Welcome!

News Feed Item

Universal Secure Registry Issued Game-Changing Identity Authentication Patent

Patent Covers World's First Secure, Portable, Integrated, 3-Factor, Wireless Identity Authentication Mobile Device; Seminal Technology Conveniently and Automatically Locks and Unlocks Computers by Wireless Signal

BOSTON, MA -- (Marketwired) -- 12/17/13 -- Universal Secure Registry™, LLC (USR), an identity authentication company, today announced that the United States Patent and Trademark Office has issued US Patent No. 8,613,052 covering breakthrough technology allowing individuals to conveniently and securely authenticate their identity via their smartphone. The proprietary technology is part of a family of recently-issued patents that represent a revolutionary way for individuals to conveniently authenticate their identity remotely, wirelessly, continuously, and with greater security than any other available solution. The technology was developed over the past six years by renowned identity authentication and computer security expert Kenneth Weiss and is millions of times more secure, convenient, and easier to use than his original invention, the RSA SecurID token, which, although less convenient to use, has never been breached since its inception more than 25 years ago.

"I'm confident that a single technology will ultimately emerge from the greatly fragmented arena as the market standard," said Weiss. "It will be undefeatably secure, exceptionally convenient to use, universal in its functionality, ubiquitous, inexpensive, and conveniently integrated with something of value that a person is already carrying -- a smartphone. The USRID universal identity authenticating application meets all of these goals, is more than 100 million times more secure than any competitive approach and this patent allows us to bring secure identity authentication to a broad market."

The patent covers technology that allows a user to authenticate his or her identity with a wireless signal via a mobile device. When the user carrying the smartphone leaves the immediate proximity of a protected computer, the departure automatically causes the computer to either blank its display and lock up or to log out of a session on a remote computer. The locked computer will automatically unlock when the authorized user returns. A local protected computer can also automatically pass on the three-factor one time random code to unlock a sensitive secure remote computer. The technology is currently being tested on Android and is in development for iPhones.

What makes the technology truly seminal are the new opportunities it enables. A smartphone acts as a universal trusted identity proxy. Usage examples include remote computer and network access, electronic wallets, physical facility access, financial transactions, secure website access including secure checkout for e-commerce, vending machine purchases, interpersonal peer-to-peer identification, or safely releasing private information or medical records. Eventually, it can be used for parking meters and tolls, augmenting or replacing licenses, passport augmentation; eliminating voter fraud and allowing convenient voting from home. Additional, more technically advanced security features can be optionally implemented with USR software, such as a unique proprietary anti-spoofing technology, duress alarm capability, remote or automatic smartphone shut down or erasing of the USR software, patented remote reseeding of the USR algorithm, functionality limited to pre-defined GPS areas, and use audits which can initiate remote actions, alarms, or emails. USR technology positively foils identity theft.

This new USR technology is truly both universal and enabling. A smartphone employing a USR application can stand alone as the front end for a wide variety of implementations where an individual must be securely, reliably, and positively identified with the press of a button. This can include a certified picture of the individual which can be instantly provided when needed. In automatic mode, a positive identity can be provided to unlock a computer or open a door as the user approaches. Press another smartphone button to send verified information from USR and, together with the user's picture, can positively prove identity, enabling authorized rights and privileges.

Weiss' new technology is dramatically easier and more convenient to use, because the identifying information is sent by a wireless signal automatically and continuously, but only for a user-defined limited time period and only after multiple factors are satisfied, e.g.: an uncounterfeitable token in the possession of the user (e.g. a particular smartphone); a personal password provided by the user, a secret; and a biometric measurement of the user (e.g. a fingerprint, voiceprint, or facial recognition). These factors are integrated in a proprietary USR algorithm generating a 16-charactor pseudo-random code, or passcode, which automatically periodically changes (e.g. every 30 seconds) and is sent by a wireless signal (e.g. Wi-Fi, Bluetooth, NFC, etc.) to a protected computer system. USR passcodes can be used only once and previous passcodes are worthless.

Weiss founded Security Dynamics in 1984 (Now RSA Security). He resigned after taking the company public and achieving a $4 billion market cap. Tens of millions of people worldwide currently use his SecurID token to reliably authenticate the identity of authorized users for computer access. Weiss' original patents for the SecurID token which insured the success of Security Dynamics and RSA Security have now expired.

For more information and the full text of the patent, please visit usrid.net/mobile-phone-payments/.

About Universal Secure Registry LLC
Universal Secure Registry™ LLC (USR) is an enabling-technology company that holds a series of new personal identification, authentication, and mobile phone transaction application patents invented by Dr. Kenneth Weiss. More than 100 million people worldwide rely on computer security and identity authentication systems such as SecurID tokens invented, designed, and patented by Weiss, including most Fortune 500 companies, large and small corporations, individuals, governments, and banks in more than 30 countries. USR technology provides a secure, remote universal electronic repository for personal, private, and sensitive information. This integrates the convenience of a mobile phone with the security of a protected remote server to create a secure system for transactions ranging from funds transfers to credit card purchases, and also has the added benefit of streamlining secure access to remote computers/networks, the cloud or physical facilities. The USR electronic wallet can use near field communication (NFC) and/or Bluetooth. It is the only mobile payment technology that does not transmit sensitive or exploitable information from the mobile device or store exploitable information on it. Leveraging its patented 3+ FACTOR SECURITY™ system, USR's proprietary enabling identification technology designed for smartphone applications is available to third parties for licensing or purchase. USR was established in 2000 and is based in Newton, Massachusetts. http://www.USRID.net

SecurID, coined by Weiss, is a trademark of RSA, the Security Division of EMC.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
“Being the one true cloud-agnostic and storage-agnostic software solution, more and more customers are coming to Commvault and saying ' What do you recommend? What's your best practice for implementing cloud?” explained Randy De Meno, Chief Technologist at Commvault, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficienc...
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., and Logan Best, Infrastructure & Network Engineer at Webair, focused on real world deployments of DDoS mitigation strategies in every layer of the network. He gave an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He also outlined what we have found in our experience managing and running thousands of Linux and Unix ...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...