SecureAuth Issued Two Patents For User Authentication MethodsSecureAuth Issued Two Patents For User Authentication Methods
Patents expand BYOD identity/access management
February 22, 2013
IRVINE, Calif., Feb. 18, 2013 – SecureAuth, a leading provider of identity enforcement technology for the enterprise, was issued two patents by the US Patent and Trademark Office. Patent 8,301,877 is for configuring a valid duration period for a digital certificate, and patent 8,327,142 is for facilitating secure online transactions. SecureAuth will demonstrate the patented technology within a new mobile identity management solution it will announce at the RSA Conference, the world's leading information security industry event.
Patent 8,301,877 is a method for the registration of X.509 certificates used to digitally sign and authenticate a user and server. It securely abstracts certificate delivery of the certificate identity (username), expiration and attributes. The benefit is it greatly simplifies deploying X.509 delivery and authentication for user and server access among mobile, web, cloud and network access points.
Patent 8,327,142 is a method for mutually authenticating a client and a server by validating X.509 certificates through bilateral authentication without the need of a traditional C-SSL exchange. The benefit is it removes systems prompts from certificate storage and retrieval and greatly simplifies the user experience, especially in mobile environments.
"Coding for user authentication and deployment of certificates within an enterprise is very burdensome and certainly not practical as IT departments expand their access restrictions to mobile devices," commented Garret Grajek, chief technology officer at SecureAuth. "The two patents awarded to SecureAuth address these issues and have already shown significant market acceptance with the broad adoption of SecureAuth IdP, which now has more than 10 million corporate end users."
The patented technologies are currently used with SecureAuth IdP, which authenticates user identities using two-factor authentication and enables single-sign-on from any device to any network access point. Integration of the technology will be extended to new products addressing growing enterprise mobile access and identity management challenges due to BYOD.
Press and analysts interested in a briefing with Garret Grajek, CTO, to see a mobile app demo may contact Gina Ray to schedule a briefing, or can stop by SecureAuth booth 123 during the RSA Conference. SecureAuth has nine additional patents pending.
SecureAuth is a technology leader in universal identity enforcement for mobile devices, cloud applications and networks that serves hundreds of customers and over 10 million users worldwide. Its SecureAuth IdP products offer Global 5000 companies a uniquely extensible, enterprise-proven method of administering corporate identity governance on cloud-based applications, mobile devices, and networks. These all-in-one solutions provide IT departments with a simplified way of managing and enforcing access, authentication, approval and assertion based on existing user entitlements. SecureAuth IdP works anywhere and is completely scalable. Located in Irvine, Calif., SecureAuth was awarded the Stevie Award for "Fastest-Growing Company" in 2012 by The American Business Awards, won the People's Choice Stevie Award for Favorite Security Solution, and was selected at "Favorite BYOD Security Solution" by UP-START. For the latest insight on enterprise identity governance and issues follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.gosecureauth.com for additional information.
SecureAuth, SecureAuth IdP and the SecureAuth logo are registered trademarks of SecureAuth Corporation. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingDec 12, 2023
SecOps & DevSecOps in the CloudDec 14, 2023
What's In Your Cloud?Jan 17, 2024
Everything You Need to Know About DNS AttacksJan 18, 2024
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
2022 Insurance Industry Cyber Threat Landscape Report
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report