1
Edward M Scheidt, Ersin Domangue: Multiple factor-based user identification and authentication. Tecsec, IP Strategies, January 18, 2005: US06845453 (56 worldwide citation)

A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the us ...


2
Edward M Scheidt, Ersin Domangue: Multiple factor-based user identification and authentication. Tecsec, IP Strategies, October 31, 2006: US07131009 (36 worldwide citation)

A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the us ...


3
Edward M Scheidt, Ersin Domangue: Multiple level access system. Tecsec, IP Strategies P C, June 22, 2004: US06754820 (31 worldwide citation)

A method of securing an object at an access level includes selecting a profile for a user, including a credential having an encrypted credential public key, an encrypted credential public key encryption key, and a multiple-level access identifier. A working key is generated by binding a domain value ...


4
Edward M Scheidt, Ersin Domangue: Multiple level access system. Tecsec, IP Strategies, March 21, 2006: US07016495 (8 worldwide citation)

A method of securing an object at an access level includes selecting a profile for a user, including a credential having an encrypted credential public key, an encrypted credential public key encryption key, and a multiple-level access identifier. A working key is generated by binding a domain value ...


5
Edward M Scheidt, Ersin Domangue: Multiple level access system. December 16, 2004: US20040254882-A1

A method of securing an object at an access level includes selecting a profile for a user, including a credential having an encrypted credential public key, an encrypted credential public key encryption key, and a multiple-level access identifier. A working key is generated by binding a domain value ...


6
Edward M Scheidt, Ersin Domangue: Multiple Factor-Based User Identification and Authentication. Ip Strategies, May 10, 2007: US20070106903-A1

A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the us ...


7
Edward M Scheidt, Ersin Domangue: Multiple level access system. Ip Strategies, July 19, 2007: US20070165859-A1

A method of securing an object at an access level includes selecting a profile for a user, including a credential having an encrypted credential public key, an encrypted credential public key encryption key, and a multiple-level access identifier. A working key is generated by binding a domain value ...


8
Edward M Scheidt, Ersin Domangue: Multiple factor-based user identification and authentication. Ip Strategies PC, December 5, 2002: US20020184509-A1

A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the us ...


9
Edward M Scheidt, Ersin Domangue: Multiple factor-based user identification and authentication. IP Strategies, July 14, 2005: US20050154924-A1

A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the us ...