Validity Report
Basic Report
US8850535B2 — Methods and systems for identity verification in a social network using ratings
Priority Date: 2011-08-05, Publication Date: 2014-09-30, Current Assignee: Street Spirit Ip LLCReport Generated: 2022-10-06

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
US8966590B2●●●●●Managing social network accessibility based on ageGRANT2015-02-242010-08-17GreatFacebook IncMeta Platforms Inc
US8671453B2●●●●●Social age verification engineGRANT2014-03-112010-08-17GreatFacebook IncMeta Platforms Inc
US9208337B2●●●●●Systems  methods  and software applications for providing and identity and age-appropriate verification registryGRANT2015-12-082009-09-22Great
EP1288765B1●●●●●Universal authentication mechanismGRANT2007-11-212001-09-04GreatTelefonaktiebolaget LM Ericsson ABTelefonaktiebolaget LM Ericsson AB
US8959584B2●●●●●Systems and methods for universal enhanced log-in  identity document verification and dedicated survey participationGRANT2015-02-172007-06-01GreatAlbright AssociatesAlbright Associates
US9398022B2●●●●●Systems and methods for universal enhanced log-in  identity document verification  and dedicated survey participationGRANT2016-07-192007-06-01Great
US8893241B2●●●●●Systems and methods for universal enhanced log-in  identity document verification and dedicated survey participationGRANT2014-11-182007-06-01GreatAlbright AssociatesAlbright Associates
EP2404233A1●●●●●USING SOCIAL INFORMATION FOR AUTHENTICATING A USER SESSIONGRANT2012-01-112009-03-06GreatFacebook IncMeta Platforms Inc
EP2695136B1●●●●●SYSTEM  METHOD  SERVER AND COMPUTER-READABLE MEDIUM FOR REAL-TIME VERIFICATION OF A STATUS OF A MEMBER OF AN ORGANIZATIONGRANT2017-06-212011-04-01GreatClawd Technologies IncClawd Technologies Inc
EP1425645B1●●●●●A DISTRIBUTED NETWORK SYSTEM USING BIOMETRIC AUTHENTICATION ACCESSGRANT2010-09-292001-07-18GreatDaon Holdings LtdDaon Holdings Ltd
US8056118B2●●●●●Systems and methods for universal enhanced log-in  identity document verification  and dedicated survey participationGRANT2011-11-082007-06-01Great
EP1386470B1●●●●●ARCHITECTURE FOR PROVIDING SERVICES IN THE INTERNETGRANT2006-10-182001-04-23GreatKoninklijke PTT Nederland NV, Koninklijke KPN NVKoninklijke PTT Nederland NV, Koninklijke KPN NV
EP2283669B1●●●●●TRUSTED DEVICE-SPECIFIC AUTHENTICATIONGRANT2020-03-042008-06-02GreatMicrosoft Technology Licensing LLCMicrosoft Technology Licensing LLC
US9805213B1●●●●●Identity validation and verification system and associated methodsGRANT2017-10-312009-06-03Great
US8224753B2●●●●●System and method for identity verification and managementGRANT2012-07-172004-12-07Great
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
1,237
Recommended Classes
310
Government Assigned Classes
15
CPC
Title
Score
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)●●●●●
H04L63/08for supporting authentication of entities communicating through a packet data network | cryptographic mechanisms or cryptographic arrangements for entity authentication | (ref: H04L9/32)●●●●●
H04L63/083using passwords | cryptographic mechanisms or cryptographic arrangements for entity authentication using a predetermined code | (ref: H04L9/3226)●●●●●
G06F21/33using certificates●●●●●
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures●●●●●
H04L63/0807using tickets  e.g. Kerberos | cryptographic mechanisms or cryptographic arrangements for entity authentication using tickets or tokens | (ref: H04L9/3213)●●●●●
H04L63/10for controlling access to network resources | restricting network management access | (ref: H04L41/28)●●●●●
H04L63/0853using an additional device  e.g. smartcard  SIM or a different communication terminal | cryptographic mechanisms or cryptographic arrangements for entity authentication involving additional secure or trusted devices | (ref: H04L9/3234)●●●●●
G06F21/31User authentication●●●●●
H04L63/0815providing single-sign-on or federations●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.