REMOTE VERIFICATION OF USER PRESENCE AND IDENTITY
First Claim
1. A system for verifying presence and identity of a user on a remote computer, comprising:
- a server connected to a networked communication system;
a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system;
a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key;
a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and
a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for verifying presence and identity of a user on a remote computer comprises a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system.
-
Citations
6 Claims
-
1. A system for verifying presence and identity of a user on a remote computer, comprising:
-
a server connected to a networked communication system; a remote computer including an interface for a digital key, wherein the remote computer is connected to the networked communication system; a digital key that connects to the remote computer via the interface, wherein the digital key contains an encrypted key; a processor on the remote computer for reading digital key from the digital key and transmitting the encrypted key to the server over the networked communications system; and a computer program executing on the remote computer that captures behavioral data of the user and transmits the behavioral data to the server over the networked communications system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for verifying presence and identity of a user on a remote computer, comprising:
-
receiving, by a remote computer connected to the networked communication system, an encrypted key from a digital key connected to an interface of the remote computer; reading, by a processor on the remote computer, the encrypted key from the digital key; transmitting, by the processor, the encrypted key to the server over the networked communications system; capturing, by a computer program executing on the remote computer, behavioral data of the user; and transmitting, by the computer program, the behavioral data of the user to the server over the networked communications system.
-
Specification