Controlling user access to electronic resources without password
Abstract
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from equipment of a user, wherein the image includes an indication of an individual and an indication of a local environment. The individual is identified within the image to obtain an identification of the individual, and the local environment is determined as a predetermined local environment based on the identification of the local environment. Access to a restricted computing resource is facilitated based on the determining that the individual is the user and that the local environment is the predetermined local environment. Other embodiments are disclosed.
- Inventors:
- Issue Date:
- Research Org.:
- Angel Secure Networks, Inc., Old Town, ME (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1498520
- Patent Number(s):
- 10185816
- Application Number:
- 15/646,943
- Assignee:
- Angel Secure Networks, Inc. (Old Town, ME)
- Patent Classifications (CPCs):
-
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- DOE Contract Number:
- FG02-08ER5047
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2017 Jul 11
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Smith, Fred Hewitt. Controlling user access to electronic resources without password. United States: N. p., 2019.
Web.
Smith, Fred Hewitt. Controlling user access to electronic resources without password. United States.
Smith, Fred Hewitt. Tue .
"Controlling user access to electronic resources without password". United States. https://www.osti.gov/servlets/purl/1498520.
@article{osti_1498520,
title = {Controlling user access to electronic resources without password},
author = {Smith, Fred Hewitt},
abstractNote = {Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from equipment of a user, wherein the image includes an indication of an individual and an indication of a local environment. The individual is identified within the image to obtain an identification of the individual, and the local environment is determined as a predetermined local environment based on the identification of the local environment. Access to a restricted computing resource is facilitated based on the determining that the individual is the user and that the local environment is the predetermined local environment. Other embodiments are disclosed.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2019},
month = {1}
}
Works referenced in this record:
System and method for secure information transmission over a network
patent, October 1999
- Angelo, Michael F.; Olarig, Sompong Paul
- US Patent Document 5,974,250
Tamper resistant software encoding
patent, January 2005
- Chow, Stanley; Johnson, Harold; Gu, Yuan Xiang
- US Patent Document 6,842,862
Method of remotely installing software directly from a central computer
patent, May 1995
- Platt, Stephen M.
- US Patent Document 5,421,009
Software obfuscation
patent-application, January 2006
- Chu, Frank Nian-Tzu; Wu, Wei; Bennett, Julie D.
- US Patent Document 11/061790; 20060005250
Multi-length packet format including check sequence(s)
patent, October 1990
- May, Jr., Carl J.
- US Patent Document 4,962,498
System, method and article of manufacture for security management in a development architecture framework
patent, November 2001
- Bowman-Amuah, Michel K.
- US Patent Document 6,324,647
Image verification
patent-application, January 2006
- Chu, Frank Nian-Tzu; Wu, Wei; Bennett, Julie D.
- US Patent Document 11/061792; 20060005252
Information reproducing apparatus and secure module
patent-application, July 2003
- Kohiyama, Kiyoshi; Hasebe, Takayuki
- US Patent Document 10/305187; 20030126457
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
patent-application, November 2003
- van der Made, Peter A. J.
- US Patent Document 10/145592; 20030212902
Location and user identification for online gaming
patent-application, May 2006
- Nguyen, Binh; Paulsen, Craig
- US Patent Document 10/981435; 20060095790
System and method for controlling access to data located on a content server
patent, January 1998
- Schloss, Robert Jeffrey
- US Patent Document 5,706,507
An electronic information marketplace
journal, February 1985
- Turoff, Murray; Chinai, Sanjit
- Computer Networks and ISDN Systems, Vol. 9, Issue 2, p. 79-90
Method and apparatus for remotely controlling and monitoring the use of computer software
patent, February 1995
- Hornbuckle, Gary D.
- US Patent Document 5,388,211
System for testing interactive software
patent, September 1987
- Kerr, Randal H.; Mesnard, Robert M.
- US Patent Document 4,696,003
Identification with RFID Asset Locator for Entry Authorization
patent-application, September 2009
- Determan, Gary E.; Anderson, Bruce W.
- US Patent Document 12/414584; 20090237203
Electronic commerce using a secure courier system
patent, September 1997
- Elgamal, Taher
- US Patent Document 5,671,279
Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing
patent, January 1998
- Hong, Jack; Toye, George
- US Patent Document 5,710,883
Firewall system for protecting network elements connected to a public network
patent, October 1998
- Coley, Christopher; Wesinger, Ralph
- US Patent Document 5,826,014
System for installing information related to a software application to a remote computer over a network
patent, May 2000
- Smith, Benjamin; Smith, Fred Hewitt
- US Patent Document 6,067,582
Method and apparatus for key-management scheme for use with internet protocols at site firewalls
patent, May 1995
- Aziz, Ashar
- US Patent Document 5,416,842
Interposition agents: transparently interposing user code at the system interface
journal, December 1993
- Jones, Michael B.
- ACM SIGOPS Operating Systems Review, Vol. 27, Issue 5
Obfuscated source program, source program conversion method and apparatus, and source conversion program
patent-application, October 2003
- Uchida, Kaoru
- US Patent Document 10/395285; 20030188187
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
patent, May 2008
- van der Made, Peter A. J.
- US Patent Document 7,370,360
Software distribution system
patent, March 1991
- Chernow, Fred; Peterson, Randy
- US Patent Document 4,999,806
Accessing Resources Based on Capturing Information from a Rendered Document
patent-application, April 2011
- King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik
- US Patent Document 12/723614; 20110096174
Real-time video-on-demand system based on distributed servers and an agent-oriented application
conference, February 1996
- Takahata, Minoru; Uemori, Akira; Nakano, Hirotaka
- Electronic Imaging: Science & Technology, SPIE Proceedings
System and method for detecting malware in an executable code module according to the code module's exhibited behavior
patent, March 2011
- Bodorin, Daniel M.; Marinescu, Adrian
- US Patent Document 7,913,305
License document interchange format for license management system
patent, August 1995
- Wyman, Robert Mark
- US Patent Document 5,438,508
Protecting software from unauthorized use by converting source code modules to byte codes
patent, October 2006
- Cronce, Paul; Fontana, Joseph; Anderson, Eric C.
- US Patent Document 7,124,445
Methods and systems for authenticating users
patent, January 2011
- White, Conor Robert; Peirce, Michael; Cramer, Jason Scott
- US Patent Document 7,865,937
Method for encouraging purchase of executable and non-executable software
patent, April 1996
- Schull, Jonathan
- US Patent Document 5,509,070
Communication network
patent, March 1988
- Ault, Cyrus F.; Gibler, Clinton D.
- US Patent Document 4,731,880
System and method for managing try-and-buy usage of application programs
patent, January 1998
- Rose, John R.
- US Patent Document 5,708,709
Methods and apparatus for persistent control and protection of content
patent, June 2007
- Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.
- US Patent Document 7,233,948
Remote network administration methods and apparatus
patent, May 1998
- Daly, Una T.; Huang, Ying; Parker, Robert
- US Patent Document 5,748,896
Protecting software from unauthorized use by converting source code modules to byte codes
patent-application, December 2003
- Cronce, Paul A.; Fontana, Joseph M.; Anderson, Eric C.
- US Patent Document 10/177499; 20030236986
Security system for electronic funds transfer system
patent, October 1983
- Campbell, Carl M.
- US Patent Document 4,408,203
Digital rights management system and method
patent-application, June 2004
- Shen-Orr, Chaim; Hibshoosh, Eliphaz; Gyora, Gyora
- US Patent Document 10/472286; 20040111613
Method of protecting electronically published materials using cryptographic protocols
patent, April 1996
- Choudhury, Abhijit; Maxemchuk, Nicholas F.; Paul, Sanjoy
- US Patent Document 5,509,074
Method for ensuring secure communications
patent, April 1994
- Rasmussen, Harry R.; LaBounty, Jack; Rosenow, Michael J.
- US Patent Document 5,301,247
Software distribution system to build and distribute a software release
patent, February 1996
- Shing, Norman; Erlikh, Leonid; Lim, Nicholas R.
- US Patent Document 5,495,610
Power system supporting CDPD operation
patent, April 1998
- Seazholtz, John W.; Farris, Robert D.
- US Patent Document 5,737,706
Arrangement with cooperating management server node and network service node
patent, April 1991
- Griffin, David; Campbell, Jonathan; Reilly, Michael
- US Patent Document 5,005,122
WebMake: Integrating distributed software development in a structure-enhanced Web
journal, April 1995
- Baentsch, Michael; Molter, Georg; Sturm, Peter
- Computer Networks and ISDN Systems, Vol. 27, Issue 6, p. 789-800
Method and apparatus for managing and automatically updating software programs
patent, March 1998
- Kullick, Steven E.; Titus, Diane
- US Patent Document 5,732,275
Network security bridge and associated method
patent, August 1996
- Jacobson, Douglas
- US Patent Document 5,548,649
Internet server access control and monitoring systems
patent, January 1998
- Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey
- US Patent Document 5,708,780
Internet based training
patent, June 1999
- Parker, Lance T.; Tusoni, Lawrence D.
- US Patent Document 5,909,589
System and method for installing an auditable secure network
patent, July 2005
- Smith, Benjamin; Smith, Fred Hewitt
- US Patent Document 6,918,038
Message routing in a multi-processor computer system with alternate edge strobe regeneration
patent, January 1997
- Nugent, Steven F.
- US Patent Document 5,594,866
Network license server
patent, June 1991
- Johnson, Herrick J.; Olson, Margaret; Jones, JR., Stuart
- US Patent Document 5,023,907
Method for configuring a computer server to operate with network operating system software to prevent memory address conflicts between workstations
patent, May 1994
- Harwell, Reginald W.; Parker, Darrold J.
- US Patent Document 5,317,744
Near-Field Communication (NFC) System Providing NFC Tag Geographic Position Authentication and Related Methods
patent-application, April 2012
- Tysowski, Piotr Konrad
- US Patent Document 13/241567; 20120094598
Tamper resistant software encoding
patent-application, November 2003
- Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan
- US Patent Document 10/340410; 20030221121
Software self-defense systems and methods
patent-application, October 2007
- Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.
- US Patent Document 11/506321; 20070234070
Method and apparatus for updating software at remote locations
patent, October 1992
- Kirouac, Donald L.; Porrett, William A.; Czerwinski, Marek J.
- US Patent Document 5,155,847
Method and system for automatically displaying and configuring a network monitoring system
patent, September 1995
- Hotka, Michael A.
- US Patent Document 5,452,415
Software-generated machine identifier
patent, October 2006
- Wecker, David B.
- US Patent Document 7,117,535
Cryptographic communications using in situ generated cryptographic keys for conditional access
patent, December 2006
- Fruehauf, Hugo; Au, Derek; Bartholet, Thomas
- US Patent Document 7,149,308
Method of and apparatus for encrypting and transferring files
patent, January 2007
- Kessler, Edward; Mendelson, Jordan
- US Patent Document 7,170,999
Ring network security system with encoding of data entering a subnetwork and decoding of data leaving the subnet work
patent, June 1997
- Osman, Fazil Ismet; Perloff, Ronald S.
- US Patent Document 5,638,512
Systems and methods for the prevention of unauthorized use and manipulation of digital content
patent, February 2008
- Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.
- US Patent Document 7,328,453
Obfuscation techniques for enhancing software security
patent, December 2003
- Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas W.
- US Patent Document 6,668,325
Distributed document version control
patent-application, May 2005
- Herbach, Jonathan D.; Donahue, James; Shapiro, William M.
- US Patent Document 10/699520; 20050097441
System and method for installing software and updating configuration files
patent, September 1993
- Holmes, Keith; Cunningham, Connel G.; Gleeson, Fiona
- US Patent Document 5,247,683
System and method for installing an auditable secure network
patent, March 2003
- Smith, Benjamin; Smith, Fred Hewitt
- US Patent Document 6,532,543
Access Control System and Method Using Radio-Frequency Identification and Imaging
patent-application, January 2011
- Charych, Harold
- US Patent Document 12/825640; 20110001606
Access control system with RFID and biometric facial recognition
patent-application, November 2007
- Kail, Kevin J.; Williams, Charles B.; Kail, Richard L.
- US Patent Document 11/790385; 20070252001