1
Allan Camaisa, Robert Robb: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, John L Rogitz, March 9, 2010: US07676834 (7 worldwide citation)

To limit access to thieves of passwords, at initial registration with a Web server, a user is given a password and user name, and a cookie including a login key and machine ID is downloaded to the user. For subsequent log ins, the user inputs the user name and password and if they are correct, the s ...


2
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, December 13, 2011: US08079070 (6 worldwide citation)

When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server for additional authentication. The additional authentication can ...


3
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, July 10, 2012: US08219822 (3 worldwide citation)

The geographic location of a computer attempting to gain authentication to a server is obtained using the IP address of the computer, with authentication being denied if the geographic location is not approved.


4
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam L L C, March 28, 2007: EP1766839-A1 (3 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


5
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Kilpatrick Townsend & Stockton, September 3, 2013: US08528078 (1 worldwide citation)

The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that ...


6
Camaisa Allan, Samuelsson Jonas: System and method for blocking unauthorized network log in using stolen password. Anakam, ROGITZ John L, February 23, 2006: WO/2006/019451 (1 worldwide citation)

When a user successfully logs in to an information server (22, 104) such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server (106) for additional authentication. The additional aut ...


7
Richard Petillo: Authentication systems and methods using a packet telephony device. Vonage America, Duane Morris, Joseph Pagnotta, June 20, 2017: US09686270

Packet telephony devices with encryption keys are configured to enable authentication systems and methods for increasing the security of online account access and transactions. The instant disclosure leverages the security in customer equipment hardware such as a terminal adaptor (TA) or router to a ...


8
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Rogitz & Associates, November 15, 2007: US20070266257-A1

The authenticity of a website is determined using a unique string of characters known only to the user and the website on each page of the website that is displayed to the user, with a false site being incapable of displaying this unique string of characters, thereby putting the user on notice that ...


9
Allan Camaisa, Robert Robb: System and method for blocking unauthorized network log in using stolen password. Rogitz & Associates, January 19, 2006: US20060015742-A1

To limit access to thieves of passwords, at initial registration with a Web server, a user is given a password and user name, and a cookie including a login key and machine ID is downloaded to the user. For subsequent log ins, the user inputs the user name and password and if they are correct, the s ...


10
Allan Camaisa, Jonas Samuelsson: System and method for blocking unauthorized network log in using stolen password. Anakam, Rogitz & Associates, January 19, 2006: US20060015743-A1

When a user successfully logs in to an information server such as an online banking server, an e-commerce server, or a VPN server, for greater security communication is transferred transparently to the user to an authentication server for additional authentication. The additional authentication can ...



Click the thumbnails below to visualize the patent trend.