SYSTEM AND METHOD FOR DYNAMIC MULTIFACTOR AUTHENTICATION
20170325087 · 2017-11-09
Assignee
Inventors
Cpc classification
H04W12/65
ELECTRICITY
H04L63/18
ELECTRICITY
H04L63/0861
ELECTRICITY
G06Q20/40
PHYSICS
H04L63/0853
ELECTRICITY
International classification
Abstract
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information. A mobile device receives the first piece of authentication information from either an access terminal or the remote authentication device. The mobile device of the user generating a second piece of authentication information which is at least partially based on the received first piece of authentication information. The second piece of authentication information is sent to the remote authentication devices and the second piece of authentication information validated. If the second piece of authentication information is successfully validated an authentication signal is generated.
Claims
1.-36. (canceled)
37. A method of authenticating a user, the method comprising the steps of: receiving at a mobile device, a first piece of authentication information from an access terminal that is in communication with the remote authentication device, wherein the first piece of authentication information comprises an encrypted message; generating, within the mobile device of the user, a second piece of authentication information which is at least partially based on the received first piece of authentication information, wherein generating comprises decrypting the encrypted message and including at least a portion of the decrypted message in the second piece of authentication information; sending the second piece of authentication information to the remote authentication device wherein the remote authentication device validates the second piece of authentication information and generates an authentication signal if the second piece of authentication information is successfully validated; wherein the first piece of authentication information is presented as an image on a display of the access terminal and captured therefrom using the mobile device, and wherein the first piece of authentication information contains transactional information related to a transaction which the user wishes to make.
38. The method of claim 37, wherein the first piece of authentication information is generated at the remote authentication device.
39. The method of claim 37, wherein the first piece of authentication information is based on an authentication request.
40. The method of claim 37, wherein the first piece of authentication information is captured from the access terminal using a digital camera on the mobile device.
41. The method of claim 37, wherein the step of generating the second piece of authentication information is done using one of International Mobile Equipment Identity (IMEI), information relating to the Subscriber Identity Module (SIM), or information specific to the mobile device of the user.
42. The method of claim 37, wherein the second piece of authentication information comprises biometric data.
43. A system for authenticating a user, the system comprising: a wired or wireless connection for sending an authentication request to a remote authentication device; a microcontroller at the remote authentication device for generating a first piece of authentication information based on the authentication request; a camera of a mobile device for receiving, at the mobile device, the first piece of authentication information from an access terminal that is in communication with the remote authentication device, wherein the first piece of authentication information comprises an encrypted message; a microcontroller for generating, within the mobile device of the user, a second piece of authentication information which is at least partially based on the received first piece of authentication information, wherein generating comprises decrypting the encrypted message and including at least a portion of the decrypted message in the second piece of authentication information; a wired or wireless connection for sending the second piece of authentication information to the remote authentication device; a microcontroller for validating the second piece of authentication information; and a microcontroller for generating an authentication signal if the second piece of authentication information is successfully validated, wherein the system is arranged such that the first piece of authentication information is presented as an image on a display of the access terminal and captured therefrom using the camera of the mobile device, wherein the first piece of authentication information contains transactional information related to a transaction which the user wishes to make.
44. The system of claim 43, wherein the system is arranged such that the microcontroller generates the second piece of authentication information using one of the International Mobile Equipment Identity (IMEI), information relating to the Subscriber Identity Module (SIM), or information specific to the mobile device of the user.
45. The system of claim 43, wherein the second piece of authentication information comprises biometric data.
46. A method for authenticating a user, the method comprising the steps of: receiving, at a mobile device of the user, a first piece of authentication information from an access terminal, wherein the first piece of authentication information contains transactional information related to a transaction which the user wishes to make and wherein the first piece of authentication information is presented as an image on a display of the access terminal and wherein said image is captured from said display using a digital camera of the mobile device; generating, within the mobile device of the user, a second piece of authentication information which is at least partially based on the received first piece of authentication information; receiving at a remote authentication device the second piece of authentication information; validating the second piece of authentication information; and, generating an authentication signal if the second piece of authentication information is successfully validated.
47. The method of claim 46 further comprising the step of receiving at the remote authentication device an authentication request.
48. The method of claim 47 wherein the authentication request comprises the transactional information related to the transaction that the user wishes to make.
49. The method of claim 47 wherein the authentication request comprises personal information of the user.
50. The method of claim 46 further comprising the step of the mobile device authenticating the source of the captured image.
51. The method of claim 46 further comprising the step of displaying by the mobile device to the user a message contained in the first piece of authentication information.
52. The method of claim 51 further comprising the step of the mobile device signing said message contained in the first piece of authentication information.
53. The method of claim 52 wherein said message comprises said transactional information and the mobile device signing said message is conditional on the user accepting the transaction described in the message.
54. The method of claim 46 further comprising the step of the mobile device signing a message contained in the first piece of authentication information.
55. The method of claim 46 wherein said first piece of authentication information comprises an encrypted message and the method further comprises the step of the mobile device decrypting said message.
56. The method of claim 55 wherein said encrypted message comprises said transactional information.
57. The method of claim 55 further comprising the step of displaying by the mobile device to the user said decrypted message.
58. The method of claim 55 further comprising the step of the mobile device signing said message.
59. The method of claim 57 wherein said message comprises said transactional information and wherein the mobile device signs said message if the user accepts the transaction described in the message.
60. The method of claim 54 further comprising the step of the mobile device sending said signed message to the remote authentication device.
61. The method of claim 46 wherein generating the second piece of authentication information comprises including in the second piece of authentication information a function of at least a portion of the first piece of authentication information.
62. The method of claim 46, wherein the step of generating the second piece of authentication information comprises using information specific to the mobile device of the user.
63. The method of claim 62, wherein the information specific to the mobile device comprises a cryptographic key.
64. The method of claim 46, wherein the second piece of authentication information comprises biometric data.
65. The method of claim 46 wherein the step of validating the second piece of authentication information further comprises the steps of: receiving information relating to the location of the mobile device; and validating the second piece of authentication information only if the information relating to the location of the mobile device indicates that the mobile device is in a predetermined location.
66. The method of claim 46 wherein the step of validating the second piece of authentication information further comprises the steps of: receiving information relating to the location of the mobile device; receiving information relating to the location of the access terminal; comparing the location of the mobile device with the location of the access terminal; and validating the second piece of authentication information only if the location of the mobile device matches the location of the access terminal.
67. A mobile device for authenticating a user, the mobile device comprising: a digital camera; a microcontroller for processing information input via the digital camera; a display for displaying information to the user; whereby the mobile device is adapted to: receive a first piece of authentication information which contains transactional information related to a transaction which the user wishes to make; use the digital camera to capture, from the display of an access terminal, an image that is displayed on said display of said access terminal; process said image to obtain an encoded message; decode said encoded message to retrieve said transactional information related to a transaction which the user wishes to make; display said transactional information to the user; generate a second piece of authentication information which is at least partially based on the first piece of authentication information.
68. The mobile device of claim 67 comprising a dedicated hardware token.
69. The mobile device of claim 67 comprising a mobile phone.
70. The mobile device of claim 67 further adapted to authenticate the source of said image.
71. The mobile device of claim 67 wherein said encoded message is also encrypted and whereby the mobile device is further adapted to decrypt said encoded and encrypted message to retrieve said transactional information related to a transaction which the user wishes to make.
72. The mobile device of claim 67 further adapted to generate said second piece of authentication information using information specific to the mobile device.
73. The mobile device of claim 72 wherein the information specific to the mobile device includes an encryption key.
74. The mobile device of claim 67 further adapted to sign said message.
75. The mobile device of claim 67 wherein the first piece of authentication information further comprises an authentication code.
76. The mobile device of claim 67 further adapted to display to the user a code comprised in the message.
77. The mobile device of claim 67 further adapted to send the second piece of authentication information to a remote authentication device.
78. The mobile device of claim 67 wherein the second piece of authentication information comprises biometric data.
79. The mobile device of claim 78 wherein the second piece of authentication information comprises at least a partial fingerprint of at least one of the user's fingers.
80. The mobile device of claim 67 further comprising a finger print scanner for scanning at least a part of a fingerprint of the user.
81. A system for authenticating a user, the system comprising: the mobile device of claim 67; a remote authentication device adapted to receive said second piece of authentication information; validate the second piece of authentication information; and generate an authentication signal if the second piece of authentication information is successfully validated.
82. The system of claim 81 wherein the remote authentication device is further adapted to generate the first piece of authentication information.
83. The system of claim 81 wherein the remote authentication device is further adapted to receive information relating to the location of the mobile device.
84. The system of claim 83 wherein the remote authentication device is further adapted to use said information related to the location of the mobile device when validating the second piece of authentication information.
85. The system of claim 84 wherein the remote authentication device is further adapted to further use a predetermined location when validating the second piece of authentication information.
86. The system of claim 85 wherein the remote authentication device is further adapted to validate the second piece of authentication information only if the information related to the location of the mobile device indicates that the mobile device is in said predetermined location.
87. The system of claim 83 wherein the remote authentication device is further adapted to receive information relating to the location of the access terminal.
88. The system of claim 87 wherein the remote authentication device is further adapted to use the information related to the location of the mobile device and the information related to the location of the access terminal when validating the second piece of authentication information.
89. The system of claim 87 wherein the remote authentication device is further adapted to compare the location of the mobile device with the location of the access terminal.
90. The system of claim 89 wherein the remote authentication device is further adapted to validate the second piece of authentication information only if the location of the mobile device matches the location of the access terminal.
Description
[0074] In the Drawings:
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081]
[0082]
[0083]
[0084] In reference to
[0085] According to a first embodiment of the present invention, a user 1 first makes an authentication request to the remote authentication device 3 via the access terminal 4. The authentication request is associated with a specific transaction which the user 1 wishes to perform. Such transactions can include operations related to banking services, transactions of a commercial nature, logon scenarios or any other transaction in which a user 1, for any reason, would need to be authenticated. Alternatively, an authentication request can be sent to the remote authentication device 3 via the mobile device 2. The remote authentication device 3 then generates a message which is sent either directly to the mobile device 2, using a Short Message Service (SMS) a Multimedia Message Service (MMS) or via any other wireless data communication means (i.e. GPRS, 3G, etc.). In either case, the message is preferably encoded and encrypted and may include information relating to the transaction.
[0086] If the message is displayed to the user, the user 1 may then either input the message into the access terminal 4 in order for it to be sent to the remote authentication device 3 or send the message directly to the remote authentication device 3 using the mobile device 2. Alternatively, in another example of the present invention, the message may not be shown to the user 1 and be sent directly to the remote authentication device 3.
[0087] In the example of a system where the second message is displayed to the user 1, the user 1 must enter the second message into the access terminal 4 in order for the second message to be communicated to the remote authentication device 3. Once received by the remote authentication device 3, the second message is then validated. If the second message is successfully validated, an authentication signal is generated and may be sent to the access terminal 4 indicating that the user 1 has been authenticated by the remote authentication device 3.
[0088] In the example of a system where the second message is automatically sent back to the remote authentication device 3, from the mobile device 2, the user 1 does not need to enter the message in the access terminal 4. As in the previous example, once received by the remote authentication device 3, the second message is then validated. If the second message is successfully validated, an authentication signal is sent to the access terminal 4 indicating that the user 1 has been authenticated by the remote authentication device 3.
[0089] The second message may contain further authentication information. Such information could comprise biometric information such as a picture of the face of user or a thumb print which could be processed on either the mobile device or, alternatively, sent directly to the authentication server and processed and validated there. Another example of biometric data could consist of a recording of the users voice, again, for analysis and validation at the mobile device or at the authentication device.
[0090] In reference to
[0091] Now, in reference to
[0092] Finally, the encrypted and encoded message is embedded into a cover signal so that the original signal and modified signal are perceptually indistinguishable. The cover signal could be a sound signal or an image signal. The image signal can be a single image or a sequence of images forming a video signal. The encrypted and encoded signal can be embedded into a cover image signal using any known form of steganography or digital watermarking. Alternatively, the message could be encoded into a visual code where the code itself is the primary data object and no cover signal is used. One of several examples of this is the use of a barcode. Then, the modified signal is sent to the access terminal 4 (step S103).
[0093] Now, in reference to
[0094] In another example of the invention, the modified signal could be sent to the access terminal and subsequently printed out on a piece of paper or any other media which would provide a visual representation of the signal. Alternatively, the modified signal could be sent to the user on a piece of paper in the form of, for example, a letter.
[0095] Once the modified signal is captured, the mobile device 2 may authenticate the source of the image. Then, using software installed on the mobile device 2, the image is then processed in order to extract the encoded and encrypted message.
[0096] In the case where the modified signal is a digital sound signal, the modified signal is reproduced by the access terminal 4, so as to be audible by the user 1. The user 1 then uses a microphone on his or her mobile device 2 to capture the reproduced digital sound signal (step S104). Using software installed on the mobile device 2, the sound is then processed in order to extract the encoded and encrypted message.
[0097] In either of the above cases, the extracted message is decoded and decrypted. The generated code and transactional information is then displayed to the user 1 (step 105). If the user 1 is satisfied as to the correctness of the transactional information, he or she may enter the resulting code into the access terminal 4 (step S106). The code is then sent to the remote authentication device 3 in order to be compared to the code which was originally generated in step S102. If the code matches the code which was originally generated, the user 1 is successfully authenticated. This can be done by, for example, sending an authentication signal to a third party, such as a bank or an online retailer or alternatively, sending an authentication signal to a local client operating on the access terminal 4.
[0098] Now, in reference to
[0099] Once received by the remote authentication device 3, the password and user name are validated and, if the validation process is successful, the information pertaining to the transaction is added to a randomly generated code and the resulting message is encrypted, encoded and interleaved. The resulting encrypted and encoded message can then be embedded into either an audible or visual cover signal. If the encrypted and encoded message is embedded into an image signal, any known form of steganography or digital watermarking can be used.
[0100] Alternatively, the message could be encoded into a visual code where the code itself is the primary data object and no cover signal is used. One of several examples of this is the use of a barcode.
[0101] In both of the above cases, the modified signal is then sent to the access terminal 4 (step S203).
[0102] Now, in reference to
[0103] In the case where the modified signal is a digital audio signal, the cover signal into which the encoded and encrypted message is embedded can be an audio signal containing audible transactional information such as a mechanised voice reading out the sentence “£1,222 to account 4255434”. Then, the modified audio signal is reproduced by the access terminal 4, so as to be audible by the user 1. The user 1 then uses the microphone on his or her mobile device 2 to capture the reproduced digital sound signal (step S204). Using software installed on the mobile device 2, the sound is then processed in order to extract the encoded and encrypted message, which is then reproduced so as to be audible to the user 1. Alternatively, the message could be presented to the user in text form.
[0104] Then, in both of the above cases, the user 1 of the mobile device 2 is given the choice to either accept the transaction which is being described in the message or refuse it.
[0105] The software on the mobile device 2 decodes and decrypts the message, and, if the transaction is accepted by the user, signs the message before sending it to the remote authentication device 3. Alternatively, the software on the mobile device simply digitally signs the message, without decoding and decrypting it, and then sends the signed message to the remote authentication device 3.
[0106] If the transaction is refused, the encoded and encrypted message is sent to the remote authentication device 3 without being digitally signed. Alternatively, the encrypted message could not be sent at all and the authentication device would have a timeout function which would cancel any authentication request which took longer than a fixed period of time. The mobile device 2 can send the message to the remote authentication device 3 via any known form of mobile communication (e.g. SMS, MMS, or standard GPRS or 3G).
[0107] Other information specific to the mobile device (such as a network operator's ID) could also be added to the signed message. In reference to
[0108] If the geographic locations of the mobile device 2 and the geographic location of the access terminal 4 are the same, the authentication device 3 will proceed with the authentication method. However, if the geographic locations are different, the authentication device 3 will not continue with the authentication process and the user will not be authenticated. In an alternative example, the authentication server will continue with the authentication of the user but will produce a geographic location failure notification signal which can then be used to alert a third party to the fact that the mobile device 2 appears to be in a different geographic location to that of the authentication device. The above geographic location match can be performed at any time before the user if successfully authenticated.
[0109] In another, simpler, example, the geographic location of the mobile device 2 alone can be determined and used for validation. This example of the invention would be particularly suited for application where certain online activity is restricted in specific geographic locations (e.g. online gambling in the United States).
[0110] Again, with reference to
[0111] In each embodiment of the present invention, the message which has been decoded and decrypted by the mobile device can be sent to the authentication device 3 any number of times over any period of time. For example, the present invention could be used to distribute a PIN code to a user so that the user could then send the PIN code to the authentication device 3 any number of times such that the user could be authenticated whenever he or she wished.
[0112] Now, in reference to
[0113] Security between the remote authentication device 3 and the mobile device 2 may be implemented in a variety of ways. One example is asymmetric cryptography where a public cryptographic key would be stored in the remote authentication device 3 and a private key would be stored in the mobile device 2.
[0114] Furthermore, information relating to a specific Subscriber Identity Module (SIM) in the mobile device 2 could be stored on the remote authentication device 3 and used as a key to encrypt the randomly generated message.
[0115] Finally, the International Mobile Equipment Identity (IMEI) number of the mobile device 2 could be stored on the remote authentication device 3 and used as a key to encrypt the randomly generated message. Thus, only the mobile device 2 with that specific IMEI could decrypt the message.
[0116] Now, in reference to