1
Jeffrey B Williams, Allan Camaisa: Out of band system and method for authentication. Anakam, Kilpatrick Townsend & Stockton, October 23, 2012: US08296562 (7 worldwide citation)

A method and system for out of band authentication for ensuring a user is in possession of a device.


2
Allan Camaisa, Robert Robb: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, John L Rogitz, March 9, 2010: US07676834 (7 worldwide citation)

To limit access to thieves of passwords, at initial registration with a Web server, a user is given a password and user name, and a cookie including a login key and machine ID is downloaded to the user. For subsequent log ins, the user inputs the user name and password and if they are correct, the s ...


3
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, December 13, 2011: US08079070 (6 worldwide citation)

When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server for additional authentication. The additional authentication can ...


4
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, July 10, 2012: US08219822 (3 worldwide citation)

The geographic location of a computer attempting to gain authentication to a server is obtained using the IP address of the computer, with authentication being denied if the geographic location is not approved.


5
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, March 28, 2007: EP1766839-A1 (3 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


6
WILLIAMS JEFFREY B: Out of ban system and method for authentication. ANAKAM, Pasternak Thomas G, November 4, 2010: WO/2010/127263 (3 worldwide citation)

A method and system for out of band authentication for ensuring a user is in possession of a device.


7
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Kilpatrick Townsend & Stockton, June 2, 2015: US09047473 (2 worldwide citation)

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


8
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Kilpatrick Townsend & Stockton, September 10, 2013: US08533791 (2 worldwide citation)

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


9
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, September 3, 2013: US08528078 (1 worldwide citation)

The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that ...


10
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam, ROGITZ John L, February 23, 2006: WO/2006/019451 (1 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...



Click the thumbnails below to visualize the patent trend.