-
Strikeforce Technologies, Inc. v. Secureauth Corporation DC CAFC
- 2:17-cv-04314
- C.D. Cal.
- Judge: John A. Kronstadt
+1
- Filed: 06/09/2017
- Closed: 12/28/2017
- Latest Docket Entry: 03/28/2019
- PACER
1
Plaintiff
1
Defendant
3
Accused
Products
3
Patents-in-Suit
288
Days in
Litigation
-
Strikeforce Technologies, Inc. v. Secureauth Corporation DC CAFC
- 2:17-cv-04314
- C.D. Cal.
- Judge: John A. Kronstadt
+1
- Filed: 06/09/2017
- Closed: 12/28/2017
- Latest Docket Entry: 03/28/2019
- PACER
Assigned Judge
Outcome Summary
- Patent Information
-
Validity & Enforceability
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A multichannel security system for accessing a host computer comprising: an access channel comprising: interception means for receiving and verifying a login identification originating from a demand from an accessor for access to said host computer;
view more
|
Invalid (101)
Entry 138 |
7 |
A multichannel security system as described in claim 1 wherein said security computer further comprises: authentication program means for authenticating access to said host computer; a biometric analyzer operating in response to instructions from
view more
|
Invalid (101)
Entry 138 |
11 |
A multichannel security system for granting and denying access to a host computer, said access in response to a demand from an accessor for access to the host computer, said accessor having a cellular telephone for providing communications to the
view more
|
Invalid (101)
Entry 138 |
17 |
A multichannel security system as described in claim 11 wherein said biometric analyzer comprises a fingerprint verification program for operation within said authentication channel to authenticate said accessor.
|
Invalid (101)
Entry 138 |
18 |
A multichannel security system for granting and denying access to a host computer, said access in response to a demand over the Internet from an accessor for access to the host computer, said accessor having a personal digital assistant (PDA) for
view more
|
Invalid (101)
Entry 138 |
19 |
A multichannel security system as described in claim 18 wherein said biometric analyzer comprises a fingerprint verification program for operation within said authentication channel to authenticate the accessor.
|
Invalid (101)
Entry 138 |
21 |
A method for accessing a host computer comprising the steps of: in an access channel, receiving at a control module a login identification from an accessor; in an authentication channel that is separate from the access channel: providing a security
view more
|
Invalid (101)
Entry 138 |
22 |
The method according to claim 21, wherein the peripheral device is one of a telephone, a cellular telephone, and a PDA each having an input device for entering data.
|
Invalid (101)
Entry 138 |
28 |
The method according to claim 21, further comprising the steps of: providing in the authentication channel a biometric analyzer for analyzing a monitored parameter of the accessor; providing a biometric parameter database addressable by the biometric
view more
|
Invalid (101)
Entry 138 |
31 |
The method according to claim 28, wherein the biometric analyzer comprises a fingerprint verification device.
|
Invalid (101)
Entry 138 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving at an interception device in a first channel a login identification demand to access a host computer also in the first
view more
|
Invalid (101)
Entry 138 |
2 |
The method according to claim 1, wherein the security computer receives the demand and login identification from the interception device.
|
Invalid (101)
Entry 138 |
3 |
The method according to claim 1, wherein the demand is received from a client computer, and wherein the host computer is a web server.
|
Invalid (101)
Entry 138 |
4 |
The method according to claim 1, wherein the step of verifying comprises retrieving from a database having at least one address record a record corresponding to the login identification.
|
Invalid (101)
Entry 138 |
5 |
The method according to claim 1, wherein the transmitted data is received from a peripheral device.
|
Invalid (101)
Entry 138 |
6 |
The method according to claim 5, wherein the peripheral device is one of a wired telephone, a wireless telephone, and a PDA.
|
Invalid (101)
Entry 138 |
8 |
The method according to claim 1, wherein the step of outputting the prompt comprises requesting a biometric signal.
|
Invalid (101)
Entry 138 |
10 |
The method according to claim 8, further comprising receiving in a biometric analyzer the biometric signal.
|
Invalid (101)
Entry 138 |
11 |
The method according to claim 10, wherein the biometric analyzer comprises one of a voice recognition program, a fingerprint verification program, or both.
|
Invalid (101)
Entry 138 |
12 |
The method according to claim 8, further comprising retrieving a previously registered sample corresponding to the login identification and comparing the same to the biometric signal.
|
Invalid (101)
Entry 138 |
13 |
The method according to claim 12, wherein the previously registered sample is stored in a biometric parameter database.
|
Invalid (101)
Entry 138 |
14 |
The method according to claim 12, wherein the previously registered sample comprises one of a speech sample and a fingerprint sample.
|
Invalid (101)
Entry 138 |
15 |
The method according to claim 1, wherein the step of outputting the prompt comprises transmitting a message.
|
Invalid (101)
Entry 138 |
16 |
The method according to claim 1, further comprising connecting or disconnecting the security computer to and from a peripheral device.
|
Invalid (101)
Entry 138 |
20 |
The method according to claim 1, wherein the security computer comprises an authentication program for authenticating access to the host computer.
|
Invalid (101)
Entry 138 |
21 |
The method according to claim 1, wherein the interception device is a router.
|
Invalid (101)
Entry 138 |
22 |
The method according to claim 1, wherein the first channel comprises one of a wide area network and a local area network.
|
Invalid (101)
Entry 138 |
46 |
A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving at a security computer predetermined data sent via an authentication channel from a peripheral device; identifying the
view more
|
Invalid (101)
Entry 138 |
47 |
The software method according to claim 46, further comprising outputting to the peripheral device over the authentication channel a prompt to enter the predetermined data, and receiving the predetermined data via the authentication channel from the
view more
|
Invalid (101)
Entry 138 |
48 |
A software method for employing a multichannel security system to control access to a host computer in an access channel using a mobile device in an authentication channel, comprising the steps of: providing a first software module on an
view more
|
Invalid (101)
Entry 138 |
50 |
The software method according to claim 48, further comprising the step of: providing a third software module for installing on the mobile device in the authentication channel, wherein the third software module receives the instruction outputted to
view more
|
Invalid (101)
Entry 138 |
51 |
The software method according to claim 50, wherein the displayed message is a message containing a password and instruction for the subscriber to reply to the message by entering the password using the mobile device.
|
Invalid (101)
Entry 138 |
52 |
The software method according to claim 50, wherein the displayed message is a notification containing an instruction for the subscriber to reply to the notification using the mobile device's input device.
|
Invalid (101)
Entry 138 |
53 |
A software method for employing a multichannel security system to control access to a computer, comprising the steps of: receiving in a first channel a login identification demand to access a host computer also in the first channel; verifying the
view more
|
Invalid (101)
Entry 138 |
54 |
Apparatus for implementing a multichannel security system to control access to a computer, comprising: a device for receiving a login identification and demand to access a host computer, wherein the device and the host computer are in a first
view more
|
Invalid (101)
Entry 138 |
Claim # | Claim Text | Outcome |
---|---|---|
1 |
A security system for accessing a host computer comprising: an access channel comprising: an interception device for receiving a login identification originating from an accessor for access to said host computer; and an authentication channel
view more
|
Invalid (101)
Entry 138 |
7 |
A security system as described in claim 1, wherein said security computer further comprises: An authentication program mechanism for authenticating access to said host computer; a biometric analyzer operating in response to instructions from said
view more
|
Invalid (101)
Entry 138 |
11 |
A security system for granting and denying access to a host computer, said access in response to a demand from an accessor for access to the host computer, said accessor having a cellular telephone for providing communications to the security system,
view more
|
Invalid (101)
Entry 138 |
17 |
A security system as described in claim 11, wherein said biometric analyzer comprises a fingerprint verification program for operation within said authentication channel to authenticate said accessor.
|
Invalid (101)
Entry 138 |
18 |
A security system for granting and denying access to a host computer, said access in response to a demand over the internet from an accessor for access to the host computer, said accessor having a personal digital assistant (PDA) for providing
view more
|
Invalid (101)
Entry 138 |
19 |
A security system as described in claim 18, wherein said biometric analyzer comprises a fingerprint verification program for operation within said authentication channel to authenticate the accessor.
|
Invalid (101)
Entry 138 |