Patents by Inventor Keith A. McFarland

Keith A. McFarland has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9479503
    Abstract: Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
    Type: Grant
    Filed: December 16, 2015
    Date of Patent: October 25, 2016
    Assignee: Telecommunications Systems, Inc.
    Inventors: John L. Griffin, Keith A. McFarland, William P. Wells
  • Publication number: 20160269382
    Abstract: An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS comprises a classification server and a push server to provide access to non-privileged authentication credentials absent a pull transaction. The classification server in the ACPS classifies authentication credentials as either privileged (i.e. private, forgeable) or non-privileged (i.e. non-forgeable, nonsensitive). Credentials identified as being of a privileged nature are treated with restricted access. Alternatively, credentials classified as being of a non-privileged nature are made available for the push service. Authentication servers register with the ACPS to become consumers of the push service. A push server within the ACPS pushes non-privileged authentication credentials to registered authentication servers at predetermined intervals. Individual authentication credentials push services (ACPS) have access to different authentication credentials.
    Type: Application
    Filed: February 29, 2016
    Publication date: September 15, 2016
    Inventors: Keith A. McFarland, Kambiz Ghozati, John Stevens, William P. Wells
  • Publication number: 20160255080
    Abstract: Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
    Type: Application
    Filed: December 16, 2015
    Publication date: September 1, 2016
    Inventors: John L. Griffin, Keith A. McFarland, William P. Wells
  • Publication number: 20160205552
    Abstract: Motion of a wireless device is pre-registered as authentication credentials, then later matched, to provide motion-based authentication for access to software, service, etc. The wireless device may contain any number of gyroscopic, distance, positional or compass sensors—any or all of which are measured during a physical gesture or motion or the wireless device while the user is holding the wireless device. Recorded measurements of the specific motion then identifies the authorized user. If measurements of an attempted motion suitably matches the pre-registered and valid authentication credentials for the service or device, then the motioned wireless device is authenticated for use by the user. Such motion is difficult, if not impossible, for a user to pass on to another individual—even if they wanted to, making it the ultimate security technique.
    Type: Application
    Filed: March 21, 2016
    Publication date: July 14, 2016
    Applicant: TeleCommunication Systems, Inc.
    Inventor: Keith A. McFarland
  • Patent number: 9384339
    Abstract: Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
    Type: Grant
    Filed: January 8, 2013
    Date of Patent: July 5, 2016
    Assignee: Telecommunication Systems, Inc.
    Inventors: John L. Griffin, Keith A. McFarland, William P. Wells
  • Patent number: 9338153
    Abstract: An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS comprises a classification server and a push server to provide access to non-privileged authentication credentials absent a pull transaction. The classification server in the ACPS classifies authentication credentials as either privileged (i.e. private, forgeable) or non-privileged (i.e. non-forgeable, non-sensitive). Credentials identified as being of a privileged nature are treated with restricted access. Alternatively, credentials classified as being of a non-privileged nature are made available for the push service. Authentication servers register with the ACPS to become consumers of the push service. A push server within the ACPS pushes non-privileged authentication credentials to registered authentication servers at predetermined intervals. Individual authentication credentials push services (ACPS) have access to different authentication credentials.
    Type: Grant
    Filed: April 10, 2013
    Date of Patent: May 10, 2016
    Assignee: TeleCommunication Systems, Inc.
    Inventors: Keith A. McFarland, Kambiz Ghozati, John Stevens, Wiliam P. Wells
  • Patent number: 9326143
    Abstract: Motion of a wireless device is pre-registered as authentication credentials, then later matched, to provide motion-based authentication for access to software, service, etc. The wireless device may contain any number of gyroscopic, distance, positional or compass sensors—any or all of which are measured during a physical gesture or motion or the wireless device while the user is holding the wireless device. Recorded measurements of the specific motion then identifies the authorized user. If measurements of an attempted motion suitably matches the pre-registered and valid authentication credentials for the service or device, then the motioned wireless device is authenticated for use by the user. Such motion is difficult, if not impossible, for a user to pass on to another individual—even if they wanted to, making it the ultimate security technique.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: April 26, 2016
    Assignee: TeleCommunication Systems, Inc.
    Inventor: Keith A. McFarland
  • Publication number: 20150181426
    Abstract: Motion of a wireless device is pre-registered as authentication credentials, then later matched, to provide motion-based authentication for access to software, service, etc. The wireless device may contain any number of gyroscopic, distance, positional or compass sensors—any or all of which are measured during a physical gesture or motion or the wireless device while the user is holding the wireless device. Recorded measurements of the specific motion then identifies the authorized user. If measurements of an attempted motion suitably matches the pre-registered and valid authentication credentials for the service or device, then the motioned wireless device is authenticated for use by the user. Such motion is difficult, if not impossible, for a user to pass on to another individual—even if they wanted to, making it the ultimate security technique.
    Type: Application
    Filed: February 9, 2015
    Publication date: June 25, 2015
    Inventor: Keith A. McFarland
  • Patent number: 8984591
    Abstract: Motion of a wireless device is pre-registered as authentication credentials, then later matched, to provide motion-based authentication for access to software, service, etc. The wireless device may contain any number of gyroscopic, distance, positional or compass sensors—any or all of which are measured during a physical gesture or motion or the wireless device while the user is holding the wireless device. Recorded measurements of the specific motion then identifies the authorized user. If measurements of an attempted motion suitably matches the pre-registered and valid authentication credentials for the service or device, then the motioned wireless device is authenticated for use by the user. Such motion is difficult, if not impossible, for a user to pass on to another individual—even if they wanted to, making it the ultimate security technique.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: March 17, 2015
    Assignee: TeleCommunications Systems, Inc.
    Inventor: Keith A. McFarland
  • Publication number: 20130291078
    Abstract: An authentication credentials push service (ACPS) that securely pushes non-privileged authentication credentials to registered client entities. The ACPS comprises a classification server and a push server to provide access to non-privileged authentication credentials absent a pull transaction. The classification server in the ACPS classifies authentication credentials as either privileged (i.e. private, forgeable) or non-privileged (i.e. non-forgeable, non-sensitive). Credentials identified as being of a privileged nature are treated with restricted access. Alternatively, credentials classified as being of a non-privileged nature are made available for the push service. Authentication servers register with the ACPS to become consumers of the push service. A push server within the ACPS pushes non-privileged authentication credentials to registered authentication servers at predetermined intervals. Individual authentication credentials push services (ACPS) have access to different authentication credentials.
    Type: Application
    Filed: April 10, 2013
    Publication date: October 31, 2013
    Inventors: Keith A. McFarland, Kambiz Ghozati, John Stevens, Wiliam P. Wells
  • Publication number: 20130269020
    Abstract: Authenticating cloud computing enabling secure services (ACCESS) offloads “client authentication” activity onto a third-party authenticating cloud computing enabling secure services (ACCESS) node. Instead of having a client device authenticate itself directly to a network server, the client device instead authenticates itself to a third-party authenticating cloud computing enabling secure services (ACCESS) node. The authenticating cloud computing enabling secure services (ACCESS) node then provides credentials that are used by the client device to communicate directly with the server (and utilize the service) without any further authentication being necessary.
    Type: Application
    Filed: January 8, 2013
    Publication date: October 10, 2013
    Inventors: John L. Griffin, Keith A. McFarland, William P. Wells
  • Publication number: 20130212646
    Abstract: A security broker (SB) that provides network based authorization of secure VoIP services, triggered upon attempted user access. The security broker (SB) intercepts a SIP transaction during session setup to transmit a network based security challenge to a SIP application attempting to access (secure) IP based services. A network based security challenge is transmitted to a participating SIP application on both the origination and termination legs of a SIP transaction. The network based security challenge prompts a SIP application to return subscriber authorization/authentication credentials (e.g. a username/password combination). If credentials returned by the SIP application are valid, the security broker (SB) authorizes the network to permit session completion, and access to secure IP services is granted.
    Type: Application
    Filed: April 18, 2012
    Publication date: August 15, 2013
    Inventors: Keith A. McFarland, Doug Kesser, Victor Burton, Baby Raman, Amar Sathyanarayanan
  • Publication number: 20130160088
    Abstract: Motion of a wireless device is pre-registered as authentication credentials, then later matched, to provide motion-based authentication for access to software, service, etc. The wireless device may contain any number of gyroscopic, distance, positional or compass sensors—any or all of which are measured during a physical gesture or motion or the wireless device while the user is holding the wireless device. Recorded measurements of the specific motion then identifies the authorized user. If measurements of an attempted motion suitably matches the pre-registered and valid authentication credentials for the service or device, then the motioned wireless device is authenticated for use by the user. Such motion is difficult, if not impossible, for a user to pass on to another individual—even if they wanted to, making it the ultimate security technique.
    Type: Application
    Filed: December 17, 2012
    Publication date: June 20, 2013
    Inventor: Keith A. McFarland
  • Publication number: 20130145434
    Abstract: A wireless device initiates a connection by sending an Unsolicited HTTP(s) POST that includes a user identity and credentials, not in response to a form that is provided to the wireless device from a secondary authentication service (2AS), so the 2AS does not have a session with the wireless device. An HTTP(s) session is handled by a home agent or enterprise home agent. The 2AS uses the user identity and credentials from the Unsolicited POST to complete interaction with a downstream identity management server, and takes appropriate action by either indicating to the home agent that authentication was successful and the device is authorized to use the private enterprise network resources protected by the 2AS process; or if the authentication was unsuccessful that the session(s) should be disconnected. In addition, the 2AS may communicate with the agent on the wireless device to send intermediate and final status of the attempt.
    Type: Application
    Filed: December 6, 2012
    Publication date: June 6, 2013
    Inventors: William Wells, Yoogin Lean, Keith A. McFarland