US20160048674A9 - Method of improving online credentials - Google Patents
Method of improving online credentials Download PDFInfo
- Publication number
- US20160048674A9 US20160048674A9 US14/444,777 US201414444777A US2016048674A9 US 20160048674 A9 US20160048674 A9 US 20160048674A9 US 201414444777 A US201414444777 A US 201414444777A US 2016048674 A9 US2016048674 A9 US 2016048674A9
- Authority
- US
- United States
- Prior art keywords
- website
- image
- credential
- processor
- visitor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012797 qualification Methods 0.000 claims 3
- 230000003993 interaction Effects 0.000 claims 2
- 230000000007 visual effect Effects 0.000 claims 2
- 230000008859 change Effects 0.000 description 8
- 238000012360 testing method Methods 0.000 description 6
- 238000009434 installation Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000005067 remediation Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000000543 intermediate Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000010561 standard procedure Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Definitions
- Websites often use trust logos and security seals to provide trust assurance information to visitors and customers.
- the trust seal of a well-known brand can greatly increase the online revenue of a website.
- Online credentials are often used to convey messages to visitors.
- this information comprised of a text message about the identity of a website operator.
- the information is generally presented after the user interacts with the trust mark.
- a credential that is not installed properly can result in relying party error, vulnerabilities occurring on the associated website, or a non-functioning credential.
- a non-functioning credential or credential that creates website problems is worse than not having a credential, resulting in a loss of trust and possibly a theft of information. Therefore, there is a need for a method that ensures the credential is installed and operating correctly.
- the current invention is a method of providing security information by providing the relying party and image of an individual or organization responsible for the credential.
- the current invention also teaches a method of ensuring the proper issuance of credential by requiring a temporary password be entered prior to the credential's issuance. Additional temporary passwords can be required for websites that are evaluated as higher risk.
- the current invention also teaches a method of installing the security device by issuing the credential and running a variety of tests to evaluate the credential's performance.
- FIG. 1 is a flowchart showing an embodiment of the invention.
- FIG. 2 is a flowchart showing an embodiment of the invention where a stored copy of a website is used to evaluate the risk of changes.
- FIG. 3 is a flowchart showing an embodiment of the invention where installation of the credential is verified.
- FIG. 4 is a flowchart showing an embodiment of the invention where a credential to a higher risk website requires approval from agents using temporary passwords.
- FIG. 5 is a diagram of the first embodiment of the invention.
- FIG. 6 is a diagram of an alternate embodiment of the invention that uses a scanning service and stored copy of the website.
- FIG. 7 is a diagram of an alternate embodiment of the where agents using temporary passwords must approve the issuance of a credential.
- the first embodiment of the invention teaches a method of providing an improved credential to website visitors.
- the credential includes a report of the snapshot of the website, an image of the website operator staff (such as the IT person responsible for the website or an executive of the entity operating the website) or the website operator's location or office (such as a reception area or an external view of the building) (a “credential image”).
- a website operator is any entity with control over the website, including the IT administrators, a hosting company, the website owner, or an agent of an entity.
- a relying party is any entity or device that will access or rely on the credential, including browsers, end-users, other servers, and authentication devices.
- a credential provider is any device or entity that provides certification for the website or website operator, including certificate authorities, scanning service providers, trustmark providers, and network security consultants. In all cases, the invention contemplates that an agent could operate on behalf of the credential provider to perform the services described herein.
- a credential 4 can be a digital certificate, a trust mark, a website seal, or any other known mechanisms for conveying trust to a relying party.
- a relying party is an entity or device that visits a website associated with the credential, such as a device, a computer, or an end-user.
- the credential 4 and credential image 12 can be the same set of data (one single credential) or separate sets of data (multiple credentials) and can be stored and transmitted as single unit or as separate objects.
- the credential provider 2 receives an application for a credential 4 .
- the credential provider 2 evaluates the application in accordance with its standard procedures, such as verifying the applicant's name and control over the website where the credential will be displayed.
- the credential provider 2 obtains the credential image 12 by having a representative of the credential provider 2 visit the website operator's location, copying an online image via the Internet (such as through an online map service), or by having the website operator 14 submit an image to the service provider.
- An agent of the credential provider can obtain the credential image as part of the credential provider's verification of the operator's operations or identity (“verification information”). This verification information can be used to authenticate the website and/or website operator and provide a separate credential, such as an TLS/SSL certificate.
- the credential provider 2 stores the credential image 12 in a database.
- the image can be stored in any known format.
- the database can be of any format but should be secured from intrusion.
- a relying party 10 visits a website 8 associated with the credential 4 .
- Code embedded on the website requests that the credential provider 2 transmit a copy of the credential 4 .
- the credential provider may verify the authenticity of the request by checking the URL of the request or requiring a signed request file. If the request is authorized or not verified, the credentials provider 2 returns the credential 4 and/or the credential image 12 .
- the website 8 displays the returned credential 4 or credential image 12 in the designated credential display area 20 .
- the designated display area can be set by the credential provider or by the website operator.
- the request to display the credential can occur using any known way of requesting information from a credential.
- a website visitor could interact with a trust mark displayed on the site, which instructs the website to obtain the credential information.
- a device could request the credential when the website loads or immediately when a relying party accesses the website.
- a relying party 10 may compare the displayed credential image 12 with an image selected or already known to the relying party (known image) 22 .
- a known image is any image that will confirm the credential image as being correct. For example, if the known image is the display of the website and the credential image is copy of the website, the relying party or a plugin can compare the two to make sure they are identical or substantially similar. Another example is where the relying party obtains a copy of the security credential from the credential provider. The relying party then compares the copy provided from the credential provider with the security credential displayed on the website to verify that they are identical or substantially similar.
- the known image can be obtained or provided to the relying party from a third party source (such as the credential provider) or be stored on a secure server of the relying party. If the known image and the credential image are identical, then the relying party can trust the authenticity of the website. The comparison can be made automatically by code or by an actual person comparing the two images.
- the credential 4 can include or display information about the threat of malware or vulnerabilities present or associated with a website 8 or the website operator's 14 operations.
- the credential provider 2 obtains this information by performing a vulnerability or malware scan 34 either prior to the credential being displayed or when the credential is requested.
- the website operator 14 is required to correct the problem prior to displaying the credential image 12 .
- the credential provider 2 may require subsequent to determine whether a new vulnerability or malware exists. If malware or a vulnerability is detected, the website operator is provided a grace period in order to correct the problem.
- the security provider 2 may require a website 8 authorized to display the credential 4 to undergo periodic scans 34 that detect changes to the website 8 .
- a copy or image of the website 8 or a text copy of the website is saved to a database 36 .
- a text copy could be the scripted pages of a website or the existing text on a website.
- the scanning service 34 accesses the website 8 again at a later day or time and compares the current website 8 with the saved copy of the website 32 .
- the comparison can be performed using a bit image comparison tool, by comparing the text of the website with the text stored in the database 36 , or by comparing the scripted pages of the stored and current website.
- the scanning service 34 can compare the entire website or just a select portion of the website. Using only a portion of the website allows a website operator 14 to exclude news feeds and other frequently changing content from the comparison.
- a notification 30 is sent to the website operator, alerting them of the website change.
- the notification can be sent automatically and can be any known method of communication, such as an automated email or telephone call.
- the notification can tell or show the website changes that occurred since the last scan or, for security reasons, only inform the website operator 14 that a website change was detected.
- the notification 30 may contain a confirmation link or other instructions that the website operator may follow to confirm that the website changes were authorized.
- step 205 if the website changes are confirmed as authorized, the credential provider stores the modified website in the database 36 as a new stored copy of the website.
- the scanning service 34 compares the current website with the stored copy of the website instead of previously stored versions. The scanning service 34 can store and compare multiple copies of the website in case the website operator 14 decides to revert to a previous version. If the current website 8 matches any of the stored copies 32 , then the scanning service 34 automatically approves the website changes.
- step 206 if the website changes are not approved by the website operator, then the credential provider 2 can upload the stored copy of the website 32 and restore the original website contents. This restoration can occur at the request of the website operator 14 who follows a link in the notification 30 or automatically. A website operator 14 can also request restoration an account maintained with the credential provider 2 .
- the credential provider can modify the credential 4 to reflect the website change. For example, if the credential image 12 is a snapshot of the website, the credential provider 4 can replace the existing credential image 12 with an updated snapshot of the website. If unauthorized website modifications are detected, the credential provider 2 can use the credential display 20 to display a warning, such as a red border, image, or text, that alerts relying parties 10 about the change. If the website modifications are authorized, the credential 4 can inform the relying parties 10 that of date the website last changed and that the changes were authorized. Authorized alerts might include displaying a green border or displaying the date the website information was last approved.
- steps 205 - 206 updating the image and sending alerts, will only occur if the changes exceed a set threshold. For example, a notice would not be sent to the website operator if only a small percent of text on the site has changed or if only minor changes to the layout of the website were made.
- the credential provider can also send customized notices depending on the type of change. For example, if spelling and grammar errors are detected on the website, the notification 30 may include a recommendation that the website operator 14 correct those errors. Similarly, if the credential provider 2 detects that a website change introduced vulnerability into the website, then the credential provider can send a customized notice about the vulnerability, and possibly recommend a remediation plan, while displaying a warning to relying parties 10 .
- the credential provider 2 can also provide notice about changes directly through the credential 4 (or credential image 12 ). For example, a credential might display a red warning symbol on the credential display area 20 if vulnerabilities are detected on a website 8 and provide further information about the warning when the user interacts with credential.
- Step 301 of FIG. 3 the credential provider 2 accesses the website 8 over the Internet.
- the credential provider 4 checks the installation of the credential 2 . The tests ran depend on the type of credential. For trust marks, a server access the website and verifies that the credential is displayed correctly.
- the credential provider 2 establishes a series of SSL connections to determine whether the correct intermediates are being delivered from the server, to determine whether the correct SSL cipher suites are supported, to test the SSL protocols, to test renegotiation support, and to test strict transport security. Other tests may include name matching, checking the certificate validity period, and examining the key pair associated with the certificate for vulnerabilities. If any issues are determined then, in step 303 , a notification is sent to the website operator.
- the notification can contain explicit instructions regarding the installation problems associated with the website, including how to fix any detected errors.
- the notice can also include remediation support and a deadline for when any detected errors must be resolved.
- the credential provider 2 may modify the credential 4 in order to alert relying parties 10 about possible issues with the credential's installation.
- the credential provider may configure the credential to display contact information if the relying party has questions or requires assistance or if the credential is improperly installed.
- the credential provider 2 receives a request for a credential 4 .
- the credential provider Prior to issuing the credential, 4 , the credential provider evaluates the risk involved in issuing the credential. Factors used may include the number of hits a website receives, previous complaints about the applicant, the number of transactions conducted over a website, the hardware and software supporting the website, third party reviews and evaluations of the website, the content and nature of the website, and/or the presence of any vulnerabilities or malware associated with the website.
- an agent 40 (a third party or additional employee of the credential provider) must approve the issuance using a temporary password 42 .
- the agent 40 enters the temporary password 42 into an account linked to the credential issuance system or using a token to submit the password, such as through a USB key.
- the temporary password is created by the token and provided to the agent.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This application claims the benefit of provisional application Ser. No. 61/498,712, filed on Jun. 20, 2011, which is incorporated entirely herein by reference.
- Websites often use trust logos and security seals to provide trust assurance information to visitors and customers. The trust seal of a well-known brand can greatly increase the online revenue of a website.
- Online credentials are often used to convey messages to visitors. In the past, this information comprised of a text message about the identity of a website operator. The information is generally presented after the user interacts with the trust mark.
- However, a text message is easily replicated by a malicious actor and lacks a direct connection to the website operator. In addition, waiting until a user interacts with the credential risks the user being unaware of the credential in the first place, negating the potential trust value. Thus, there is a need to improve the message provided through online credentials.
- Because these credentials are invaluable in establishing online trust, they are often the subject of theft and hacking. The risk of compromise to a credential provider is greater than other service providers because the compromise of the credential can result in a loss of trust in the entire credential. Without adequate protection, a credential loses its value. Therefore, there is a need to ensure that only authorized users can use the credential.
- Finally, a credential that is not installed properly can result in relying party error, vulnerabilities occurring on the associated website, or a non-functioning credential. A non-functioning credential or credential that creates website problems is worse than not having a credential, resulting in a loss of trust and possibly a theft of information. Therefore, there is a need for a method that ensures the credential is installed and operating correctly.
- The current invention is a method of providing security information by providing the relying party and image of an individual or organization responsible for the credential.
- The current invention also teaches a method of ensuring the proper issuance of credential by requiring a temporary password be entered prior to the credential's issuance. Additional temporary passwords can be required for websites that are evaluated as higher risk.
- The current invention also teaches a method of installing the security device by issuing the credential and running a variety of tests to evaluate the credential's performance.
-
FIG. 1 is a flowchart showing an embodiment of the invention. -
FIG. 2 is a flowchart showing an embodiment of the invention where a stored copy of a website is used to evaluate the risk of changes. -
FIG. 3 is a flowchart showing an embodiment of the invention where installation of the credential is verified. -
FIG. 4 is a flowchart showing an embodiment of the invention where a credential to a higher risk website requires approval from agents using temporary passwords. -
FIG. 5 is a diagram of the first embodiment of the invention. -
FIG. 6 is a diagram of an alternate embodiment of the invention that uses a scanning service and stored copy of the website. -
FIG. 7 is a diagram of an alternate embodiment of the where agents using temporary passwords must approve the issuance of a credential. - The first embodiment of the invention, shown in
FIG. 1 andFIG. 5 , teaches a method of providing an improved credential to website visitors. The credential includes a report of the snapshot of the website, an image of the website operator staff (such as the IT person responsible for the website or an executive of the entity operating the website) or the website operator's location or office (such as a reception area or an external view of the building) (a “credential image”). A website operator is any entity with control over the website, including the IT administrators, a hosting company, the website owner, or an agent of an entity. A relying party is any entity or device that will access or rely on the credential, including browsers, end-users, other servers, and authentication devices. A credential provider is any device or entity that provides certification for the website or website operator, including certificate authorities, scanning service providers, trustmark providers, and network security consultants. In all cases, the invention contemplates that an agent could operate on behalf of the credential provider to perform the services described herein. - A
credential 4 can be a digital certificate, a trust mark, a website seal, or any other known mechanisms for conveying trust to a relying party. A relying party is an entity or device that visits a website associated with the credential, such as a device, a computer, or an end-user. Thecredential 4 andcredential image 12 can be the same set of data (one single credential) or separate sets of data (multiple credentials) and can be stored and transmitted as single unit or as separate objects. - In
step 101 ofFIG. 1 , thecredential provider 2 receives an application for acredential 4. Thecredential provider 2 evaluates the application in accordance with its standard procedures, such as verifying the applicant's name and control over the website where the credential will be displayed. Instep 102, thecredential provider 2 obtains thecredential image 12 by having a representative of thecredential provider 2 visit the website operator's location, copying an online image via the Internet (such as through an online map service), or by having thewebsite operator 14 submit an image to the service provider. An agent of the credential provider can obtain the credential image as part of the credential provider's verification of the operator's operations or identity (“verification information”). This verification information can be used to authenticate the website and/or website operator and provide a separate credential, such as an TLS/SSL certificate. - In
step 103, thecredential provider 2 stores thecredential image 12 in a database. The image can be stored in any known format. The database can be of any format but should be secured from intrusion. - In
Step 104, a relyingparty 10 visits awebsite 8 associated with thecredential 4. Code embedded on the website requests that thecredential provider 2 transmit a copy of thecredential 4. Optionally, the credential provider may verify the authenticity of the request by checking the URL of the request or requiring a signed request file. If the request is authorized or not verified, thecredentials provider 2 returns thecredential 4 and/or thecredential image 12. Thewebsite 8 displays thereturned credential 4 orcredential image 12 in the designatedcredential display area 20. The designated display area can be set by the credential provider or by the website operator. - The request to display the credential can occur using any known way of requesting information from a credential. For example, a website visitor could interact with a trust mark displayed on the site, which instructs the website to obtain the credential information. Alternatively, a device could request the credential when the website loads or immediately when a relying party accesses the website.
- To add additional security, in
Step 108, a relyingparty 10 may compare the displayedcredential image 12 with an image selected or already known to the relying party (known image) 22. A known image is any image that will confirm the credential image as being correct. For example, if the known image is the display of the website and the credential image is copy of the website, the relying party or a plugin can compare the two to make sure they are identical or substantially similar. Another example is where the relying party obtains a copy of the security credential from the credential provider. The relying party then compares the copy provided from the credential provider with the security credential displayed on the website to verify that they are identical or substantially similar. The known image can be obtained or provided to the relying party from a third party source (such as the credential provider) or be stored on a secure server of the relying party. If the known image and the credential image are identical, then the relying party can trust the authenticity of the website. The comparison can be made automatically by code or by an actual person comparing the two images. - In addition to a
credential image 12, thecredential 4 can include or display information about the threat of malware or vulnerabilities present or associated with awebsite 8 or the website operator's 14 operations. Thecredential provider 2 obtains this information by performing a vulnerability or malware scan 34 either prior to the credential being displayed or when the credential is requested. - If the
scan 34 detects a vulnerability or malware, thewebsite operator 14 is required to correct the problem prior to displaying thecredential image 12. Thecredential provider 2 may require subsequent to determine whether a new vulnerability or malware exists. If malware or a vulnerability is detected, the website operator is provided a grace period in order to correct the problem. - As shown in
FIG. 2 andFIG. 6 , thesecurity provider 2 may require awebsite 8 authorized to display thecredential 4 to undergoperiodic scans 34 that detect changes to thewebsite 8. Instep 201, a copy or image of thewebsite 8 or a text copy of the website is saved to adatabase 36. A text copy could be the scripted pages of a website or the existing text on a website. Instep 202, thescanning service 34 accesses thewebsite 8 again at a later day or time and compares thecurrent website 8 with the saved copy of thewebsite 32. The comparison can be performed using a bit image comparison tool, by comparing the text of the website with the text stored in thedatabase 36, or by comparing the scripted pages of the stored and current website. Thescanning service 34 can compare the entire website or just a select portion of the website. Using only a portion of the website allows awebsite operator 14 to exclude news feeds and other frequently changing content from the comparison. - If a change is detected, then in
step 204, anotification 30 is sent to the website operator, alerting them of the website change. The notification can be sent automatically and can be any known method of communication, such as an automated email or telephone call. The notification can tell or show the website changes that occurred since the last scan or, for security reasons, only inform thewebsite operator 14 that a website change was detected. Thenotification 30 may contain a confirmation link or other instructions that the website operator may follow to confirm that the website changes were authorized. - In
step 205, if the website changes are confirmed as authorized, the credential provider stores the modified website in thedatabase 36 as a new stored copy of the website. When the next scan occurs, thescanning service 34 compares the current website with the stored copy of the website instead of previously stored versions. Thescanning service 34 can store and compare multiple copies of the website in case thewebsite operator 14 decides to revert to a previous version. If thecurrent website 8 matches any of the storedcopies 32, then thescanning service 34 automatically approves the website changes. - In
step 206, if the website changes are not approved by the website operator, then thecredential provider 2 can upload the stored copy of thewebsite 32 and restore the original website contents. This restoration can occur at the request of thewebsite operator 14 who follows a link in thenotification 30 or automatically. Awebsite operator 14 can also request restoration an account maintained with thecredential provider 2. - If a website change is detected, the credential provider can modify the
credential 4 to reflect the website change. For example, if thecredential image 12 is a snapshot of the website, thecredential provider 4 can replace the existingcredential image 12 with an updated snapshot of the website. If unauthorized website modifications are detected, thecredential provider 2 can use thecredential display 20 to display a warning, such as a red border, image, or text, that alerts relyingparties 10 about the change. If the website modifications are authorized, thecredential 4 can inform the relyingparties 10 that of date the website last changed and that the changes were authorized. Authorized alerts might include displaying a green border or displaying the date the website information was last approved. - In an alternate version, steps 205-206, updating the image and sending alerts, will only occur if the changes exceed a set threshold. For example, a notice would not be sent to the website operator if only a small percent of text on the site has changed or if only minor changes to the layout of the website were made.
- The credential provider can also send customized notices depending on the type of change. For example, if spelling and grammar errors are detected on the website, the
notification 30 may include a recommendation that thewebsite operator 14 correct those errors. Similarly, if thecredential provider 2 detects that a website change introduced vulnerability into the website, then the credential provider can send a customized notice about the vulnerability, and possibly recommend a remediation plan, while displaying a warning to relyingparties 10. - The
credential provider 2 can also provide notice about changes directly through the credential 4 (or credential image 12). For example, a credential might display a red warning symbol on thecredential display area 20 if vulnerabilities are detected on awebsite 8 and provide further information about the warning when the user interacts with credential. - To ensure that the
credential 4 is installed correctly, inStep 301 ofFIG. 3 , thecredential provider 2 accesses thewebsite 8 over the Internet. Instep 302, thecredential provider 4 checks the installation of thecredential 2. The tests ran depend on the type of credential. For trust marks, a server access the website and verifies that the credential is displayed correctly. - For SSL Certificates, the
credential provider 2 establishes a series of SSL connections to determine whether the correct intermediates are being delivered from the server, to determine whether the correct SSL cipher suites are supported, to test the SSL protocols, to test renegotiation support, and to test strict transport security. Other tests may include name matching, checking the certificate validity period, and examining the key pair associated with the certificate for vulnerabilities. If any issues are determined then, instep 303, a notification is sent to the website operator. The notification can contain explicit instructions regarding the installation problems associated with the website, including how to fix any detected errors. The notice can also include remediation support and a deadline for when any detected errors must be resolved. - If errors are not resolved, then the
credential provider 2 may modify thecredential 4 in order to alert relyingparties 10 about possible issues with the credential's installation. The credential provider may configure the credential to display contact information if the relying party has questions or requires assistance or if the credential is improperly installed. - In an alternate embodiment, shown in
FIG. 4 , thecredential provider 2 receives a request for acredential 4. Prior to issuing the credential, 4, the credential provider evaluates the risk involved in issuing the credential. Factors used may include the number of hits a website receives, previous complaints about the applicant, the number of transactions conducted over a website, the hardware and software supporting the website, third party reviews and evaluations of the website, the content and nature of the website, and/or the presence of any vulnerabilities or malware associated with the website. - If the
credential provider 2 decides to issue thecredential 4, an agent 40 (a third party or additional employee of the credential provider) must approve the issuance using atemporary password 42. Theagent 40 enters thetemporary password 42 into an account linked to the credential issuance system or using a token to submit the password, such as through a USB key. The temporary password is created by the token and provided to the agent. - Higher risk applicants may require additional agents using additional temporary passwords. Whether or not an applicant is considered high risk is determined by the credential provider when evaluating the credential application.
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/444,777 US20160048674A9 (en) | 2011-06-20 | 2014-07-28 | Method of improving online credentials |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161498712P | 2011-06-20 | 2011-06-20 | |
US13/429,092 US8826395B2 (en) | 2011-06-20 | 2012-03-23 | Method of improving online credentials |
US14/444,777 US20160048674A9 (en) | 2011-06-20 | 2014-07-28 | Method of improving online credentials |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/429,092 Continuation US8826395B2 (en) | 2011-06-20 | 2012-03-23 | Method of improving online credentials |
Publications (2)
Publication Number | Publication Date |
---|---|
US20140337947A1 US20140337947A1 (en) | 2014-11-13 |
US20160048674A9 true US20160048674A9 (en) | 2016-02-18 |
Family
ID=47354867
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/429,092 Active US8826395B2 (en) | 2011-06-20 | 2012-03-23 | Method of improving online credentials |
US14/444,777 Abandoned US20160048674A9 (en) | 2011-06-20 | 2014-07-28 | Method of improving online credentials |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/429,092 Active US8826395B2 (en) | 2011-06-20 | 2012-03-23 | Method of improving online credentials |
Country Status (1)
Country | Link |
---|---|
US (2) | US8826395B2 (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8364670B2 (en) | 2004-12-28 | 2013-01-29 | Dt Labs, Llc | System, method and apparatus for electronically searching for an item |
US8826395B2 (en) * | 2011-06-20 | 2014-09-02 | Digicert, Inc. | Method of improving online credentials |
US10140125B1 (en) * | 2011-08-23 | 2018-11-27 | RaGaPa, Inc. | Methods and apparatus for interactive content injection |
US9092782B1 (en) * | 2012-06-29 | 2015-07-28 | Emc Corporation | Methods and apparatus for risk evaluation of compromised credentials |
US9003535B1 (en) * | 2012-07-06 | 2015-04-07 | Symantec Corporation | Systems and methods for certifying client-side security for internet sites |
JP5980037B2 (en) * | 2012-08-06 | 2016-08-31 | キヤノン株式会社 | Management system, server, client, and method thereof |
US9900314B2 (en) * | 2013-03-15 | 2018-02-20 | Dt Labs, Llc | System, method and apparatus for increasing website relevance while protecting privacy |
GB2513168B (en) * | 2013-04-18 | 2017-12-27 | F Secure Corp | Detecting unauthorised changes to website content |
US9756074B2 (en) * | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US11456876B2 (en) * | 2015-03-26 | 2022-09-27 | Assa Abloy Ab | Virtual credentials and licenses |
US10776838B2 (en) | 2016-03-01 | 2020-09-15 | Mx Technologies, Inc. | Item level data aggregation |
US11295301B1 (en) * | 2017-12-15 | 2022-04-05 | Worldpay, Llc | Systems and methods for electronic certification of e-commerce security badges |
IT201800003258A1 (en) * | 2018-03-06 | 2019-09-06 | Robionica Srls | RAMSONWARE LOCKING ANTI-HACKER SYSTEM |
US10805342B2 (en) * | 2018-07-12 | 2020-10-13 | Bank Of America Corporation | System for automated malfeasance remediation |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020152134A1 (en) * | 2001-04-12 | 2002-10-17 | Mcglinn Thomas A. | System and method for protecting internet consumers and for certifying, identifying, segregating and locating traditional "brick and mortar" merchant businesses on the internet |
US20040030784A1 (en) * | 2000-03-20 | 2004-02-12 | Melih Abdulhayoglu | Methods of accessing and using web-pages |
US20040064335A1 (en) * | 2002-09-05 | 2004-04-01 | Yinan Yang | Method and apparatus for evaluating trust and transitivity of trust of online services |
US20050160286A1 (en) * | 2002-03-29 | 2005-07-21 | Scanalert | Method and apparatus for real-time security verification of on-line services |
US20070061734A1 (en) * | 2005-08-25 | 2007-03-15 | Melih Abdulhayoglu | Method for establishing trust online |
US20070156592A1 (en) * | 2005-12-22 | 2007-07-05 | Reality Enhancement Pty Ltd | Secure authentication method and system |
US20100192068A1 (en) * | 2009-01-23 | 2010-07-29 | Avow Networks Incorporated | Method and apparatus to perform online credential reporting |
US20100275024A1 (en) * | 2008-04-07 | 2010-10-28 | Melih Abdulhayoglu | Method and system for displaying verification information indicators on a non-secure website |
US20100275012A1 (en) * | 2008-08-27 | 2010-10-28 | Globalsign K.K. | Server certificate issuing system and person authentication method |
US20110055911A1 (en) * | 2009-08-28 | 2011-03-03 | The Go Daddy Group, Inc. | Business validation based social website account authentication |
US20110126292A1 (en) * | 2009-11-24 | 2011-05-26 | Verisign, Inc. | Method and System for Providing Security Seals on Web Pages |
US7971246B1 (en) * | 2004-04-29 | 2011-06-28 | James A. Roskind | Identity theft countermeasures |
US20110277024A1 (en) * | 2010-05-07 | 2011-11-10 | Research In Motion Limited | Locally stored phishing countermeasure |
US20110283174A1 (en) * | 2010-05-13 | 2011-11-17 | Verisign, Inc. | Optimizing Security Seals on Web Pages |
US20120047581A1 (en) * | 2010-08-12 | 2012-02-23 | Anirban Banerjee | Event-driven auto-restoration of websites |
US8826395B2 (en) * | 2011-06-20 | 2014-09-02 | Digicert, Inc. | Method of improving online credentials |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8281401B2 (en) * | 2005-01-25 | 2012-10-02 | Whitehat Security, Inc. | System for detecting vulnerabilities in web applications using client-side application interfaces |
KR100714124B1 (en) * | 2006-02-21 | 2007-05-02 | 한국전자통신연구원 | Certificate issuing device and method using user consent information |
US8701165B2 (en) * | 2009-06-03 | 2014-04-15 | Microsoft Corporation | Credentials phishing prevention protocol |
US20120278876A1 (en) * | 2011-04-28 | 2012-11-01 | Mcdonald Greg | System, method and business model for an identity/credential service provider |
-
2012
- 2012-03-23 US US13/429,092 patent/US8826395B2/en active Active
-
2014
- 2014-07-28 US US14/444,777 patent/US20160048674A9/en not_active Abandoned
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040030784A1 (en) * | 2000-03-20 | 2004-02-12 | Melih Abdulhayoglu | Methods of accessing and using web-pages |
US20020152134A1 (en) * | 2001-04-12 | 2002-10-17 | Mcglinn Thomas A. | System and method for protecting internet consumers and for certifying, identifying, segregating and locating traditional "brick and mortar" merchant businesses on the internet |
US20050160286A1 (en) * | 2002-03-29 | 2005-07-21 | Scanalert | Method and apparatus for real-time security verification of on-line services |
US20040064335A1 (en) * | 2002-09-05 | 2004-04-01 | Yinan Yang | Method and apparatus for evaluating trust and transitivity of trust of online services |
US7971246B1 (en) * | 2004-04-29 | 2011-06-28 | James A. Roskind | Identity theft countermeasures |
US20070061734A1 (en) * | 2005-08-25 | 2007-03-15 | Melih Abdulhayoglu | Method for establishing trust online |
US20070156592A1 (en) * | 2005-12-22 | 2007-07-05 | Reality Enhancement Pty Ltd | Secure authentication method and system |
US20100275024A1 (en) * | 2008-04-07 | 2010-10-28 | Melih Abdulhayoglu | Method and system for displaying verification information indicators on a non-secure website |
US20100275012A1 (en) * | 2008-08-27 | 2010-10-28 | Globalsign K.K. | Server certificate issuing system and person authentication method |
US20100192068A1 (en) * | 2009-01-23 | 2010-07-29 | Avow Networks Incorporated | Method and apparatus to perform online credential reporting |
US20110055911A1 (en) * | 2009-08-28 | 2011-03-03 | The Go Daddy Group, Inc. | Business validation based social website account authentication |
US20110126292A1 (en) * | 2009-11-24 | 2011-05-26 | Verisign, Inc. | Method and System for Providing Security Seals on Web Pages |
US20110277024A1 (en) * | 2010-05-07 | 2011-11-10 | Research In Motion Limited | Locally stored phishing countermeasure |
US20110283174A1 (en) * | 2010-05-13 | 2011-11-17 | Verisign, Inc. | Optimizing Security Seals on Web Pages |
US20120047581A1 (en) * | 2010-08-12 | 2012-02-23 | Anirban Banerjee | Event-driven auto-restoration of websites |
US8826395B2 (en) * | 2011-06-20 | 2014-09-02 | Digicert, Inc. | Method of improving online credentials |
Also Published As
Publication number | Publication date |
---|---|
US20140337947A1 (en) | 2014-11-13 |
US20120324551A1 (en) | 2012-12-20 |
US8826395B2 (en) | 2014-09-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8826395B2 (en) | Method of improving online credentials | |
US10142113B2 (en) | Identifying and maintaining secure communications | |
US8683201B2 (en) | Third-party-secured zones on web pages | |
CN105849760B (en) | System for access control and system integration | |
US7831522B1 (en) | Evaluating relying parties | |
US8793804B2 (en) | Computer implemented method, computer system and nontransitory computer readable storage medium having HTTP module | |
US9836594B2 (en) | Service channel authentication token | |
US7743254B2 (en) | Visualization of trust in an address bar | |
US10554417B2 (en) | Script verification using a hash | |
US10333716B2 (en) | Script verification using a digital signature | |
US20080072053A1 (en) | Web-based authentication system and method | |
US20140373097A1 (en) | System for domain control validation | |
US7966492B1 (en) | System and method for allowing an e-mail message recipient to authenticate the message | |
US20140373127A1 (en) | Method for domain control validation | |
US20160261609A1 (en) | System and a method for intelligent verification management | |
US8272052B2 (en) | Method and system for filing and monitoring electronic claim submissions in multi-claimant lawsuits | |
US20100071046A1 (en) | Method and System for Enabling Access to a Web Service Provider Through Login Based Badges Embedded in a Third Party Site | |
US20140259132A1 (en) | System for creating a security certificate | |
US20100091994A1 (en) | Encryption Validation Systems and Related Methods and Computer Program Products for Verifying the Validity of an Encryption Keystore | |
US9660812B2 (en) | Providing independent verification of information in a public forum | |
US20130318353A1 (en) | Method for Creating and Installing a Digital Certificate | |
JP5958544B2 (en) | Information processing system, information processing method, program | |
US20140259131A1 (en) | Method for creating a security certificate | |
Bergström et al. | Public certificate management: An analysis of policies and practices used by CAs | |
JP7338360B2 (en) | Information processing device and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:036908/0381 Effective date: 20151021 Owner name: FIFTH STREET MANAGEMENT LLC, CONNECTICUT Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:DIGICERT, INC.;REEL/FRAME:036912/0839 Effective date: 20151021 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: OAKTREE FUND ADMINISTRATION, LLC, CALIFORNIA Free format text: ASSIGNMENT OF SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:044242/0788 Effective date: 20171017 |
|
AS | Assignment |
Owner name: DIGICERT, INC., UTAH Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:043990/0809 Effective date: 20171031 |
|
AS | Assignment |
Owner name: DIGICERT, INC., UTAH Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 036912/0839;ASSIGNOR:OAKTREE FUND ADMINISTRATION, LLC (AS SUCCESSOR TO FIFTH STREET MANAGEMENT LLC);REEL/FRAME:044348/0001 Effective date: 20171031 |