1
Jason Chris Beloncik, Conor Robert White, Christopher Eric Holland, James Ahern: Methods and systems for improving the security of secret authentication data during authentication transactions. DAON HOLDINGS, Kevin McDermott Esq, February 16, 2016: US09262615 (4 worldwide citation)

A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included i ...


2
Conor Robert White, James Ahern, Christopher Eric Holland: Methods and systems for improving the security of secret authentication data during authentication transactions. Daon Holdings, Kevin McDermott Esq, May 28, 2013: US08453207 (4 worldwide citation)

A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included i ...


3
Conor Robert White, James Ahern, Christopher Eric Holland: Methods and systems for improving the security of secret authentication data during authentication transactions. Daon Holdings, Kevin McDermott Esq, February 17, 2015: US08959359 (1 worldwide citation)

A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included i ...


4
Conor Robert White, James Ahern, Christopher Eric Holland: Methods and systems for improving the security of secret authentication data during authentication transactions. DAON HOLDINGS, Kevin McDermott Esq, December 15, 2015: US09213811 (1 worldwide citation)

A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included i ...


5
Jason Scott Cramer, Andrew Supplee Webb, Christopher Eric Holland, Conor Robert White: Methods and systems for authenticating users over networks. Daon Holdings, Kevin McDermott Esq, October 21, 2014: US08868921 (1 worldwide citation)

A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal ...


6
Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland: Methods and systems for increasing the security of electronic messages. DAON HOLDINGS, Kevin McDermott Esq, January 5, 2016: US09230127

A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and act ...


7
Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland: Methods and systems for increasing the security of electronic messages. Daon Holdings, Kevin McDermott Esq, February 25, 2014: US08661558

A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and act ...


8
Conor Robert White, Christopher Eric Holland, Jason Scott Cramer, Christopher James Mort, John Francis Oakley III: Methods and systems for increasing the security of electronic messages. DAON HOLDINGS, Kevin McDermott Esq, January 10, 2017: US09544286

A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system ...


9
Christopher Eric Holland, Andrew Supplee Webb, Jason Scott Cramer, Conor Robert White: Methods and systems for replacing shared secrets over networks. Daon Holdings, Kevin McDermott Esq, March 24, 2015: US08990906

A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an a ...