Click here to close now.




















Welcome!

News Feed Item

Universal Secure Registry Issued Game-Changing Identity Authentication Patent

Patent Covers World's First Secure, Portable, Integrated, 3-Factor, Wireless Identity Authentication Mobile Device; Seminal Technology Conveniently and Automatically Locks and Unlocks Computers by Wireless Signal

BOSTON, MA -- (Marketwired) -- 12/17/13 -- Universal Secure Registry™, LLC (USR), an identity authentication company, today announced that the United States Patent and Trademark Office has issued US Patent No. 8,613,052 covering breakthrough technology allowing individuals to conveniently and securely authenticate their identity via their smartphone. The proprietary technology is part of a family of recently-issued patents that represent a revolutionary way for individuals to conveniently authenticate their identity remotely, wirelessly, continuously, and with greater security than any other available solution. The technology was developed over the past six years by renowned identity authentication and computer security expert Kenneth Weiss and is millions of times more secure, convenient, and easier to use than his original invention, the RSA SecurID token, which, although less convenient to use, has never been breached since its inception more than 25 years ago.

"I'm confident that a single technology will ultimately emerge from the greatly fragmented arena as the market standard," said Weiss. "It will be undefeatably secure, exceptionally convenient to use, universal in its functionality, ubiquitous, inexpensive, and conveniently integrated with something of value that a person is already carrying -- a smartphone. The USRID universal identity authenticating application meets all of these goals, is more than 100 million times more secure than any competitive approach and this patent allows us to bring secure identity authentication to a broad market."

The patent covers technology that allows a user to authenticate his or her identity with a wireless signal via a mobile device. When the user carrying the smartphone leaves the immediate proximity of a protected computer, the departure automatically causes the computer to either blank its display and lock up or to log out of a session on a remote computer. The locked computer will automatically unlock when the authorized user returns. A local protected computer can also automatically pass on the three-factor one time random code to unlock a sensitive secure remote computer. The technology is currently being tested on Android and is in development for iPhones.

What makes the technology truly seminal are the new opportunities it enables. A smartphone acts as a universal trusted identity proxy. Usage examples include remote computer and network access, electronic wallets, physical facility access, financial transactions, secure website access including secure checkout for e-commerce, vending machine purchases, interpersonal peer-to-peer identification, or safely releasing private information or medical records. Eventually, it can be used for parking meters and tolls, augmenting or replacing licenses, passport augmentation; eliminating voter fraud and allowing convenient voting from home. Additional, more technically advanced security features can be optionally implemented with USR software, such as a unique proprietary anti-spoofing technology, duress alarm capability, remote or automatic smartphone shut down or erasing of the USR software, patented remote reseeding of the USR algorithm, functionality limited to pre-defined GPS areas, and use audits which can initiate remote actions, alarms, or emails. USR technology positively foils identity theft.

This new USR technology is truly both universal and enabling. A smartphone employing a USR application can stand alone as the front end for a wide variety of implementations where an individual must be securely, reliably, and positively identified with the press of a button. This can include a certified picture of the individual which can be instantly provided when needed. In automatic mode, a positive identity can be provided to unlock a computer or open a door as the user approaches. Press another smartphone button to send verified information from USR and, together with the user's picture, can positively prove identity, enabling authorized rights and privileges.

Weiss' new technology is dramatically easier and more convenient to use, because the identifying information is sent by a wireless signal automatically and continuously, but only for a user-defined limited time period and only after multiple factors are satisfied, e.g.: an uncounterfeitable token in the possession of the user (e.g. a particular smartphone); a personal password provided by the user, a secret; and a biometric measurement of the user (e.g. a fingerprint, voiceprint, or facial recognition). These factors are integrated in a proprietary USR algorithm generating a 16-charactor pseudo-random code, or passcode, which automatically periodically changes (e.g. every 30 seconds) and is sent by a wireless signal (e.g. Wi-Fi, Bluetooth, NFC, etc.) to a protected computer system. USR passcodes can be used only once and previous passcodes are worthless.

Weiss founded Security Dynamics in 1984 (Now RSA Security). He resigned after taking the company public and achieving a $4 billion market cap. Tens of millions of people worldwide currently use his SecurID token to reliably authenticate the identity of authorized users for computer access. Weiss' original patents for the SecurID token which insured the success of Security Dynamics and RSA Security have now expired.

For more information and the full text of the patent, please visit usrid.net/mobile-phone-payments/.

About Universal Secure Registry LLC
Universal Secure Registry™ LLC (USR) is an enabling-technology company that holds a series of new personal identification, authentication, and mobile phone transaction application patents invented by Dr. Kenneth Weiss. More than 100 million people worldwide rely on computer security and identity authentication systems such as SecurID tokens invented, designed, and patented by Weiss, including most Fortune 500 companies, large and small corporations, individuals, governments, and banks in more than 30 countries. USR technology provides a secure, remote universal electronic repository for personal, private, and sensitive information. This integrates the convenience of a mobile phone with the security of a protected remote server to create a secure system for transactions ranging from funds transfers to credit card purchases, and also has the added benefit of streamlining secure access to remote computers/networks, the cloud or physical facilities. The USR electronic wallet can use near field communication (NFC) and/or Bluetooth. It is the only mobile payment technology that does not transmit sensitive or exploitable information from the mobile device or store exploitable information on it. Leveraging its patented 3+ FACTOR SECURITY™ system, USR's proprietary enabling identification technology designed for smartphone applications is available to third parties for licensing or purchase. USR was established in 2000 and is based in Newton, Massachusetts. http://www.USRID.net

SecurID, coined by Weiss, is a trademark of RSA, the Security Division of EMC.

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
Containers are not new, but renewed commitments to performance, flexibility, and agility have propelled them to the top of the agenda today. By working without the need for virtualization and its overhead, containers are seen as the perfect way to deploy apps and services across multiple clouds. Containers can handle anything from file types to operating systems and services, including microservices. What are microservices? Unlike what the name implies, microservices are not necessarily small,...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the ...
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
In his session at @ThingsExpo, Lee Williams, a producer of the first smartphones and tablets, will talk about how he is now applying his experience in mobile technology to the design and development of the next generation of Environmental and Sustainability Services at ETwater. He will explain how M2M controllers work through wirelessly connected remote controls; and specifically delve into a retrofit option that reverse-engineers control codes of existing conventional controller systems so the...
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development...
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
In 2014, the market witnessed a massive migration to the cloud as enterprises finally overcame their fears of the cloud’s viability, security, etc. Over the past 18 months, AWS, Google and Microsoft have waged an ongoing battle through a wave of price cuts and new features. For IT executives, sorting through all the noise to make the best cloud investment decisions has become daunting. Enterprises can and are moving away from a "one size fits all" cloud approach. The new competitive field has ...
Advances in technology and ubiquitous connectivity have made the utilization of a dispersed workforce more common. Whether that remote team is located across the street or country, management styles/ approaches will have to be adjusted to accommodate this new dynamic. In his session at 17th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on the challenges of managing remote teams, providing real-world examples that demonstrate what works and what...
eCube Systems has released NXTmonitor, a full featured application orchestration solution. NXTmonitor, which inherited the code base of NXTminder, has been extended to support multi-discipline processes and will act as a DevOps utility in a heterogeneous enterprise environment. Previously, NXTminder was packaged with NXTera middleware to configure and manage Entera and NXTera RPC servers. “Since we are widening the focus of this solution to DevOps, we felt the need to change the name to NXTmon...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
The web app is agile. The REST API is agile. The testing and planning are agile. But alas, data infrastructures certainly are not. Once an application matures, changing the shape or indexing scheme of data often forces at best a top down planning exercise and at worst includes schema changes that force downtime. The time has come for a new approach that fundamentally advances the agility of distributed data infrastructures. Come learn about a new solution to the problems faced by software organ...