1
Jeffrey B Williams, Allan Camaisa: Out of band system and method for authentication. Anakam, Kilpatrick Townsend & Stockton, October 23, 2012: US08296562 (10 worldwide citation)

A method and system for out of band authentication for ensuring a user is in possession of a device.


2
Allan Camaisa, Robert Robb: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, John L Rogitz, March 9, 2010: US07676834 (7 worldwide citation)

To limit access to thieves of passwords, at initial registration with a Web server, a user is given a password and user name, and a cookie including a login key and machine ID is downloaded to the user. For subsequent log ins, the user inputs the user name and password and if they are correct, the s ...


3
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, December 13, 2011: US08079070 (6 worldwide citation)

When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server for additional authentication. The additional authentication can ...


4
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Kilpatrick Townsend & Stockton, June 2, 2015: US09047473 (3 worldwide citation)

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


5
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Kilpatrick Townsend & Stockton, September 10, 2013: US08533791 (3 worldwide citation)

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


6
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, July 10, 2012: US08219822 (3 worldwide citation)

The geographic location of a computer attempting to gain authentication to a server is obtained using the IP address of the computer, with authentication being denied if the geographic location is not approved.


7
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, September 3, 2013: US08528078 (1 worldwide citation)

The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that ...


8
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Rogitz & Associates, November 15, 2007: US20070266257-A1

The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that ...


9
Jonas Samuelsson, Allan Camaisa: System and method for second factor authentication services. Anakam, Rogitz & Associates, October 9, 2008: US20080250477-A1

A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are retur ...


10
Allan Camaisa, Robert Robb: System and method for blocking unauthorized network log in using stolen password. Rogitz & Associates, January 19, 2006: US20060015742-A1

To limit access to thieves of passwords, at initial registration with a Web server, a user is given a password and user name, and a cookie including a login key and machine ID is downloaded to the user. For subsequent log ins, the user inputs the user name and password and if they are correct, the s ...



Click the thumbnails below to visualize the patent trend.