Abstract: According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server.
Type:
Application
Filed:
August 6, 2013
Publication date:
December 26, 2013
Applicant:
Next Access Technologies, LLC
Inventors:
David L. Wells, Jack Loop, Charles Bakes
Abstract: According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server.
Type:
Grant
Filed:
July 22, 2009
Date of Patent:
September 3, 2013
Assignee:
Next Access Technologies, LLC
Inventors:
David L. Wells, Jack Loop, Charles Bakes
Abstract: A method of two-way authentication between a user and a known host using a non-disclosing password entry system generates a matrix of characters having a random characteristic with random characteristics being selected from a set of custom symbols, pictures or patterns (rather than alpha-numeric characters) that only the user recognizes. When the user sets up an account with the known host, a subset of these characteristics is predetermined for use specifically by the user. One or more of these may additionally be used in the user's PIN or password for easy memorization, allowing the user to first authenticate the log-in screen before the user enters the PIN for user authentication to the known host. Alternatively, randomized alpha-numeric characters may be used, but with a predefined grouping or subset of the characters in a predefined position on the initial character matrix presentation.
Abstract: A non-disclosing password entry method is achieved by displaying an ordered arrangement or matrix of characters such that an authorized user's password is predetermined from a subset of these characters. The characters in the display are associated with a randomly ordered set of patterns or colors as, for example, the character background in the display. Additionally there is provided a means for selecting each type of pattern or color. Rather than entering the password directly, the authorized user is authenticated by noting the background pattern or color associated with the first character of the password and then selecting that pattern or color. The process is repeated with each password character in sequence until all the characters have been selected. The authorized user is authenticated by verifying that the selected backgrounds are correct for each of the characters of the password.