Patents by Inventor Christopher Eric HOLLAND
Christopher Eric HOLLAND has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9544286Abstract: A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.Type: GrantFiled: March 24, 2014Date of Patent: January 10, 2017Assignee: DAON HOLDINGS LIMITEDInventors: Conor Robert White, Christopher Eric Holland, Jason Scott Cramer, Christopher James Mort, John Francis Oakley, III
-
Patent number: 9262615Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: GrantFiled: May 30, 2014Date of Patent: February 16, 2016Assignee: DAON HOLDINGS LIMITEDInventors: Jason Chris Beloncik, Conor Robert White, Christopher Eric Holland, James Ahern
-
Publication number: 20160042168Abstract: A method for authenticating users is provided that includes indicating, by a user, a desire to conduct a transaction. Moreover, the method includes monitoring, using a terminal device, for devices proximate the terminal device, and determining whether each device included in an authentication data requirement is included in proximate devices detected while monitoring for devices proximate the terminal device. Furthermore, the method includes successfully authenticating the user when each device included in the authentication data requirement is included in the detected proximate devices.Type: ApplicationFiled: August 7, 2014Publication date: February 11, 2016Inventor: Christopher Eric HOLLAND
-
Patent number: 9230127Abstract: A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication.Type: GrantFiled: January 9, 2014Date of Patent: January 5, 2016Assignee: DAON HOLDINGS LIMITEDInventors: Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland
-
Patent number: 9213811Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: GrantFiled: February 27, 2013Date of Patent: December 15, 2015Assignee: DAON HOLDINGS LIMITEDInventors: Conor Robert White, James Ahern, Christopher Eric Holland
-
Patent number: 8990906Abstract: A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life.Type: GrantFiled: July 20, 2011Date of Patent: March 24, 2015Assignee: Daon Holdings LimitedInventors: Christopher Eric Holland, Andrew Supplee Webb, Jason Scott Cramer, Conor Robert White
-
Patent number: 8959359Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: GrantFiled: March 14, 2013Date of Patent: February 17, 2015Assignee: Daon Holdings LimitedInventors: Conor Robert White, James Ahern, Christopher Eric Holland
-
Patent number: 8868921Abstract: A method for authenticating users over networks includes requesting a one-time password, entering a personal identification number into a communications device, and retrieving a replaceable shared secret stored in the communications device. Moreover, the method includes generating a hashed personal identification number from the entered personal identification number, combining the hashed personal identification number with the replaceable shared secret to generate a modified shared secret, and generating a one-time password with the modified shared secret and the time of requesting the one-time password.Type: GrantFiled: July 20, 2011Date of Patent: October 21, 2014Assignee: Daon Holdings LimitedInventors: Jason Scott Cramer, Andrew Supplee Webb, Christopher Eric Holland, Conor Robert White
-
Publication number: 20140283022Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: ApplicationFiled: May 30, 2014Publication date: September 18, 2014Inventors: Jason Chris BELONCIK, Conor Robert WHITE, Christopher Eric HOLLAND, James AHERN
-
Publication number: 20140208402Abstract: A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.Type: ApplicationFiled: March 24, 2014Publication date: July 24, 2014Inventors: Conor Robert WHITE, Christopher Eric HOLLAND, Jason Scott CRAMER, Christopher James MORT, John Francis OAKLEY, III
-
Patent number: 8769286Abstract: A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.Type: GrantFiled: September 20, 2011Date of Patent: July 1, 2014Assignee: Daon Holdings LimitedInventors: Conor Robert White, Christopher Eric Holland, Jason Scott Cramer, Christopher James Mort, John Francis Oakley, III
-
Publication number: 20140130186Abstract: A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication.Type: ApplicationFiled: January 9, 2014Publication date: May 8, 2014Inventors: Neil Stephen Denis JOHNSTON, Conor Robert WHITE, Jason Scott CRAMER, Christopher James MORT, Christopher Eric HOLLAND
-
Publication number: 20140099003Abstract: A method for maintaining the relative position between a data capture device and an operator of the data capture device includes prompting the operator to arrange a data capture device to be in an optimal position relative to an operator of the device. Moreover, the method includes capturing authentication data of the operator with the data capture device while the operator uses data displayed on a screen of the data capture device, and determining whether the data capture device is in the optimal position relative to the operator while capturing authentication data of the operator. Furthermore, the method includes determining a displacement of the data capture device relative to the optimal position when the data capture device is in a position different than the optimal position, and shifting the data relative to the screen by applying the relative displacement to the data.Type: ApplicationFiled: October 9, 2012Publication date: April 10, 2014Inventors: Richard Jay Langley, Christopher Eric Holland
-
Patent number: 8661558Abstract: A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication.Type: GrantFiled: January 31, 2012Date of Patent: February 25, 2014Assignee: Daon Holdings LimitedInventors: Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland
-
Publication number: 20140020074Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: ApplicationFiled: February 27, 2013Publication date: January 16, 2014Inventors: Conor Robert WHITE, James AHERN, Christopher Eric HOLLAND
-
Publication number: 20140020058Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: ApplicationFiled: March 14, 2013Publication date: January 16, 2014Inventors: Conor Robert WHITE, James AHERN, Christopher Eric HOLLAND
-
Patent number: 8453207Abstract: A method for improving the security of secret authentication data during authentication transactions is provided that includes converting the secret authentication data of a user into scrambled secret authentication data by associating a different text-string with each item of information included in the secret authentication data. The method also includes capturing the scrambled secret authentication data with a communications device, and conducting an authentication transaction with the captured authentication data.Type: GrantFiled: July 11, 2012Date of Patent: May 28, 2013Assignee: Daon Holdings LimitedInventors: Conor Robert White, James Ahern, Christopher Eric Holland
-
Publication number: 20130074194Abstract: A method for generating e-mail messages with increased security includes receiving an e-mail message at a control system. The e-mail message has recipients, a security level, control attributes, and e-mail message contents. Moreover, the method includes verifying the recipients at the control system, and storing the recipients, security level, control attributes, and e-mail message contents in the control system when each of the recipients is verified. Furthermore, the method includes generating modified e-mail messages from the e-mail message, transmitting each of the modified e-mail messages to a respective recipient, and capturing authentication data from one of the recipients when the one recipient indicates a desire to view the e-mail message contents with a communications device operated by the one recipient. When the one recipient is successfully authenticated, the method includes permitting the one recipient to view the e-mail message contents in accordance with the control attributes.Type: ApplicationFiled: September 20, 2011Publication date: March 21, 2013Inventors: Conor Robert WHITE, Christopher Eric HOLLAND, Jason Scott CRAMER, Christopher James MORT, John Francis OAKLEY, III
-
Publication number: 20130074195Abstract: A method for accessing e-mail messages from a control system includes requesting access to e-mail message contents of a user stored in the control system, determining whether the user is enrolled in and activated by the control system, and authenticating the user when the user is enrolled in and activated by the control system. Moreover, the method includes permitting the user to view a list of e-mail messages when the user is successfully authenticated. The e-mail messages included in the list are associated with the user. Furthermore, the method includes permitting the user to access the contents of e-mail messages in the list having a security level equal to or less than a security level associated with the successful authentication.Type: ApplicationFiled: January 31, 2012Publication date: March 21, 2013Inventors: Neil Stephen Denis Johnston, Conor Robert White, Jason Scott Cramer, Christopher James Mort, Christopher Eric Holland
-
Publication number: 20130024947Abstract: A method for replacing a shared secret over a network is provided that includes determining that a security breach could have occurred, determining that a shared secret of a user is to be replaced, and transmitting a renewal message to an authentication system requesting a new shared secret and an associated effective life for the user. Moreover, the method includes generating a new shared secret and an associated effective life at the authentication system for the user, and replacing the shared secret and associated effective life in an enrollment data record of the user with the new shared secret and associated effective life. Furthermore, the method includes transmitting the new shared secret and associated effective life to a communications device associated with the user, and replacing a shared secret and associated effective life stored in the communications device with the new shared secret and associated effective life.Type: ApplicationFiled: July 20, 2011Publication date: January 24, 2013Inventors: Christopher Eric HOLLAND, Andrew Supplee WEBB, Jason Scott CRAMER, Conor Robert WHITE