Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

3/28/2013
05:23 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

StrikeForce Commences Patent Litigation Against Out-of-Band Authentication Infringers

PhoneFactor, Fiserv & First Midwest Bancorp all have been named in a patent lawsuit

Edison, NJ. March 28th, 2013 – StrikeForce Technologies, Inc. (OTCBB: SFOR.OB) announced today that it has initiated patent litigation against PhoneFactor, Inc., a subsidiary of Microsoft Inc., Fiserv, Inc., and First Midwest Bancorp, Inc. in the U.S. District Court for the District of Delaware in Wilmington, for infringement of United States Patent No. 7,870,599 (the “’599 Patent”).

The ’599 Patent, entitled “Multichannel Device Utilizing A Centralized Out-of-Band Authentication System (COBAS),” relates to several key technologies underlying a multichannel security system for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The ’599 Patent was granted by the United States Patent and Trademark Office on January 11, 2011. A reexamination certificate issued after a successful Ex Parte Reexamination concluded on December 27, 2011.

StrikeForce has retained Blank Rome LLP, a national law firm, to represent it in the litigation. “The engagement of a law firm of such quality and reputation to pursue infringement claims under our Out-of- Band patent further strengthens our ability to protect our Intellectual Property (IP), which we worked diligently for many years to develop,” commented Mark L. Kay, CEO of StrikeForce.

There has been a sharp rise in cyber-attacks recently, especially with RSA being hacked in March of 2011.

This increase in cyber-attacks and the strengthening of regulations, such as the FFIEC in the financial market and HIPAA HiTech and Electronic Protected Healthcare Information (ePHI) in the healthcare market, are prompting an exponential increase in the use of Out-of-Band authentication. StrikeForce has initiated a program to protect its proprietary IP, which was invented by its current CTO based on his vast telecommunications experience. Mr. Kay stated, “In light of our having been granted the ’599 Patent, and with increased activity in various markets by enterprises, government agencies and social media, StrikeForce will aggressively protect its patent. Therefore, we have filed today our first lawsuit designed to protect this critical StrikeForce asset, which is definitely increasing in importance with consistently troubling news about cyber-attacks and cyber thefts. We will take whatever action is necessary to protect our intellectual property rights and maximize shareholder value.”

ABOUT STRIKEFORE TECHNOLOGIES, INC. StrikeForce Technologies helps to prevent online identity theft and data security breaches for consumers, corporations, and government agencies. It provides powerful two-factor, “Out-of-Band” authentication and keystroke encryption solutions. StrikeForce Technologies, Inc. (OTCBB: SFOR) is headquartered in Edison, N.J., and can be reached at www.strikeforcetech.com or by phone at (732) 661-9641 or toll-free at (866) 787- 4542.

Safe Harbor Statement: Matters discussed in this press release contain forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. When used in this press release, the words “anticipate,” “believe,” “estimate,” “may,” “intend,” "expect" and similar expressions identify such forward-looking statements. Actual results, performance or achievements could differ materially from those contemplated, expressed or implied by the forward-looking statements contained herein. These forward-looking statements are based largely on the expectations of the Company and are subject to a number of risks and uncertainties. These include, but are not limited to, risks and uncertainties associated with: the sales of the company's identity protection software products into various channels and market sectors, the issuance of the company's pending patent application, and the impact of economic, competitive and other factors affecting the Company and its operations, markets, product, and distributor performance, the impact on the national and local economies resulting from terrorist actions, and U.S. actions subsequently; and other factors detailed in reports filed by the company.

Contact Info: StrikeForce Investor Relations Contact: Mark L. Kay (732) 661-9641 [email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.