Welcome!

News Feed Item

Universal Secure Registry Issued Game-Changing Identity Authentication Patent

Patent Covers World's First Secure, Portable, Integrated, 3-Factor, Wireless Identity Authentication Mobile Device; Seminal Technology Conveniently and Automatically Locks and Unlocks Computers by Wireless Signal

BOSTON, MA -- (Marketwired) -- 12/17/13 -- Universal Secure Registry™, LLC (USR), an identity authentication company, today announced that the United States Patent and Trademark Office has issued US Patent No. 8,613,052 covering breakthrough technology allowing individuals to conveniently and securely authenticate their identity via their smartphone. The proprietary technology is part of a family of recently-issued patents that represent a revolutionary way for individuals to conveniently authenticate their identity remotely, wirelessly, continuously, and with greater security than any other available solution. The technology was developed over the past six years by renowned identity authentication and computer security expert Kenneth Weiss and is millions of times more secure, convenient, and easier to use than his original invention, the RSA SecurID token, which, although less convenient to use, has never been breached since its inception more than 25 years ago.

"I'm confident that a single technology will ultimately emerge from the greatly fragmented arena as the market standard," said Weiss. "It will be undefeatably secure, exceptionally convenient to use, universal in its functionality, ubiquitous, inexpensive, and conveniently integrated with something of value that a person is already carrying -- a smartphone. The USRID universal identity authenticating application meets all of these goals, is more than 100 million times more secure than any competitive approach and this patent allows us to bring secure identity authentication to a broad market."

The patent covers technology that allows a user to authenticate his or her identity with a wireless signal via a mobile device. When the user carrying the smartphone leaves the immediate proximity of a protected computer, the departure automatically causes the computer to either blank its display and lock up or to log out of a session on a remote computer. The locked computer will automatically unlock when the authorized user returns. A local protected computer can also automatically pass on the three-factor one time random code to unlock a sensitive secure remote computer. The technology is currently being tested on Android and is in development for iPhones.

What makes the technology truly seminal are the new opportunities it enables. A smartphone acts as a universal trusted identity proxy. Usage examples include remote computer and network access, electronic wallets, physical facility access, financial transactions, secure website access including secure checkout for e-commerce, vending machine purchases, interpersonal peer-to-peer identification, or safely releasing private information or medical records. Eventually, it can be used for parking meters and tolls, augmenting or replacing licenses, passport augmentation; eliminating voter fraud and allowing convenient voting from home. Additional, more technically advanced security features can be optionally implemented with USR software, such as a unique proprietary anti-spoofing technology, duress alarm capability, remote or automatic smartphone shut down or erasing of the USR software, patented remote reseeding of the USR algorithm, functionality limited to pre-defined GPS areas, and use audits which can initiate remote actions, alarms, or emails. USR technology positively foils identity theft.

This new USR technology is truly both universal and enabling. A smartphone employing a USR application can stand alone as the front end for a wide variety of implementations where an individual must be securely, reliably, and positively identified with the press of a button. This can include a certified picture of the individual which can be instantly provided when needed. In automatic mode, a positive identity can be provided to unlock a computer or open a door as the user approaches. Press another smartphone button to send verified information from USR and, together with the user's picture, can positively prove identity, enabling authorized rights and privileges.

Weiss' new technology is dramatically easier and more convenient to use, because the identifying information is sent by a wireless signal automatically and continuously, but only for a user-defined limited time period and only after multiple factors are satisfied, e.g.: an uncounterfeitable token in the possession of the user (e.g. a particular smartphone); a personal password provided by the user, a secret; and a biometric measurement of the user (e.g. a fingerprint, voiceprint, or facial recognition). These factors are integrated in a proprietary USR algorithm generating a 16-charactor pseudo-random code, or passcode, which automatically periodically changes (e.g. every 30 seconds) and is sent by a wireless signal (e.g. Wi-Fi, Bluetooth, NFC, etc.) to a protected computer system. USR passcodes can be used only once and previous passcodes are worthless.

Weiss founded Security Dynamics in 1984 (Now RSA Security). He resigned after taking the company public and achieving a $4 billion market cap. Tens of millions of people worldwide currently use his SecurID token to reliably authenticate the identity of authorized users for computer access. Weiss' original patents for the SecurID token which insured the success of Security Dynamics and RSA Security have now expired.

For more information and the full text of the patent, please visit usrid.net/mobile-phone-payments/.

About Universal Secure Registry LLC
Universal Secure Registry™ LLC (USR) is an enabling-technology company that holds a series of new personal identification, authentication, and mobile phone transaction application patents invented by Dr. Kenneth Weiss. More than 100 million people worldwide rely on computer security and identity authentication systems such as SecurID tokens invented, designed, and patented by Weiss, including most Fortune 500 companies, large and small corporations, individuals, governments, and banks in more than 30 countries. USR technology provides a secure, remote universal electronic repository for personal, private, and sensitive information. This integrates the convenience of a mobile phone with the security of a protected remote server to create a secure system for transactions ranging from funds transfers to credit card purchases, and also has the added benefit of streamlining secure access to remote computers/networks, the cloud or physical facilities. The USR electronic wallet can use near field communication (NFC) and/or Bluetooth. It is the only mobile payment technology that does not transmit sensitive or exploitable information from the mobile device or store exploitable information on it. Leveraging its patented 3+ FACTOR SECURITY™ system, USR's proprietary enabling identification technology designed for smartphone applications is available to third parties for licensing or purchase. USR was established in 2000 and is based in Newton, Massachusetts. http://www.USRID.net

SecurID, coined by Weiss, is a trademark of RSA, the Security Division of EMC.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across supply chain networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost and time for product recall as well as advance trade. Are you curious about Blockchain and how it can provide you with new opportunities for innovation and growth? In her session at 20th Cloud Exp...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Most technology leaders, contemporary and from the hardware era, are reshaping their businesses to do software in the hope of capturing value in IoT. Although IoT is relatively new in the market, it has already gone through many promotional terms such as IoE, IoX, SDX, Edge/Fog, Mist Compute, etc. Ultimately, irrespective of the name, it is about deriving value from independent software assets participating in an ecosystem as one comprehensive solution.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In his Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will explore t...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
While some vendors scramble to create and sell you a fancy solution for monitoring your spanking new Amazon Lambdas, hear how you can do it on the cheap using just built-in Java APIs yourself. By exploiting a little-known fact that Lambdas aren’t exactly single threaded, you can effectively identify hot spots in your serverless code. In his session at 20th Cloud Expo, David Martin, Principal Product Owner at CA Technologies, will give a live demonstration and code walkthrough, showing how to o...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTred processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ...
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyor belt between the Software Factory and production stages. Artifacts are ...
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Quickly find the root cause of complex database problems slowing down your applications. Up to 88% of all application performance issues are related to the database. DPA’s unique response time analysis shows you exactly what needs fixing - in four clicks or less. Optimize performance anywhere. Database Performance Analyzer monitors on-premises, on VMware®, and in the Cloud, including Amazon® AWS and Azure™ virtual machines.