Abstract: The invention describes a novel method for securing authentic client access to online confidential resources by means of a physical hard key/card device, which does not need a custom card reader, but uses the optical disc drive of any remote computer to conduct a highly secure online transaction on the Internet. Such real online card key (ROCK) device can be read by an optical disc drive of a computer, without allowing any of the file viewing, copying and editing functions. Such ROCK device can be used as a real world physical hard key for accessing secured networks and conducting secure online transactions. It can also be used as a fully functional versatile credit card with additional magnetic stripe and manual authentication methods available on the non-reflective surface of the optical disc based ROCK optical disc card of the present invention.
Type:
Grant
Filed:
August 12, 2002
Date of Patent:
June 5, 2007
Assignees:
Mossman Associates Inc, IQ Infosystems Pvt. Ltd
Abstract: Most software applications of the present time have graphic user interface comprising of a document display window and a document supporting substrate area. The document display window is the area where the application user inputs the data and views the results. The substrate areas contain the menus, tools, controls and other accessories, which support the execution of the document. The focus of the application user most of the time is the document window. The substrate area is accessed only intermittently for using the menus, tools and other controls. Depending upon the type of application and the view settings, about 60 to 80 percent of the visible display area is covered by the document window. The remaining 40 to 20 percent is the substrate area.
Abstract: Every secure Website provides Secure Socket Layer (SSL) connectivity to prevent user's confidential information from network sniffers. However, in recent times keyboard sniffing has become the preferred mode of stealing user information. Keystrokes capturing is a security hole in front of SSL, for which there is no effective solution. The invention describes a novel method of securing user information from all types of software and hardware keyloggers. The method requires no software installation on user's PC, and comprise of remote executable application embedded on a Web page.