message body, which begins with a conspicuous warning such as, but not limited to, “do not forward any part of this email to anyone” as shown in
When the trustee 104 pastes the link from the trustee-authentication email process 120 into her browser, the trustee 104 is asked to explain why an account recovery code 108 is being requested by choosing from a set of options that are set forth in the query/response process 122.
Referring again to
Finally, a confirmation process 124 is initiated. The respective trustee 104 is asked to provide a pledge asserting that the trustee's previous answers are correct and that the respective trustee 104 understands the potential consequences of giving an account recovery code 108 to someone other than the account holder 102. As an example of confirmation to be entered by the respective trustee 104, the pledge may require the trustee 104 to type the name of the trustee 104, as provided by the account holder 102, and to press a button that says “I promise the above pledge is true”. For example, if a trustee 104 reports receiving a request 110 from the account holder 102 via voicemail, the trustee 104 would be asked to pledge that the trustee 104 will only provide a code after the account holder is reached “in person.”
Referring once again to
Illustrative Flow Diagram
In operation 606, the trustee's computing device 105 receives the verification form and in operation 608, the trustee 104 completes the verification form. The completed verification form is transmitted to the servers 106 in operation 610. In operation 612, one or more of the servers 106 receive the completed verification form. At this point, one or more of the servers 106 may identify the trustee in operation 614. The servers 106 compare the email addresses submitted on the completed verification form with the email addresses for both the respective trustee 104 and the account holder 102 that are contained in the database established when the account holder opened an account and configured the trustees 104. If the email addresses match the addresses stored in the servers 106, the process continues. If the email addresses do not match the addresses stored in the servers 106, the process is aborted. At this point, one or more of the servers 106 may be configured to send an email to the respective trustee 104 stating that the process is aborted and no further communication will be allowed with respect to the account recovery process or the process may allow the trustee another attempt at providing the addresses, depending on the level of security desired. The use of the trustee's email address ensures that the individual who purports to be the trustee actually is the trustee.
In operation 626, the trustee is selected. In operation 628, a transmit link and a code are transmitted to the trustee's email address 105 along with instructions on the next steps for the trustee 104 to take. As discussed above, the transmission to the trustee may only contain a code that may be sent back to the server 110 by SMS message or other similar communications. In this embodiment, a link would not be necessary.
A representative communication is shown in
An attacker who could convince a trustee to forward the email would be able to retrieve the code. Two countermeasures against this attack are the email's subject, which may begin with, as an example only, “**FOR YOU ONLY**”, and the message body, which begins with a conspicuous warning, as an example only, “do not forward any part of this email to anyone.”
Once the servers 106 receive the verified link and code in operation 636, the servers 106 transmit a situational query to the trustee's computing device 105 in operation 638. The computing device 105 receives and the trustee 104 completes the query in operation 640. The response is then transmitted to the servers 106 in operation 642. The servers 106 receive the query response in operation 644. An illustrative example of the query is shown in
These options may convey that the trustee has heard from the account holder personally or that the trustee is responding to a request from a third party. The options that indicate the highest risk of fraud are listed at the top in order to maximize the chance that the trustee will read them before making a choice. If the trustee 104 chooses either of the top two options, the servers will transmit a warning message to computing device 105 in operation 646. The warning message describes telltale signs of fraud and encourages the trustee 104 to contact the account holder by phone or in person. The trustee receives the message in operation 648 at computing device 105. The trustee 104 may, however, given the option to disregard these warnings and continue.
The trustee 104 may also decide not to continue with the process if she is unable to confirm with the account holder that the account holder has requested an account recovery code. The warning message may also be dynamically updated to respond to ongoing security threats.
After the servers 106 have sent the warning message, one or more of the servers 106 transmit the pledge to computing device 105 in operation 650. The computing device 105 receives the pledge in operation 652 and the trustee 104 is asked to pledge to the trustee's previous answers and to pledge her understanding of the potential consequences of giving an account recovery code to someone other than the account holder. This pledge requires the trustee 104 to type the trustee's name, as provided by the account holder, and to press a button that says “I promise the above pledge is true”. For example, if a trustee reports receiving a request from the account holder via voicemail, the trustee would be asked to pledge that a code will be provided after the trustee reaches the account holder “in person.”
After the trustee 104 has signed the pledge, the trustee's computing device 105 transmits the pledge to one or more of the servers 106 in operation 654 and the servers 106 receive the pledge in operation 656. After the servers 106 receive the response to the pledge, the servers 106 determine whether to transmit the account recovery code to the trustee 104 based on a probability that the trustee 104 is operating on behalf of the account holder 102 in operation 658. The probability is based on statistics from the process and known attacker criteria. If the probability is above a certain threshold determined by the level of security required, the servers 106 transmit the account recovery code to the trustee 104 in operation 660. The trustee 104 receives the account recovery code at computing device 105 in operation 662. The account recovery code can be of any format and contain both numeric and alpha characters. An account recovery code with, e.g., six alphanumeric characters has been found to provide a sufficient level of security in most cases. Once the account holder has received the required number of account recovery codes from the predetermined number of trustees, the account holder enters these codes into his account access interface and the account holder is provided access to the account.
If this is the first account recovery code requested for this account holder, the system will then email the remaining trustees to notify them of the event and encourage them to call the account holder. To further protect against attack, the account holder will be notified immediately if already online and whenever he next logs in if he is not online that an account recovery code has been sent to a trustee. If the account holder did not request an account recovery code, the account holder will know there is an attack on his account. If an attack is underway, a call from his trustees would alert the account holder to login and halt the recovery process before the attacker can complete it.
The description herein describes a backup account recovery system of last resort. The account recovery system provides a method of providing an account holder with a secure and reliable means to obtain access to his account in the event a password is lost or forgotten using social authentication. A group of trusted individuals are configured to be acceptable contacts for account recovery codes for the account holder to obtain access to an account. The trusted individuals or trustees then initiate a process with remote servers and the account recovery system to progress through a series of interchanges that provide confidence the trustee is who he says he is and that the account holder has actually requested an account recovery code.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
This application is a continuation of U.S. patent application Ser. No. 12/466,246, filed on May 14, 2009, and entitled “Social Authentication for Account Recovery,” the entirety of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5035625 | Munson et al. | Jul 1991 | A |
5180309 | Egnor | Jan 1993 | A |
5276737 | Micali | Jan 1994 | A |
5712913 | Chaum | Jan 1998 | A |
5719560 | Watkins | Feb 1998 | A |
5719941 | Swift et al. | Feb 1998 | A |
5774588 | Li | Jun 1998 | A |
5793951 | Stein et al. | Aug 1998 | A |
5822544 | Chaco et al. | Oct 1998 | A |
5907618 | Gennaro et al. | May 1999 | A |
5920630 | Wertheimer et al. | Jul 1999 | A |
5948054 | Nielsen | Sep 1999 | A |
6026163 | Micali | Feb 2000 | A |
6058188 | Chandersekaran et al. | May 2000 | A |
6067444 | Cannon et al. | May 2000 | A |
6073099 | Sabourin et al. | Jun 2000 | A |
6128735 | Goldstein et al. | Oct 2000 | A |
6141423 | Fischer | Oct 2000 | A |
6157920 | Jakobsson et al. | Dec 2000 | A |
6160891 | Al-Salqan | Dec 2000 | A |
6185678 | Arbaugh | Feb 2001 | B1 |
6202150 | Young | Mar 2001 | B1 |
6216229 | Fischer | Apr 2001 | B1 |
6243466 | Young | Jun 2001 | B1 |
6249585 | McGrew et al. | Jun 2001 | B1 |
6289353 | Hazlehurst et al. | Sep 2001 | B1 |
6291399 | Henmi et al. | Sep 2001 | B1 |
6389136 | Young et al. | May 2002 | B1 |
6487411 | Laakso et al. | Nov 2002 | B1 |
6594684 | Hodjat et al. | Jul 2003 | B1 |
6755661 | Sugimoto | Jun 2004 | B2 |
6775382 | Al-Salqan | Aug 2004 | B1 |
6941459 | Hind et al. | Sep 2005 | B1 |
6954755 | Reisman | Oct 2005 | B2 |
7082429 | Lin et al. | Jul 2006 | B2 |
7106845 | Zhuk et al. | Sep 2006 | B1 |
7178065 | Dinker et al. | Feb 2007 | B2 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7263717 | Boydstun et al. | Aug 2007 | B1 |
7330971 | Kukreja et al. | Feb 2008 | B1 |
7610491 | Tsao | Oct 2009 | B1 |
7634800 | Ide et al. | Dec 2009 | B2 |
7644285 | Murray | Jan 2010 | B1 |
7788708 | Doane et al. | Aug 2010 | B2 |
7827183 | Fraser et al. | Nov 2010 | B2 |
7831836 | Beck et al. | Nov 2010 | B2 |
7860706 | Abir | Dec 2010 | B2 |
7954144 | Ebrahimi et al. | May 2011 | B1 |
7983979 | Holland, IV | Jul 2011 | B2 |
8015606 | Jevans et al. | Sep 2011 | B1 |
8024280 | Jessus et al. | Sep 2011 | B2 |
8042039 | Anderson | Oct 2011 | B2 |
8078881 | Liu | Dec 2011 | B1 |
8140847 | Wu | Mar 2012 | B1 |
8346701 | Wang et al. | Jan 2013 | B2 |
8364952 | Ho et al. | Jan 2013 | B2 |
8380511 | Cave et al. | Feb 2013 | B2 |
8397291 | Miyazaki et al. | Mar 2013 | B2 |
8489388 | Bonnet et al. | Jul 2013 | B2 |
8505075 | Jevans et al. | Aug 2013 | B2 |
8566247 | Nagel et al. | Oct 2013 | B1 |
20010037328 | Pustejovsky et al. | Nov 2001 | A1 |
20010054155 | Hagan | Dec 2001 | A1 |
20010055388 | Kaliski, Jr. | Dec 2001 | A1 |
20020067832 | Jablon | Jun 2002 | A1 |
20020111934 | Narayan | Aug 2002 | A1 |
20020111941 | Roux et al. | Aug 2002 | A1 |
20020123946 | Haworth | Sep 2002 | A1 |
20020123994 | Schabes et al. | Sep 2002 | A1 |
20020128960 | Lambiotte | Sep 2002 | A1 |
20030004828 | Epstein | Jan 2003 | A1 |
20030050959 | Faybishenko et al. | Mar 2003 | A1 |
20030088544 | Kan et al. | May 2003 | A1 |
20030105959 | Matyas, Jr. et al. | Jun 2003 | A1 |
20030115458 | Song | Jun 2003 | A1 |
20030149900 | Glassman et al. | Aug 2003 | A1 |
20030154406 | Honarvar et al. | Aug 2003 | A1 |
20030182584 | Banes | Sep 2003 | A1 |
20030191627 | Au | Oct 2003 | A1 |
20040006478 | Alpdemir | Jan 2004 | A1 |
20040078775 | Chow et al. | Apr 2004 | A1 |
20040133812 | Ohmori et al. | Jul 2004 | A1 |
20040141508 | Schoeneberger et al. | Jul 2004 | A1 |
20040233040 | Lane et al. | Nov 2004 | A1 |
20040255169 | Little et al. | Dec 2004 | A1 |
20040260694 | Chaudhuri et al. | Dec 2004 | A1 |
20050004905 | Dresden | Jan 2005 | A1 |
20050015376 | Fraser et al. | Jan 2005 | A1 |
20050027583 | Smit et al. | Feb 2005 | A1 |
20050044156 | Kaminski et al. | Feb 2005 | A1 |
20050060643 | Glass et al. | Mar 2005 | A1 |
20050096012 | Borella et al. | May 2005 | A1 |
20050097320 | Golan et al. | May 2005 | A1 |
20050177750 | Gasparini et al. | Aug 2005 | A1 |
20050192792 | Carus et al. | Sep 2005 | A1 |
20050193248 | Idei | Sep 2005 | A1 |
20050198537 | Rojewski | Sep 2005 | A1 |
20050235008 | Camping et al. | Oct 2005 | A1 |
20050246534 | Kirkup et al. | Nov 2005 | A1 |
20050251390 | Catchpole | Nov 2005 | A1 |
20050266387 | Rossides | Dec 2005 | A1 |
20050278292 | Ohi et al. | Dec 2005 | A1 |
20050287507 | Inandik | Dec 2005 | A1 |
20060026227 | Shaughnessy et al. | Feb 2006 | A1 |
20060037073 | Juels | Feb 2006 | A1 |
20060037075 | Frattura et al. | Feb 2006 | A1 |
20060041932 | Cromer | Feb 2006 | A1 |
20060168455 | Kelley | Jul 2006 | A1 |
20060235824 | Cheung et al. | Oct 2006 | A1 |
20060277157 | Seidl et al. | Dec 2006 | A1 |
20060282660 | Varghese et al. | Dec 2006 | A1 |
20060287984 | Chen et al. | Dec 2006 | A1 |
20060294390 | Navratil et al. | Dec 2006 | A1 |
20070050638 | Rasti | Mar 2007 | A1 |
20070061871 | Simpkins et al. | Mar 2007 | A1 |
20070074262 | Kikkoji et al. | Mar 2007 | A1 |
20070078973 | Kussmaul et al. | Apr 2007 | A1 |
20070088952 | Hewitt et al. | Apr 2007 | A1 |
20070106499 | Dahlgren et al. | May 2007 | A1 |
20070192248 | West | Aug 2007 | A1 |
20070196804 | Yoshimura et al. | Aug 2007 | A1 |
20070208948 | Costa-Requena et al. | Sep 2007 | A1 |
20070219781 | Roche et al. | Sep 2007 | A1 |
20070233611 | Boyd et al. | Oct 2007 | A1 |
20070234343 | Gouge et al. | Oct 2007 | A1 |
20070276623 | Kund et al. | Nov 2007 | A1 |
20070276653 | Greenwald et al. | Nov 2007 | A1 |
20070294229 | Au | Dec 2007 | A1 |
20080010678 | Burdette et al. | Jan 2008 | A1 |
20080016011 | Moore | Jan 2008 | A1 |
20080052525 | Botchek | Feb 2008 | A1 |
20080065471 | Reynolds et al. | Mar 2008 | A1 |
20080077799 | Labaton | Mar 2008 | A1 |
20080083021 | Doane et al. | Apr 2008 | A1 |
20080086644 | Beck | Apr 2008 | A1 |
20080097797 | Morris | Apr 2008 | A1 |
20080127296 | Carroll et al. | May 2008 | A1 |
20080133396 | De La Motte | Jun 2008 | A1 |
20080133671 | Kalaboukis | Jun 2008 | A1 |
20080147788 | Omoigui | Jun 2008 | A1 |
20080149518 | Macor | Jun 2008 | A1 |
20080153595 | Chickering et al. | Jun 2008 | A1 |
20080155619 | Constantinof | Jun 2008 | A1 |
20080175377 | Merrill | Jul 2008 | A1 |
20080201132 | Brown et al. | Aug 2008 | A1 |
20080201133 | Cave et al. | Aug 2008 | A1 |
20080216172 | Forman et al. | Sep 2008 | A1 |
20080222041 | Mani | Sep 2008 | A1 |
20080243811 | He et al. | Oct 2008 | A1 |
20080294637 | Liu | Nov 2008 | A1 |
20080307040 | So | Dec 2008 | A1 |
20080313461 | Detienne | Dec 2008 | A1 |
20080313721 | Corella | Dec 2008 | A1 |
20090012926 | Ishikawa et al. | Jan 2009 | A1 |
20090018941 | Gatten | Jan 2009 | A1 |
20090024385 | Hirsch | Jan 2009 | A1 |
20090055642 | Myers | Feb 2009 | A1 |
20090064101 | Boss et al. | Mar 2009 | A1 |
20090067756 | Meyer et al. | Mar 2009 | A1 |
20090070311 | Feng | Mar 2009 | A1 |
20090080662 | Thibadeau | Mar 2009 | A1 |
20090089876 | Finamore et al. | Apr 2009 | A1 |
20090090662 | Quinn | Apr 2009 | A1 |
20090106134 | Royyuru | Apr 2009 | A1 |
20090106846 | Dupray et al. | Apr 2009 | A1 |
20090112828 | Rozenblatt | Apr 2009 | A1 |
20090113530 | Brainard | Apr 2009 | A1 |
20090119371 | Chang et al. | May 2009 | A1 |
20090141986 | Boncyk et al. | Jun 2009 | A1 |
20090144724 | Little | Jun 2009 | A1 |
20090150217 | Luff | Jun 2009 | A1 |
20090158030 | Rasti | Jun 2009 | A1 |
20090158406 | Jancula et al. | Jun 2009 | A1 |
20090171925 | Elder | Jul 2009 | A1 |
20090182728 | Anderson | Jul 2009 | A1 |
20090204594 | Akkiraju et al. | Aug 2009 | A1 |
20090220091 | Howard | Sep 2009 | A1 |
20090226872 | Gunther | Sep 2009 | A1 |
20090241183 | Boss et al. | Sep 2009 | A1 |
20090241201 | Wootton et al. | Sep 2009 | A1 |
20090248665 | Garg et al. | Oct 2009 | A1 |
20090271849 | Kodama et al. | Oct 2009 | A1 |
20090276623 | Jevans | Nov 2009 | A1 |
20090292687 | Fan et al. | Nov 2009 | A1 |
20090313696 | Himberger et al. | Dec 2009 | A1 |
20100005525 | Fischer | Jan 2010 | A1 |
20100019026 | Hochfield et al. | Jan 2010 | A1 |
20100030579 | Dhauvan | Feb 2010 | A1 |
20100043062 | Alexander | Feb 2010 | A1 |
20100049790 | Schreiber | Feb 2010 | A1 |
20100083371 | Bennetts et al. | Apr 2010 | A1 |
20100114989 | Cormode et al. | May 2010 | A1 |
20100161596 | Yan et al. | Jun 2010 | A1 |
20100161601 | Gruber | Jun 2010 | A1 |
20100169244 | Zeljkovic et al. | Jul 2010 | A1 |
20100169338 | Kenedy et al. | Jul 2010 | A1 |
20100180324 | Karur | Jul 2010 | A1 |
20100191686 | Wang et al. | Jul 2010 | A1 |
20100228600 | Lempel | Sep 2010 | A1 |
20100229223 | Shepard et al. | Sep 2010 | A1 |
20100235311 | Cao et al. | Sep 2010 | A1 |
20100250955 | Trevithick | Sep 2010 | A1 |
20100262454 | Sommer et al. | Oct 2010 | A1 |
20100262463 | Tryfon | Oct 2010 | A1 |
20100273139 | Doppelt et al. | Oct 2010 | A1 |
20100275250 | Devadoss | Oct 2010 | A1 |
20100279267 | Swanson | Nov 2010 | A1 |
20100306821 | Cathcart | Dec 2010 | A1 |
20110029436 | Norvell | Feb 2011 | A1 |
20110202982 | Alexander et al. | Aug 2011 | A1 |
20120291137 | Walsh et al. | Nov 2012 | A1 |
Number | Date | Country |
---|---|---|
WO 2004036394 | Apr 2004 | JP |
W02005045550 | May 2005 | WO |
WO2005045550 | May 2005 | WO |
2008070894 | Jun 2008 | WO |
Entry |
---|
Schechter et al., “It's Not What You Know, But Who You Know”, “A social approach to last-resort authentication”, copyright 2009 ACM, Apr. 2009. |
Brainard et al., “Fourth-Factor Authentication: Somebody uou Know”, 2006. |
Cutillo et al., “Privacy Preserving Social Networking Through Decentralization”, 2009. |
Gong et al., “On the Security of Trustee-based Social Authentications”, 2014. |
Javed et al., “Secure Fallback Authentication and the Trusted Friend Attach”, 2014. |
Renaud et al., “A Support Architecture for Multi-channel, Multi-factor Authentication”, 2014. |
Soleymani et al., “Social Authentication Protocol for Mobile Phones”, May 2009. |
Zhan et al., “Authentication Using Multi-Level Social Networks”, 2011. |
“Account Password Recovery, Welcome to the Windows LiveID Account Recovery Help Page,” retrieved on May 25, 2010 at <<https://support.live.com/eform.aspx?productKey=wlidvalidation&ct=eformcs&scrx=1>> Microsoft Corporation, 2010, 1 page. |
Asgharpour et al., “Adaptive Challenge Questions Algorithm in Password Reset/Recovery,” In the First International on Security for Spontaneous Interaction: IWISSI, 2007, 6 pages. |
Bellare et al., “Encapsulated Key Escrow,” Technical Report, Massachusetts Institute of Technology, available at <<http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.367>> 1996, 28 pages. |
Bojars et al., “Using the Semantic Web for linking and reusing data across Web 2.0 communities,” Journal of Web Semantics, Elsevier B.V., 2007, pp. 21-28. |
Brainard et al., “Fourth-Factor Authentication: Somebody You Know,” retrieved on May 24, 2010 at <<http://www.google.co.in/search?hl=en&source=hp&q=Fourth-factor+authentication%3A+somebody+you+know&aq=f&aqi=&aql=&oq=&gs_rfai=>> ACM, Proceedings of Conference on Computer and Communications Security (CCS), Alexandria, VA, 2006, pp. 168-178. |
Brostoff et al., “‘Ten strikes and you're out’: Increasing the number of login attempts can improve password usability,” retrieved on May 24, 2010 at <<http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-brostoff-2.pdf>> John Wiley, Proceedings of Workshop on Human-Computer Interaction and Security Systems (CHI), Fort Lauderdale, FLA, Apr. 2003, pp. 1-4. |
Cambridge University Press, “Edit distance,” retrieved on Sep. 29, 2011 at <<http://nlp.stanford.edu/IR-book/html/mtledition/edit-distance-1.html>> 3 pages. |
Chen et al., “A maximum entropy approach to feature selection in knowledge-based authentication,” Decision Support Systems, vol. 46, Elsevier B.V., 2008, pp. 388-398. |
Chen et al., “Bayesian Networks for Knowledge-Based Authentication,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, No. 5, IEEE 2007, pp. 695-710. |
“Contact Us—Google Accounts Help,” retrieved on May 25, 2010 at <<http://www.google.com/support/accounts/bin/request.py?h1=en&contact_type=ara&ctx=account&uses_apps=no&product=other&submit=continue>> Google, 2010, pp. 1-2. |
Fox, “It's all in the atmosphere,” HeinOnline-62 Fordham L., vol. 62, 1993, 7 pages. |
Garfinkel, “Email-Based Identification and Authentication: An Alternative to PKI?” IEEE Computer Society, 2003, 7 pages. |
“Hacker impersonated Palin, Stole E-Mail Password,” retrieved on May 24, 2010 at <<http://www.breitbart.com/article.php?id=D939AO101>> The Associated Press, 2008, pp. 1-2. |
Heilman, “Liability of the Trustee for the Acts of His Delegate,” HeinOnline—Dick L. Rev. 260, Dickinson Law Review, 1947, 13 pages. |
Innerhofe-Oberperfler, “Using Approximate String Matching Techinques to Join Street,” Jun. 15, 2004, Free University of Bolzano-Bozen, pp. 1-28. |
Jakobsson et al., “Love and Authentication,” retrieved on May 24, 2010 at <<http://www.ravenwhite.com/files/chi08JSWY.pdf>> ACM, Proceedings of Conference on Human Factors in Computing Systems (CHI), Florence, IT, Apr. 2008, pp. 197-200. |
Karnin et al., “On Secret Sharing Sytems,” IEEE Transaction on Information Theory, vol. IT-29, No. 1, Jan. 1983, 7 pages. |
Kent, “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management,” Oct. 14, 2012 at <http://tools.ietf.org/htmal/rfc1422> RFC 1422, Feb. 2003, 32 pages. |
Landru et al., “Protecting a Potential Pensioner's Pension—An Overview of Present and Proposed Law on Trustees' Fiduciary Obligations and Vesting,” Brooklyn Law Review, vol. 40, No. 3., 1974, 61 pages. |
Merriam-Webster online dictionary, “computer,” retrieved at <<http://www.merriam-webster.com/dictionary/computer>> Merriam-Webster Dictionary, 2015, 1 page. |
“NetBank—Demos overview—Commonwealth Bank,” retrieved on May 24, 2010 at <<http://www.commbank.com.au/netbank/netcodesms/>> Commonwealth Bank of Australia, 2010, p. 1. |
O'Gorman et al., “Query-directed passwords,” Computers & Security, vol. 24, Elsevier Ltd., 2005, pp. 546-560. |
Office action for U.S. Appl. No. 12/466,257, dated Aug. 30, 2013, Schechter et al., “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 31 pages. |
Non-Final Office Action for U.S. Appl. No. 12/466,246, dated Oct. 11, 2011, Stuart Schechter, “Social Authentication for Account Recovery,” 29 pages. |
Non-Final Office Action for U.S. Appl. No. 12/466,257, dated Oct. 11, 2011, Stuart Schechter, “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 41 pages. |
Office action for U.S. Appl. No. 12/466,246, dated Nov. 9, 2012, Schechter et al., “Social Authentication for Account Recovery,” 64 pages. |
Office action for U.S. Appl. No. 12/466,257, dated Dec. 30, 2013, Schechter et al., “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 32 pages. |
Office Action for U.S. Appl. No. 12/466,246, dated Mar. 1, 2012, Stuart Schechter, “Social Authentication for Account Recovery,” 52 pages. |
Office Action for U.S. Appl. No. 12/466,257, dated Mar. 15, 2012, Stuart Schechter, “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 48 pages. |
Office action for U.S. Appl. No. 12/466,257, dated Mar. 21, 2013, Schechter et al., “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 44 pages. |
Office action for U.S. Appl. No. 12/466,246, dated Apr. 22, 2013, Schechter et al., “Social Authentication for Account Recovery,” 71 pages. |
Non-Final Office Action for U.S. Appl. No. 12/466,257, dated Jun. 27, 2014, Stuart Schechter, “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 21 pages. |
Podd et al., “Cost-effective Computer Security: Cognitive and Associative Passwords,” retrieved on May 24, 2010 at <<http://www.computer.org/plugins/dl/pdf/proceedings/ozchi/1996/7525/00/75250304.pdf?template=1&loginState=1&userData=anonymous-IP%253A%253AAddress%253A%2B203.8.109.15%252C%2B%255B172.16.161.4%252C%2B203.8.109.15%252C%2B127.0.0.1%255D>> IEEE Proceedings of Australian Conference on Computer-Human Interaction (OZCHI), 1996, pp. 304-305. |
Rabkin, “Personal knowledge questions for fallback authentication: Security questions in the era of Facebook,” retrieved on May 24, 2010 at <<http://cups.cs.cmu.edu/soups/2008/proceedings/p13Rabkin.pdf>> ACM, Proceedings of Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, Jul. 2008, pp. 13-23. |
Risson et al., “Survey of research towards robust peer-to-peer networks: Search methods,” Computer Networks, vol. 50, Elsevier B.V., 2006, pp. 3485-3521. |
Rosenfeld, “A maximum entropy approach to adaptive statistical language modelling,” Computer Speech and Language, vol. 10, Academic Press Limited, 1996, pp. 187-228. |
Schechter et al., “It's no secret, Measuring the security and reliability of authentication via ‘secret’ questions,” retrieved on May 24, 2010 at <<http://guanotronic.com/˜serge/papers/oakland09.pdf>> IEEE Symposium on Security and Privacy, May 2009, pp. 375-390. |
Schechter et al., “It's Not What You Know, But Who You Know—A Social Approach to Lase-Resort Authentication,” In the Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009, pp. 1983-1992. |
Tsai et al., “Exploiting Full Parsing Information to Label Semantic Roles Using an Ensemble of ME and SVM via Integer Linear Programming,” Proceedings of the 9th Conference on Computational Natural Language Learning (CoNLL), Association for Computational Linguistics, 2005, pp. 233-236. |
Van Vesor Wolf et al., “Trustee Environmental Liability: Avoiding the Quagmire,” Environmental Claims Journal, vol. 6, 1994, 1 page. |
Vu et al., “Improving password security and memorability to protect personal and organizational information,” retrieved on May 24, 2010 at <<http://homes.cerias.purdue.edu/˜bhargav/pdf/VulJHCS07.pdf>> Elsevier Ltd., International Journal of Human-Computer Studies, vol. 65, 2007, pp. 744-757. |
Zviran et al., “User Authentication by Cognitive Passwords: an Empirical Assessment,” retrieved on May 24, 2010 at <<http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=00128279>> IEEE Proceedings of Conference on Information Technology, Jerusalem, IL, Oct. 1990, pp. 137-144. |
“Account Password Recovery, Welcome to the Windows LiveID Account Recovery Help Page,” retrieved on May 25, 2010 at <<https://support.live.com/eform.aspx?productKey=wlidvalidation&ct=eformcs&scrx=1>>, Microsoft Corporation, 2010, p. 1. |
Asgharpour et al., “Adaptive Challenge Questions Algorithm in Password Reset/Recovery,” In the First International Workshop on Security for Spontaneous Interaction: IWISSI, 2007, 6 pages. |
Brostoff et al., “‘Ten strikes and you're out’: Increasing the number of login attempts can improve password usability,” retrieved on May 24, 2010 at <<http://www.andrewpatrick.ca/CHI2003/HCISEC/hcisec-workshop-brostoff-2.pdf>> John Wiley, Proceedings of Workshop on Human-Computer Interaction and Security Systems (CHI), Fort Lauderdale, FL, Apr. 2003, pp. 1-4. |
Cambridge University Press, “Edit distance,” retrieved on <<http://nlp.stanford.edu/IR-book/html/mtledition/edit-distance-1.html>> on Sep. 29, 2011, 3 pages. |
Kent, “Privacy Enhancement for Internet Electronic Mail: Part II: Certificate Based Key Management,” Oct. 14, 2012, at <<http://tools.ietf.org/htmal/rfc1422>> RFC 1422, Feb. 2003, 32 pages. |
“NetBank—Demos overview—Commonwealth Bank,” retrieved on May 24, 2010 at <<http://www.commbank.com.au/netbank/netcodesms/>> Commonwealth Bank of Australia, 2010, pp. 1. |
Non-Final Office Action for U.S. Appl. No. 12/466,257, dated Oct. 11, 2011, Stuart Schechter, “Evidence-Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication”, 41 pages. |
Office action for U.S. Appl. No. 12/466,257, dated Dec. 30, 2013, Schechter et al., “Evidence Based Dynamic Scoring to Limit Guesses in Knowledge-Based Authentication,” 32 pages. |
Rabkin et al., “Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook,” In the Proceedings of the 4th Symposium on Usable Privacy and Security, 2008, pp. 13-23. |
Van Vesor Wolf etal., “Trustee Enviornmental Liability: Avoiding the Quagmire,” Environmental Claims Journal, vol. 6, 1994, 1 page. |
“Reset Friend Password”, Retrieved From: <<https://friend.weblogin.umich.edu/friend/account/>>, Nov. 15, 2005, 1 Page. |
Number | Date | Country | |
---|---|---|---|
20140324722 A1 | Oct 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12466246 | May 2009 | US |
Child | 14326377 | US |