|
|
|
|
|
|
|
|
| ( 11 of 22 ) |
| United States Patent | 9,887,992 |
| Venkat , et al. | February 6, 2018 |
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for site codes for website authentication are disclosed. In one aspect, a method includes receiving, a request to start a new authenticated session of the web page on the client device. The method includes generating an optical machine-readable code and a security image. The method includes transmitting (i) the security image, (ii) the optical machine-readable code, and (iii) instructions for the server to provide the security image and the optical machine-readable code for simultaneous display. The method includes receiving extracted data that the mobile device extracted from the optical machine-readable code in response to the mobile device optically detecting the optical machine-readable code using a camera of the mobile device. The method includes verifying an identity of the user based on a comparison of the extracted data and data corresponding to the optical machine-readable code.
| Inventors: | Venkat; Rajesh (Carmel, IN), Qiao; Yong (Vienna, VA), Vazquez; Hector (Ashburn, VA) | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Applicant: |
| ||||||||||
| Assignee: |
MicroStrategy Incorporated
(Vienna,
VA)
|
||||||||||
| Family ID: | 61027386 | ||||||||||
| Appl. No.: | 14/817,413 | ||||||||||
| Filed: | August 4, 2015 |
| Application Number | Filing Date | Patent Number | Issue Date | ||
|---|---|---|---|---|---|
| 13914296 | Jun 10, 2013 | ||||
| 61670456 | Jul 11, 2012 | ||||
| 61691526 | Aug 21, 2012 | ||||
| 62033079 | Aug 4, 2014 | ||||
| Current U.S. Class: | 1/1 |
| Current CPC Class: | G06F 21/35 (20130101); H04W 12/06 (20130101); H04L 63/0853 (20130101); G06F 21/36 (20130101); H04W 12/77 (20210101) |
| Current International Class: | G06F 7/04 (20060101); G06F 21/36 (20130101); H04L 9/32 (20060101); G06F 21/00 (20130101); H04L 29/06 (20060101); G06F 21/35 (20130101) |
| Field of Search: | ;726/4-6 ;713/168,182 |
| 5668874 | September 1997 | Kristol |
| 5918228 | June 1999 | Rich et al. |
| 6023769 | February 2000 | Gonzalez |
| 6477645 | November 2002 | Drews |
| 6668322 | December 2003 | Wood et al. |
| 6715082 | March 2004 | Chang et al. |
| 6754823 | June 2004 | Kurzweil et al. |
| 6993658 | January 2006 | Engberg et al. |
| 7216109 | May 2007 | Donner |
| 7225464 | May 2007 | Satyavolu et al. |
| 7266693 | September 2007 | Potter et al. |
| 7356837 | April 2008 | Asghari-Kamrani et al. |
| 7379393 | May 2008 | Morykwas et al. |
| 7454349 | November 2008 | Teunen et al. |
| 7475812 | January 2009 | Novozhenets et al. |
| 7512254 | March 2009 | Vollkommer et al. |
| 7694130 | April 2010 | Martinez |
| 7814538 | October 2010 | Kuehnel et al. |
| 7882549 | February 2011 | Edwards, Jr. et al. |
| 8087072 | December 2011 | Gajjala et al. |
| 8117459 | February 2012 | Cameron et al. |
| 8181236 | May 2012 | Banerjee |
| 8234220 | July 2012 | Weiss |
| 8234494 | July 2012 | Bansal et al. |
| 8255971 | August 2012 | Webb et al. |
| 8295855 | October 2012 | Narayan et al. |
| 8613052 | December 2013 | Weiss |
| 8739260 | May 2014 | Damm-Goossens |
| 8752145 | June 2014 | Dotan et al. |
| 8775807 | July 2014 | Vazquez et al. |
| 9027099 | May 2015 | Saylor et al. |
| 9154303 | October 2015 | Saylor |
| 9264415 | February 2016 | Saylor et al. |
| 9269358 | February 2016 | Saylor et al. |
| 2002/0026593 | February 2002 | Sakuma et al. |
| 2002/0078243 | June 2002 | Rich et al. |
| 2002/0141586 | October 2002 | Margalit et al. |
| 2004/0003260 | January 2004 | Hawkes et al. |
| 2004/0054898 | March 2004 | Chao et al. |
| 2004/0153649 | August 2004 | Rhoads et al. |
| 2004/0234131 | November 2004 | Kondo |
| 2005/0033837 | February 2005 | Bohannon |
| 2005/0165667 | July 2005 | Cox |
| 2005/0166263 | July 2005 | Nanopoulos et al. |
| 2005/0238208 | October 2005 | Sim |
| 2007/0050635 | March 2007 | Popp |
| 2007/0061730 | March 2007 | Kuenzi |
| 2007/0277224 | November 2007 | Osborn et al. |
| 2008/0071537 | March 2008 | Tamir et al. |
| 2008/0163361 | July 2008 | Davis |
| 2008/0178271 | July 2008 | Gajjala |
| 2008/0256594 | October 2008 | Satish |
| 2009/0097661 | April 2009 | Orsini |
| 2009/0117883 | May 2009 | Coffing et al. |
| 2009/0119757 | May 2009 | Acuna |
| 2009/0187975 | July 2009 | Edwards, Jr. |
| 2009/0239503 | September 2009 | Smeets |
| 2009/0292641 | November 2009 | Weiss |
| 2010/0031051 | February 2010 | Machani |
| 2010/0082491 | April 2010 | Rosenblatt et al. |
| 2010/0098256 | April 2010 | Kirshenbaum |
| 2010/0116880 | May 2010 | Stollman |
| 2010/0169958 | July 2010 | Wener et al. |
| 2010/0269156 | October 2010 | Hohlfeld |
| 2011/0270751 | November 2011 | Csinger et al. |
| 2011/0321144 | December 2011 | Saxena |
| 2012/0028609 | February 2012 | Hruska |
| 2012/0144203 | June 2012 | Albisu |
| 2012/0191575 | July 2012 | Vilke |
| 2012/0253809 | October 2012 | Thomas et al. |
| 2012/0257759 | October 2012 | Nick et al. |
| 2012/0274444 | November 2012 | Micali |
| 2012/0291108 | November 2012 | Talamo |
| 2013/0037607 | February 2013 | Bullwinkel |
| 2013/0061301 | March 2013 | Novak |
| 2013/0074168 | March 2013 | Hao |
| 2013/0111056 | May 2013 | Prasad |
| 2013/0111571 | May 2013 | Jakobsson |
| 2013/0112760 | May 2013 | Schory et al. |
| 2013/0124292 | May 2013 | Juthani |
| 2013/0124855 | May 2013 | Varadarajan |
| 2013/0125231 | May 2013 | Kuenzi |
| 2013/0132091 | May 2013 | Skerpac |
| 2013/0139233 | May 2013 | Maity |
| 2013/0173915 | July 2013 | Haulund |
| 2013/0198264 | August 2013 | Hellman et al. |
| 2013/0205360 | August 2013 | Novak et al. |
| 2013/0222835 | August 2013 | Iwamoto |
| 2013/0227710 | August 2013 | Barak |
| 2013/0263211 | October 2013 | Neuman et al. |
| 2013/0276075 | October 2013 | Gong |
| 2013/0282588 | October 2013 | Hruska |
| 2013/0325704 | December 2013 | Gorman et al. |
| 2014/0001253 | January 2014 | Smith |
| 2014/0040139 | February 2014 | Brudnicki |
| 2014/0245417 | August 2014 | Hu |
| 2014/0281525 | September 2014 | Acar et al. |
"Transport Operators and Barcode M-Ticketing: Expand station sales capacity without spending more on staff and ticket machines," Masabi, London, UK, publicly available before Jun. 10, 2013, 2 pages. cited by applicant . Essa et al., M.I.T Media Laboratory Perceptual Computing Section Technical Report No. 370 Appears: Proceedings of Computer Animation '96 Conference, Geneva, Switzerland, Jun. 1996, pp. 1-12. cited by applicant . Jain et al. "An Introduction to Biometric Recognition," IEEE Transactions on Circuits and Systems for Video Technology vol. 14, No. 1, Jan. 2004, pp. 4-20. cited by applicant . Lei, "Similarity Between the Mandelbrot Set and Julia Sets," Commun. 1990 Math Phys. 134, 587-617, 1990. cited by applicant . McBryan, "Textual Associations from Images Applied to Authentication," Masters Thesis 2005/2006, pp. 1-106. cited by applicant . Mills, "The Autokey Security Architecture, Protocol and Algorithms," Technical Report Jan. 1, 2006, Jan. 2006, 61 pages. cited by applicant . Open Intents--(O1 Countdown, Feb. 5, 2011, 3 pages). cited by applicant . Oprea et al., "Securing a Remote Terminal Application with a Mobile Trusted Device," ACSAC'04, 2004, 10 pages. cited by applicant . Rail Industry Meetings [online]. "Masabi and MBTA to launch first smartphone rail ticketing system in the US," Mar. 2012, [Retrieved on Jun. 14, 2012]. Retrieved from the Internet: <URL: http://www.abe-industry.com/railim/index.php/en/newsflash/788-masabi-and-- mbta-to-launch-first-smartphone-rail-ticketing-system-in-the-us.html> 2 pages. cited by applicant . Ray, "Apple Passbook card-`n`-ticket app paves way for iOS e-wallet," The Register, Jun. 12, 2012, [Retrieved on Jun. 14, 2012]. Retrieved from the Internet: <URL: http://www.theregister.co.uk/2012/06/12/apple.sub.--passbook/>. 3 pages. cited by applicant . Rooney "Masabi Launches U.S.'s First Ticketless Rail System," The Wall Street Journal, Apr. 2012, [Retrieved on Jun. 14, 2012]. Retrieved from the Internet: <URL: http://blogs.wsj.com/tech-europe/2012/04/23/masabi-launches-u-s-s-first-t- icketless-rail-system/>. 3 pages. cited by applicant . Saragih et al., "Realtime avatar animation from a single image." Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on. IEEE, 2011, pp. 117-124. cited by applicant . Weir et al., "Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords," CCS'10, Oct. 4-8, 2010, pp. 162-175. cited by applicant . Wikipedia, "Certificate authority," Wikipedia [online] Aug. 8, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Certificate.sub.--authority>, 4 pages. cited by applicant . Wikipedia, "Certificate signing request," Wikipedia [online] Aug. 20, 2013 [retrieved on Aug. 24, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Certificate.sub.--signing.sub.--request>, 4 pages. cited by applicant . Wikipedia, "Cryptographic hash function," Wikipedia [online] Aug. 8, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Cryptographic.sub.--hash.sub.--function>, 5 pages. cited by applicant . Wikipedia, "Digital signature," Wikipedia [online] Aug. 14, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Digital.sub.--signature>, 10 pages. cited by applicant . Wikipedia, "ID-based encryption," Wikipedia [online] Jul. 27, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Identity.sub.--based.sub.--encryption>, 5 pages. cited by applicant . Wikipedia, "Message authentication code," Wikipedia [online] Aug. 8, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Message.sub.--authentication.sub.--codes>- , 4 pages. cited by applicant . Wikipedia, "Multi-factor authentication," Wikipedia [online] Aug. 6, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Multi-factor.sub.--authentication>, 3 pages. cited by applicant . Wikipedia, "Public key certificate," Wikipedia [online] Aug. 12, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Digital.sub.--certificates>, 7 pages. cited by applicant . Wikipedia, "Public-key cryptography," Wikipedia [online] Aug. 15, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Public-key.sub.--cryptography>, 12 pages. cited by applicant . Wikipedia, "Public-key infrastructure," Wikipedia [online] Aug. 8, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Public.sub.--Key.sub.--Infrastructure>, 6 pages. cited by applicant . Wikipedia, "SecureID," Wikipedia [online] Jul. 5, 2012 [retrieved on Aug. 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/SecurID>, 5 pages. cited by applicant . Wikipedia, "Two-factor authentication," Wikipedia [online] Aug. 13, 2012 [retrieved on May 15, 2012]. Retrieved from the Internet: <URL: http://en.wikipedia.org/wiki/Two-factor.sub.--authentication>, 15 pages. cited by applicant . U.S. Final Office Action for U.S. Appl. No. 13/914,296 dated Feb. 5, 2015, 15 pages. cited by applicant . U.S. Final Office Action for U.S. Appl. No. 13/914,403 dated Feb. 26, 2015, 13 pages. cited by applicant . U.S. Final Office Action for U.S. Appl. No. 13/914,408 dated Mar. 9, 2015, 23 pages. cited by applicant . U.S. Final Office Action for U.S. Appl. No. 13/914,429 dated Jan. 14, 2015, 15 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/874,721, dated Nov. 4, 2014, 13 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,296 dated Oct. 22, 2014, 18 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,373 dated Apr. 6, 2015, 18 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,403 dated Nov. 7, 2014, 12 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,408 dated Nov. 13, 2014, 22 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,429 dated Sep. 11, 2014, 16 pages. cited by applicant . U.S. Notice of Allowance in U.S. Appl. No. 13/914,353 dated Dec. 8, 2014, 19 pages. cited by applicant . U.S. Notice of Allowance in U.S. Appl. No. 13/914,353 dated Mar. 27, 2015, 9 pages. cited by applicant . U.S. Final Office Action for U.S. Appl. No. 13/914,296 dated Jun. 17, 2015, 29 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,408 dated Jun. 17, 2015, 22 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/914,403 dated Jun. 2, 2015, 16 pages. cited by applicant . U.S. Notice of Allowance in U.S. Appl. No. 13/874,721 dated Jun. 4, 2015, 14 pages. cited by applicant . U.S. Notice of Allowance in U.S. Appl. No. 13/914,403 dated Oct. 8, 2015, 12 pages. cited by applicant . U.S. Notice of Allowance in U.S. Appl. No. 13/914,373 dated Oct. 16, 2015, 31 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 13/957,020 dated Mar. 11, 2016, 12 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 15/040,777 dated Apr. 13, 2016, 20 pages. cited by applicant . U.S. Non-Final Office Action for U.S. Appl. No. 15/043,202 dated Apr. 13, 2016, 20 pages. cited by applicant . U.S. Final Office Action for U.S. Appl. No. 15/043,202, dated Jul. 26, 2016, 24 pages. cited by applicant . Fazackerley, Mark, "The Usher Identity Platform: A description of MicroStrategy's mobile identity solution," Usher by Microstrategy, Apr. 2014, 15 pages, URL<https://www.slideshare.net/markfazackerley3/usher-functionality>- ;. cited by applicant . Cahill et al., "Micro Strategy Introduces Enterprise Security Platform Usher, Debuts Usher Software Development Kit," MicroStrategy, Apr. 2015, 4 pages, URL<http://ir.microstrategy.com/releasedetail.cfm?releaseid=9- 04735>. cited by applicant . "Introduction to Usher," Usher by MicroStrategy, May 2014, 10 pages, URL<https://mobileapps.microstrategy.com/usher/MSTREmployeeFAQ/MSTREmp- loyeeFAQ.html >. cited by applicant . "MicroStrategy Usher: the revolutionary new security solution," MicroStrategy, 2015, 20 pages, URL<https://www.microstrategy.com/Strategy/media/downloads/Resource%20- Center/security/Whitepaper-UsherSecurityArch.pdf>. cited by applicant . Lee, Justin, "Inside Micro Strategy's biometric mobile identity platform Usher," Biometrics Research Group, Inc., Apr. 2, 2015, 5 pages, URL<http://www.biometricupdate.com/201504/inside-microstrategys-biomet- ric-mobile-identity-platform-usher>. cited by applicant. |
|
|