Claims Are Construed Regarding Multichannel Security Systems And Methods For Authenticating For Access To Online Services

Morris James LLP
Contact

StrikeForce Technologies, Inc. v. PhoneFactor, Inc., et al., C.A. No. 13-490-RGA-MPT, January 29, 2015.

Thynge, M. J. Report and recommendation issues regarding a Markman hearing held on November 19, 2014.

The court construes the following terms:

  1. intercepting (as a general concept)/ intercepted/ an interception device / a device/ an interception device for receiving a login identification originating from an accessor for access to said host computer
  2. access channel / first channel/ authentication channel / second channel
  3. security computer / host computer
  4.  a multichannel security system / an out-of-band computer security system / a security system
  5. verifying the login identification
  6. subscriber database / a database
  7. demand from an accessor / demand for access / access demand[s] / demand from said accessor / demand to access /a demand
  8. control module
  9. re-enter predetermined data / retransmit predetermined data
  10. comparator means in said security computer for authenticating the access demand in response to the retransmission of the predetermined data from the telephonic device
  11.  biometric analyzer . . . for analyzing a monitored parameter of [said] / [the] accessor
  12.  a component for receiving the transmitted data and comparing said transmitted data to predetermined data, such that, depending on the comparison of the transmitted and the predetermined data, said security computer outputs an instruction to the host computer to grant access to the host computer or deny access thereto
  13.  prompt means for outputting a second instruction at the telephonic device to re-enter predetermined data at and retransmit predetermined data from the telephonic device / prompt mechanism for instructing said accessor to enter predetermined data at and transmit said predetermined data from said peripheral device
  14. voice recognition means for authenticating at least one access demand in response to transmission of the predetermined auditory statement / voice sampling means for instructing the accessor to repeat back and transmit a predetermined auditory statement over the peripheral device
  15. authentication program mechanism for authenticating access to said host computer
  16.  login identification demand to access

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Morris James LLP | Attorney Advertising

Written by:

Morris James LLP
Contact
more
less

Morris James LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide