StrikeForce Technologies, Inc. v. PhoneFactor, Inc., et al., C.A. No. 13-490-RGA-MPT, January 29, 2015.
Thynge, M. J. Report and recommendation issues regarding a Markman hearing held on November 19, 2014.
The court construes the following terms:
-
intercepting (as a general concept)/ intercepted/ an interception device / a device/ an interception device for receiving a login identification originating from an accessor for access to said host computer
-
access channel / first channel/ authentication channel / second channel
-
security computer / host computer
-
a multichannel security system / an out-of-band computer security system / a security system
-
verifying the login identification
-
subscriber database / a database
-
demand from an accessor / demand for access / access demand[s] / demand from said accessor / demand to access /a demand
-
control module
-
re-enter predetermined data / retransmit predetermined data
-
comparator means in said security computer for authenticating the access demand in response to the retransmission of the predetermined data from the telephonic device
-
biometric analyzer . . . for analyzing a monitored parameter of [said] / [the] accessor
-
a component for receiving the transmitted data and comparing said transmitted data to predetermined data, such that, depending on the comparison of the transmitted and the predetermined data, said security computer outputs an instruction to the host computer to grant access to the host computer or deny access thereto
-
prompt means for outputting a second instruction at the telephonic device to re-enter predetermined data at and retransmit predetermined data from the telephonic device / prompt mechanism for instructing said accessor to enter predetermined data at and transmit said predetermined data from said peripheral device
-
voice recognition means for authenticating at least one access demand in response to transmission of the predetermined auditory statement / voice sampling means for instructing the accessor to repeat back and transmit a predetermined auditory statement over the peripheral device
-
authentication program mechanism for authenticating access to said host computer
-
login identification demand to access