21
Conor Robert White, Michael Peirce, Jason Scott Cramer, Chet Bradford Steiner, Suzanna Diebes: Methods and systems for authenticating users. DAON HOLDINGS, Kevin McDermott Esq, November 1, 2016: US09485251

A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communicat ...


22
Conor Robert White, Michael Peirce, Jason Scott Cramer, Chet Bradford Steiner, Suzanna Diebes: Methods and systems for authenticating users. DAON HOLDINGS, Kevin McDermott Esq, October 3, 2017: US09781107

A method of authenticating users to reduce transaction risks includes indicating a desire to conduct a transaction and determining whether the transaction requires access to protected resources. Moreover, the method determines whether inputted information is known, determines a state of a communicat ...


23
Tevfik Burak Sahin, Michael Peirce, Nicolas Jacques Jean Sezille, Conor Robert White: Methods and systems for capturing biometric data. DAON HOLDINGS, Kevin McDermott Esq, July 26, 2016: US09400915

A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline ima ...


24
Tevfik Burak Sahin, Michael Peirce, Nicolas Jacques Jean Sezille, Conor Robert White: Methods and systems for capturing biometric data. DAON HOLDINGS, Kevin McDermott Esq, June 13, 2017: US09679193

A method of capturing biometric data is provided that includes activating a security application in a device. The security application is activated by an operator of the device and is configured to cause the device to display an outline image. Moreover, the method includes displaying the outline ima ...


25
Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland: Methods and systems for increasing the security of electronic messages. DAON HOLDINGS, Kevin McDermott Esq, January 5, 2016: US09230127

A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and act ...


26
Conor Robert White: Methods and systems for enhancing the accuracy performance of authentication systems. DAON HOLDINGS, Kevin McDermott Esq, October 25, 2016: US09479501

A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and at least one new verification phrase. The method also includes capturing authentication data from a user with a communications device in acc ...


27
Conor Robert White: Methods and systems for enhancing the accuracy performance of authentication systems. DAON HOLDINGS, Kevin McDermott Esq, June 7, 2016: US09363265

A method for enhancing the accuracy performance of authentication systems includes determining an authentication data requirement for a desired transaction and at least one new verification phrase. The method also includes capturing authentication data from a user with a communications device in acc ...


28
Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland: Methods and systems for increasing the security of electronic messages. Daon Holdings, Kevin McDermott Esq, February 25, 2014: US08661558

A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and act ...


29
Conor Robert White, Christopher Eric Holland, Jason Scott Cramer, Christopher James Mort, John Francis Oakley III: Methods and systems for increasing the security of electronic messages. DAON HOLDINGS, Kevin McDermott Esq, January 10, 2017: US09544286

A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system ...


30
Christopher Eric Holland, Andrew Supplee Webb, Jason Scott Cramer, Conor Robert White: Methods and systems for replacing shared secrets over networks. Daon Holdings, Kevin McDermott Esq, March 24, 2015: US08990906

A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an a ...