1
Jeffrey B Williams, Allan Camaisa: Out of band system and method for authentication. Anakam, Kilpatrick Townsend & Stockton, October 23, 2012: US08296562 (12 worldwide citation)

A method and system for out of band authentication for ensuring a user is in possession of a device.


2
Allan Camaisa, Robert Robb: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, John L Rogitz, March 9, 2010: US07676834 (8 worldwide citation)

To limit access to thieves of passwords, at initial registration with a Web server, a user is given a password and user name, and a cookie including a login key and machine ID is downloaded to the user. For subsequent log ins, the user inputs the user name and password and if they are correct, the s ...


3
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, December 13, 2011: US08079070 (7 worldwide citation)

When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server for additional authentication. The additional authentication can ...


4
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Kilpatrick Townsend & Stockton, June 2, 2015: US09047473 (4 worldwide citation)

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


5
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Kilpatrick Townsend & Stockton, September 10, 2013: US08533791 (3 worldwide citation)

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


6
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, September 3, 2013: US08528078 (3 worldwide citation)

The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that ...


7
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, July 10, 2012: US08219822 (3 worldwide citation)

The geographic location of a computer attempting to gain authentication to a server is obtained using the IP address of the computer, with authentication being denied if the geographic location is not approved.


8
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, March 28, 2007: EP1766839-A1 (3 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


9
WILLIAMS JEFFREY B: Out of ban system and method for authentication. ANAKAM, Pasternak Thomas G, November 4, 2010: WO/2010/127263 (3 worldwide citation)

A method and system for out of band authentication for ensuring a user is in possession of a device.


10