1
William N Owen, Eric Shoemaker: Multi-factor authentication system. Wireless Key Identification Systems, Tillman Wright PLLC, Chad D Tillman, James D Wright, May 13, 2008: US07373515 (105 worldwide citation)

A suspect user (110) seeks access to a network resource from an access authority (150) utilizing a passcode received from an authentication authority (130). Initially, an ID of a device is bound with a PIN, the device ID is bound with a private key of the device, and the device ID is bound with a us ...


2
Jon Oberheide, Adam Goodman: Method for key rotation. Duo Security, Jeffrey Schox, Padowithz Alce, September 26, 2017: US09774579 (2 worldwide citation)

A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at ...


3
Ryan Parker Disraeli: Frictionless multi-factor authentication system and method. TeleSign Corporation, Perkins Coie, May 31, 2016: US09355231 (2 worldwide citation)

A frictionless multi-factor authentication system and method (“FMFA system”) that facilitates verification of the identity of a website user, registrant or applicant. The FMFA system reduces or removes the burden on the user by eliminating the additional manual second step traditionally required by ...


4
Martin Zizi, Hugh Sharkey: Local user authentication with neuro and neuro-mechanical fingerprints. Aerendir Mobile, Proprius Technolgies R L, Alford Law Group, March 7, 2017: US09590986 (1 worldwide citation)

In accordance with one embodiment, a method for locally verifying the identification of a user with an electronic device is disclosed. The method includes regenerating a neuro-mechanical fingerprint (NFP) in response to a micro-motion signal sensed at a body part. In response to a plurality of autho ...


5
Oliver Nicholas Cockcroft: Multi-factor authentication system and method. eBay, Schwegman Lundberg & Woessner P A, July 11, 2017: US09703942 (1 worldwide citation)

A system and method of multi-factor authentication are described. In some embodiments, a first device provides an initial authentication data to a second device. The second device is different from the first device. The first device obtains a first response data from the second device. The first dev ...


6
Austin L Newman: Secured vehicle for user use only. NIO USA, Sheridan Ross P C, September 11, 2018: US10074223

Systems of an electrical vehicle and the operations thereof are provided. Within an autonomous vehicle fleet that can be optionally primarily used for ridesharing, how does an owner or first user of one of the vehicles prevent another customer or second user from approaching a vehicle and using it f ...


7
Martin Zizi, Hugh Sharkey: Data encryption/decryption using neurological fingerprints. Proprius Technologies R L, Alford Law Group, December 26, 2017: US09853976

In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to generate a multi-dimensional signal; in response to the multi-dimensional signal and user calibration parameters, generating a neuro-mechanical ...


8
Martin Zizi, Hugh Sharkey: Data encryption/decryption using neuro and neuro-mechanical fingerprints. Aerendir Mobile, Alford Law Group, William E Alford, February 21, 2017: US09577992

In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to generate a multi-dimensional signal; in response to the multi-dimensional signal and user calibration parameters, generating a neuro-mechanical ...


9
Robin Dua: System, method, and device to configure devices via a remote with biometrics. Syndefense, Stanzione & Associates PLLC, August 15, 2017: US09736535

A set-top box apparatus includes at least one input module to receive one or more media content streams, at least one memory device, an Ethernet port, at least one wireless transceiver to access a communications network to enable communication with at least one external media player device, an HDMI ...


10
Sajit Bhaskaran: Digital voice signature of transactions. Ack3 Bionetics, McDermott Will & Emery, September 19, 2017: US09767807

A method that includes receiving, by a server, an access request sent to a network address of a resource server from a user using a user device, the access request comprising a unique record identifier is provided. The method includes placing a call to the user device, receiving from the user a voic ...