Patents by Inventor Gregory Howard Wolfond

Gregory Howard Wolfond has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130036456
    Abstract: A method of authenticating to a computer server involves a first authentication client transmitting an authentication token to the computer server via a first communications channel, and a second authentication client receiving a payload from the computer server via a second communications channel distinct from the first communications channel in accordance with an outcome of a determination of authenticity of the authentication token by the computer server.
    Type: Application
    Filed: April 8, 2011
    Publication date: February 7, 2013
    Applicant: SECUREKEY TECHNOLOGIES INC.
    Inventors: Andre Michel Boysen, Troy Jacob Ronda, Pierre Antoine Roberge, Patrick Hans Engel, Gregory Howard Wolfond
  • Publication number: 20120072718
    Abstract: A method of establishing a communication channel between a network client and a computer server over a network is described. The network client may be configured to communicate with the computer server over the network and to communicate with a token manager. The token manager may be configured with a parent digital certificate that is associated with the token manager. The token manager or network client generates a credential from the parent digital certificate, and transmits the credential to the computer server. The credential may be associated with the computer server. The network client may establish the communications channel with the computer server in accordance with an outcome of a determination of validity of the credential by the computer server.
    Type: Application
    Filed: November 4, 2009
    Publication date: March 22, 2012
    Inventors: Troy Jacob Ronda, Pierre Antoine Roberge, Patrick Hans Engel, Rene Mciver, Gregory Howard Wolfond, Andre Michael Boysen
  • Publication number: 20110307949
    Abstract: A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first communications channel. The network client is configured to communicate with a token manager which is configured to communicate with a hardware token interfaced therewith. The network client is also configured to communicate with the relying party computer and the computer server. The computer server also receives a transaction pointer from the relying party computer via a second communications channel that is distinct from the first communications channel. Preferably, the transaction pointer is unpredictable by the computer server. The computer server transmits an authorization signal to the relying party computer in accordance with a correlation between the transaction code and the transaction pointer. The authorization signal facilitates authentication of the network client to the relying party computer.
    Type: Application
    Filed: August 19, 2011
    Publication date: December 15, 2011
    Inventors: Troy Jacob Ronda, Pierre Antoine Roberge, Patrick Hans Engel, Rene Mclver, Gregory Howard Wolfond, Andre Michel Boysen
  • Publication number: 20110302646
    Abstract: A method of authenticating a network client to a relying party computer via a computer server comprises the computer server receiving a transaction code from a token manager via a first communications channel. The network client is configured to communicate with a token manager which is configured to communicate with a hardware token interfaced therewith. The network client is also configured to communicate with the relying party computer and the computer server. The computer server also receives a transaction pointer from the relying party computer via a second communications channel that is distinct from the first communications channel. Preferably, the transaction pointer is unpredictable by the computer server. The computer server transmits an authorization signal to the relying party computer in accordance with a correlation between the transaction code and the transaction pointer. The authorization signal facilitates authentication of the network client to the relying party computer.
    Type: Application
    Filed: February 19, 2010
    Publication date: December 8, 2011
    Inventors: Troy Jacob Ronda, Pierre Antoine Roberge, Patrick Hans Engel, Rene Mclver, Gregory Howard Wolfond, Andre Michel Boysen
  • Publication number: 20110265159
    Abstract: A method of establishing a communication channel between a network client and a computer server over a network is described. The network client may be configured to communicate with the computer server over the network and to communicate with a token manager. The token manager may be configured with a parent digital certificate that is associated with the token manager. The token manager or network client generates a credential from the parent digital certificate, and transmits the credential to the computer server. The credential may be associated with the computer server. The network client may establish the communications channel with the computer server in accordance with an outcome of a determination of validity of the credential by, the computer server.
    Type: Application
    Filed: May 4, 2011
    Publication date: October 27, 2011
    Inventors: Troy Jacob Ronda, Pierre Antoine Roberge, Patrick Hans Engel, Rene McIver, Gregory Howard Wolfond, Andre Michel Boysen
  • Publication number: 20110214171
    Abstract: A method for authenticating an identity involves a computing device receiving a first credential over a first communications channel, and determining a second communications channel from a comparison between the first received credential and a first reference credential provisionally associated with the first credential. The computing device opens the second communications channel and receives second credential over the second communications channel, and the identity is authenticated based on a verification of the second credential. The computing device authenticates the identity by generating a first identity proof score from a correlation between the first received credential and the first reference credential, generating a second identity proof score from a correlation between the second received credential and a second reference credential, and generating an ultimate identity proof score from the first identity proof score and the second identity proof score.
    Type: Application
    Filed: May 9, 2011
    Publication date: September 1, 2011
    Inventors: Gregory Howard Wolfond, Jaime Shapiro, Robert Paul Mansz
  • Patent number: 7941835
    Abstract: A method for authenticating an identity involves first receiving a first credential over a first communications channel, and determining a second communications channel provisionally associated with the first credential. The second communications channel is different from the first communications channel, and the first credential is provisionally associated with an identity. Then, a second credential is received over the second communications channel, and the identity is authenticated based on a verification of the second credential.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: May 10, 2011
    Assignee: Authenticor Identity Protection Services, Inc.
    Inventors: Gregory Howard Wolfond, Jaime Shapiro, Robert Paul Mansz
  • Publication number: 20100318801
    Abstract: A method of effecting secure communication over a network begins by interfacing a hardware token with a computer host. The hardware token includes security software and communication software stored thereon. The security software is stored in a memory of the hardware token. The computer host has a memory distinct from the hardware token memory. The authenticity of the security software is determined on the hardware token. Upon successful validation of the authenticity of the security software on the hardware token, the authenticity of the communication software is determined by loading the security software from the hardware token memory into the computer host memory and executing the loaded security software from the computer host memory. After successful validation of the authenticity of the communication software, the computer host facilitates communication between the hardware token and a remote computer by executing the communication software from the computer host memory.
    Type: Application
    Filed: October 24, 2008
    Publication date: December 16, 2010
    Applicant: SecureKey Technologies Inc.
    Inventors: Pierre Antoine Roberge, Patrick Hans Engel, Gregory Howard Wolfond
  • Publication number: 20100125527
    Abstract: A method for protecting real estate from fraudulent changes in title begins by receiving a verification that a party requesting a change in title to a specific item of real estate is the true owner of the specific item of real estate. A title change authorization is provided if the identity of the requesting party is verified. A verification is received if the individual is a trusted authority authorized to modify title to real estate. The individual is authorized to effect the change in title to the specific item of real estate in accordance with the title change authorization.
    Type: Application
    Filed: January 8, 2008
    Publication date: May 20, 2010
    Applicant: Authenticor Identity Protection Services Inc.
    Inventors: Gregory Howard Wolfond, Jaime Shapiro, Patrick Hans Engel, Pierre Antoine Roberge