Controlling user access to electronic resources without password
Abstract
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
- Inventors:
- Publication Date:
- Research Org.:
- Angel Secure Networks, Inc., Old Town, ME (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1184556
- Patent Number(s):
- 9,058,482
- Application Number:
- 13/410,287
- Assignee:
- Angel Secure Networks, Inc. (Old Town, ME)
- DOE Contract Number:
- FG02-08ER5047
- Resource Type:
- Patent
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; 99 GENERAL AND MISCELLANEOUS
Citation Formats
Smith, Fred Hewitt. Controlling user access to electronic resources without password. United States: N. p., 2015.
Web.
Smith, Fred Hewitt. Controlling user access to electronic resources without password. United States.
Smith, Fred Hewitt. 2015.
"Controlling user access to electronic resources without password". United States. https://www.osti.gov/servlets/purl/1184556.
@article{osti_1184556,
title = {Controlling user access to electronic resources without password},
author = {Smith, Fred Hewitt},
abstractNote = {Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.},
doi = {},
url = {https://www.osti.gov/biblio/1184556},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Tue Jun 16 00:00:00 EDT 2015},
month = {Tue Jun 16 00:00:00 EDT 2015}
}
Works referenced in this record:
Security system for electronic funds transfer system
patent, October 1983
- Campbell, Carl M.
- US Patent Document 4,408,203
System for testing interactive software
patent, September 1987
- Kerr, Randal H.; Mesnard, Robert M.
- US Patent Document 4,696,003
Communication network
patent, March 1988
- Ault, Cyrus F.; Gibler, Clinton D.
- US Patent Document 4,731,880
Multi-length packet format including check sequence(s)
patent, October 1990
- May, Jr., Carl J.
- US Patent Document 4,962,498
Software distribution system
patent, March 1991
- Chernow, Fred; Peterson, Randy
- US Patent Document 4,999,806
Arrangement with cooperating management server node and network service node
patent, April 1991
- Griffin, David; Campbell, Jonathan; Reilly, Michael
- US Patent Document 5,005,122
Network license server
patent, June 1991
- Johnson, Herrick J.; Olson, Margaret; Jones, JR., Stuart
- US Patent Document 5,023,907
Method and apparatus for updating software at remote locations
patent, October 1992
- Kirouac, Donald L.; Porrett, William A.; Czerwinski, Marek J.
- US Patent Document 5,155,847
System and method for installing software and updating configuration files
patent, September 1993
- Holmes, Keith; Cunningham, Connel G.; Gleeson, Fiona
- US Patent Document 5,247,683
Method for ensuring secure communications
patent, April 1994
- Rasmussen, Harry R.; LaBounty, Jack; Rosenow, Michael J.
- US Patent Document 5,301,247
Method for configuring a computer server to operate with network operating system software to prevent memory address conflicts between workstations
patent, May 1994
- Harwell, Reginald W.; Parker, Darrold J.
- US Patent Document 5,317,744
Method and apparatus for remotely controlling and monitoring the use of computer software
patent, February 1995
- Hornbuckle, Gary D.
- US Patent Document 5,388,211
Method and apparatus for key-management scheme for use with internet protocols at site firewalls
patent, May 1995
- Aziz, Ashar
- US Patent Document 5,416,842
Method of remotely installing software directly from a central computer
patent, May 1995
- Platt, Stephen M.
- US Patent Document 5,421,009
License document interchange format for license management system
patent, August 1995
- Wyman, Robert Mark
- US Patent Document 5,438,508
Method and system for automatically displaying and configuring a network monitoring system
patent, September 1995
- Hotka, Michael A.
- US Patent Document 5,452,415
Software distribution system to build and distribute a software release
patent, February 1996
- Shing, Norman; Erlikh, Leonid; Lim, Nicholas R.
- US Patent Document 5,495,610
Method for encouraging purchase of executable and non-executable software
patent, April 1996
- Schull, Jonathan
- US Patent Document 5,509,070
Method of protecting electronically published materials using cryptographic protocols
patent, April 1996
- Choudhury, Abhijit; Maxemchuk, Nicholas F.; Paul, Sanjoy
- US Patent Document 5,509,074
Network security bridge and associated method
patent, August 1996
- Jacobson, Douglas
- US Patent Document 5,548,649
Message routing in a multi-processor computer system with alternate edge strobe regeneration
patent, January 1997
- Nugent, Steven F.
- US Patent Document 5,594,866
Ring network security system with encoding of data entering a subnetwork and decoding of data leaving the subnet work
patent, June 1997
- Osman, Fazil Ismet; Perloff, Ronald S.
- US Patent Document 5,638,512
Electronic commerce using a secure courier system
patent, September 1997
- Elgamal, Taher
- US Patent Document 5,671,279
System and method for controlling access to data located on a content server
patent, January 1998
- Schloss, Robert Jeffrey
- US Patent Document 5,706,507
System and method for managing try-and-buy usage of application programs
patent, January 1998
- Rose, John R.
- US Patent Document 5,708,709
Internet server access control and monitoring systems
patent, January 1998
- Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey
- US Patent Document 5,708,780
Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing
patent, January 1998
- Hong, Jack; Toye, George
- US Patent Document 5,710,883
Method and apparatus for managing and automatically updating software programs
patent, March 1998
- Kullick, Steven E.; Titus, Diane
- US Patent Document 5,732,275
Power system supporting CDPD operation
patent, April 1998
- Seazholtz, John W.; Farris, Robert D.
- US Patent Document 5,737,706
Remote network administration methods and apparatus
patent, May 1998
- Daly, Una T.; Huang, Ying; Parker, Robert
- US Patent Document 5,748,896
Firewall system for protecting network elements connected to a public network
patent, October 1998
- Coley, Christopher; Wesinger, Ralph
- US Patent Document 5,826,014
Internet based training
patent, June 1999
- Parker, Lance T.; Tusoni, Lawrence D.
- US Patent Document 5,909,589
System and method for secure information transmission over a network
patent, October 1999
- Angelo, Michael F.; Olarig, Sompong Paul
- US Patent Document 5,974,250
System for installing information related to a software application to a remote computer over a network
patent, May 2000
- Smith, Benjamin; Smith, Fred Hewitt
- US Patent Document 6,067,582
System, method and article of manufacture for security management in a development architecture framework
patent, November 2001
- Bowman-Amuah, Michel K.
- US Patent Document 6,324,647
System and method for installing an auditable secure network
patent, March 2003
- Smith, Benjamin; Smith, Fred Hewitt
- US Patent Document 6,532,543
Obfuscation techniques for enhancing software security
patent, December 2003
- Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas W.
- US Patent Document 6,668,325
Tamper resistant software encoding
patent, January 2005
- Chow, Stanley; Johnson, Harold; Gu, Yuan Xiang
- US Patent Document 6,842,862
System and method for installing an auditable secure network
patent, July 2005
- Smith, Benjamin; Smith, Fred Hewitt
- US Patent Document 6,918,038
Software-generated machine identifier
patent, October 2006
- Wecker, David B.
- US Patent Document 7,117,535
Protecting software from unauthorized use by converting source code modules to byte codes
patent, October 2006
- Cronce, Paul; Fontana, Joseph; Anderson, Eric C.
- US Patent Document 7,124,445
Cryptographic communications using in situ generated cryptographic keys for conditional access
patent, December 2006
- Fruehauf, Hugo; Au, Derek; Bartholet, Thomas
- US Patent Document 7,149,308
Method of and apparatus for encrypting and transferring files
patent, January 2007
- Kessler, Edward; Mendelson, Jordan
- US Patent Document 7,170,999
Methods and apparatus for persistent control and protection of content
patent, June 2007
- Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.
- US Patent Document 7,233,948
Systems and methods for the prevention of unauthorized use and manipulation of digital content
patent, February 2008
- Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.
- US Patent Document 7,328,453
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
patent, May 2008
- van der Made, Peter A. J.
- US Patent Document 7,370,360
Methods and systems for authenticating users
patent, January 2011
- White, Conor Robert; Peirce, Michael; Cramer, Jason Scott
- US Patent Document 7,865,937
System and method for detecting malware in an executable code module according to the code module's exhibited behavior
patent, March 2011
- Bodorin, Daniel M.; Marinescu, Adrian
- US Patent Document 7,913,305
Information reproducing apparatus and secure module
patent-application, July 2003
- Kohiyama, Kiyoshi; Hasebe, Takayuki
- US Patent Document 10/305187; 20030126457
Obfuscated source program, source program conversion method and apparatus, and source conversion program
patent-application, October 2003
- Uchida, Kaoru
- US Patent Document 10/395285; 20030188187
Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
patent-application, November 2003
- van der Made, Peter A. J.
- US Patent Document 10/145592; 20030212902
Tamper resistant software encoding
patent-application, November 2003
- Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan
- US Patent Document 10/340410; 20030221121
Protecting software from unauthorized use by converting source code modules to byte codes
patent-application, December 2003
- Cronce, Paul A.; Fontana, Joseph M.; Anderson, Eric C.
- US Patent Document 10/177499; 20030236986
Digital rights management system and method
patent-application, June 2004
- Shen-Orr, Chaim; Hibshoosh, Eliphaz; Gyora, Gyora
- US Patent Document 10/472286; 20040111613
Distributed document version control
patent-application, May 2005
- Herbach, Jonathan D.; Donahue, James; Shapiro, William M.
- US Patent Document 10/699520; 20050097441
Software obfuscation
patent-application, January 2006
- Chu, Frank Nian-Tzu; Wu, Wei; Bennett, Julie D.
- US Patent Document 11/061790; 20060005250
Image verification
patent-application, January 2006
- Chu, Frank Nian-Tzu; Wu, Wei; Bennett, Julie D.
- US Patent Document 11/061792; 20060005252
Location and user identification for online gaming
patent-application, May 2006
- Nguyen, Binh; Paulsen, Craig
- US Patent Document 10/981435; 20060095790
Software self-defense systems and methods
patent-application, October 2007
- Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.
- US Patent Document 11/506321; 20070234070
Access control system with RFID and biometric facial recognition
patent-application, November 2007
- Kail, Kevin J.; Williams, Charles B.; Kail, Richard L.
- US Patent Document 11/790385; 20070252001
Identification with RFID Asset Locator for Entry Authorization
patent-application, September 2009
- Determan, Gary E.; Anderson, Bruce W.
- US Patent Document 12/414584; 20090237203
Access Control System and Method Using Radio-Frequency Identification and Imaging
patent-application, January 2011
- Charych, Harold
- US Patent Document 12/825640; 20110001606
Near-Field Communication (NFC) System Providing NFC Tag Geographic Position Authentication and Related Methods
patent-application, April 2012
- Tysowski, Piotr Konrad
- US Patent Document 13/241567; 20120094598
WebMake: Integrating distributed software development in a structure-enhanced Web
journal, April 1995
- Baentsch, Michael; Molter, Georg; Sturm, Peter
- Computer Networks and ISDN Systems, Vol. 27, Issue 6, p. 789-800
Distributed audit with secure remote procedure calls
conference, January 1991
- Tsai, C. -R.; Gligor, V. D.
- Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology
Real-time video-on-demand system based on distributed servers and an agent-oriented application
conference, February 1996
- Takahata, Minoru; Uemori, Akira; Nakano, Hirotaka
- Electronic Imaging: Science & Technology, SPIE Proceedings
Interposition agents: transparently interposing user code at the system interface
journal, December 1993
- Jones, Michael B.
- ACM SIGOPS Operating Systems Review, Vol. 27, Issue 5
An electronic information marketplace
journal, February 1985
- Turoff, Murray; Chinai, Sanjit
- Computer Networks and ISDN Systems, Vol. 9, Issue 2, p. 79-90