Step-Up Trusted Security Authentication Based on Wireless Detection and Identification of Local Device(s) with Unique Hardware Addresses
20230101582 · 2023-03-30
Inventors
- Bradley Long (Matthews, NC, US)
- Joshua S. Burrell (Carlotte, NC, US)
- Rosemary Hill (Jacksonville, FL, US)
Cpc classification
G06Q20/18
PHYSICS
G07F9/001
PHYSICS
H04L63/0861
ELECTRICITY
H04L63/0876
ELECTRICITY
G06Q20/4097
PHYSICS
G06Q20/202
PHYSICS
G06Q20/4016
PHYSICS
G06Q20/02
PHYSICS
H04L63/0853
ELECTRICITY
International classification
G06Q20/40
PHYSICS
Abstract
Information security processes, systems, and machines for authenticating users, wirelessly detecting a user's local devices, calculating a trust score based on the local devices, and setting a transaction limit are disclosed. An ATM or POS machine can read a card, authenticate a user, and wirelessly read MAC or other unique hardware addresses for one or more of the user's local devices. Trust scores can be calculated based on the number of local devices that are detected in relation to the number of the user's devices that are registered, the historical presence of the user's devices during prior transactions, historical usage of the ATM or POS machine, geolocating, biometric authentication(s), etc. Dynamic transaction limits, types, and rights may be set for transactions corresponding to the trust score values. Transactions may be conducted wholly or partially in a contactless fashion.
Claims
1. An authentication process for a machine to authenticate a user with a card based on wireless detection of a user's local wireless devices comprising the steps of a) reading, by the machine, account information corresponding to the card; b) receiving, by the machine from the user, a security code for the card; c) wirelessly detecting, by the machine, one or more of the user's local wireless devices; d) receiving, by the machine from the one or more local wireless devices, one or unique hardware addresses for said one or more local wireless devices; e) transmitting, by the machine, the account information, the security code, and the unique hardware addresses for authentication and a determination of a trust score; f) receiving, by the machine, a confirmation of said authentication and a transaction limit authorization based on the trust score; and g) processing, by the machine, a transaction up to the transaction limit authorization corresponding to the trust score.
2. The authentication process of claim 1 wherein the wireless detection uses a Bluetooth protocol or an Ultra-Wideband (UWB) protocol, and said one or more unique hardware addresses are media access control (MAC) addresses.
3. The authentication process of claim 1 wherein the machine is an automated teller machine (ATM) or a point-of-sale (POS) machine, and said one or more unique hardware addresses are media access control (MAC) addresses.
4. The authentication process of claim 1 wherein the wireless detection uses a Bluetooth protocol or an Ultra-Wideband (UWB) protocol, the machine is an automated teller machine (ATM) or a point-of-sale (POS) machine, and said one or more unique hardware addresses are media access control (MAC) addresses.
5. The authentication process of claim 4 wherein the trust score is calculated based on how many of said one or more MAC addresses are authenticated.
6. The authentication process of claim 5 wherein, as a number of the one or more MAC addresses are authenticated increases, the trust score increases.
7. The authentication process of claim 6 wherein the transaction limit authorization increases as the trust score increases.
8. The authentication process of claim 7 wherein the transaction limit authorization decreases as the trust score decreases.
9. The authentication process of claim 8 wherein the one or more local wireless devices are selected from the group consisting of: a smartphone, a smart watch, a tablet, a fitness tracker, a Tile tracker, wireless headphones, and an AirTag.
10. The authentication process of claim 9 wherein the transaction is declined if the trust score is below a minimum security threshold.
11. The authentication process of claim 10 wherein the trust score is further based on a historical number of said one or more local hardware devices that are present with the user at historical transactions at the machine.
12. The authentication process of claim 11 wherein the trust score is further based on historical usage by the user of a geographical location of the machine.
13. The authentication process of claim 12 further comprising the step of biometrically authenticating, by the machine or said one or more local wireless devices, the user.
14. The authentication process of claim 13 wherein the biometrical authentication is based on facial recognition, retinal scanning, fingerprint reading, or voice recognition.
15. The authentication process of claim 14 wherein the trust score is increased based on successful biometrical authentication of the user.
16. An automated teller system for use with an authentication server to authenticate a user with a card based on wireless detection of one or more of the user's local wireless devices, the system comprising: a) at least one automated teller machine (ATM) having: i) at least one processor; ii) at least one non-wireless communication interface communicatively coupled to the at least one processor and the authentication server; iii) a wireless card reader communicatively coupled to the at least one processor and the card; iv) a wireless communication interface, communicatively coupled to the at least one processor, in wireless communication, via a Bluetooth protocol or Ultra-Wideband (UWB) protocol, with said one or more of the local wireless devices; and v) a memory communicatively coupled to the at least one non-wireless communication interface, said memory storing ATM computer-executable instructions that, when executed by the at least one processor, cause the ATM to: (1) wirelessly read, from the card, account information; (2) wirelessly detect said one or more of the user's local wireless devices; (3) wirelessly read one or more media access control (MAC) addresses for said one or more local wireless devices; (4) transmit, to the authentication server, said account information and said one or more MAC addresses for authentication and for a determination of a trust score; (5) receive, from the authentication server, said authentication and a transaction limit authorization based on the trust score; (6) process a transaction if an amount of the transaction is less than or equal to the transaction limit authorization; and (7) reject the transaction if the amount of the ATM transaction is greater than the transaction limit authorization, wherein the trust score is calculated based on how many of said one or more MAC addresses are authenticated, the trust score increases as a quantity of the one or more MAC addresses are authenticated increases, the transaction limit authorization increases as the trust score increases, the trust score decreases as the quantity of the one or more MAC addresses authenticated decreases, and the transaction limit authorization decreases as the trust score decreases.
17. The system of claim 16 wherein the trust score is further based on a historical number of said one or more local wireless devices that are present with the user at historical transactions at the ATM.
18. The system of claim 17 wherein the one or more local wireless devices are selected from the group consisting of: a smartphone, a smart watch, a tablet, a fitness tracker, a Tile tracker, wireless headphones, and an AirTag.
19. The system of claim 18 wherein the transaction is executed in a contactless fashion without physical contact between the user and the ATM.
20. A contactless automated teller system to authenticate a user with a card based on wireless detection of one or more of the user's local wireless devices, the system comprising: a) an automated teller machine (ATM) having: i) an ATM processor; ii) an ATM communication interface communicatively coupled to the ATM processor; iii) an ATM wireless interface, communicatively coupled to the ATM processor, in wireless communication, via a Bluetooth protocol or Ultra-Wideband (UWB) protocol, with said one or more of the local wireless devices and with the card; b) an authentication server having: i) an authentication processor; ii) an authentication communication interface communicatively coupled to the authentication processor and the ATM communication interface; and c) an ATM memory communicatively coupled to the ATM communication interface and an authentication memory communicatively coupled to the authentication communication interface, said ATM memory storing ATM computer-executable instructions that, when executed by the ATM processor, cause the ATM to perform ATM functions, and said authentication memory communicatively coupled to the authentication communication interface, said authorization memory storing authentication computer-executable instructions that, when executed by the authentication processor cause the authentication server to perform server functions, in which: i) the ATM wirelessly reads, via the wireless interface, card information for the card; ii) the ATM wirelessly reads, via the wireless interface, one or more media access control (MAC) addresses for said one or more local wireless devices; iii) the ATM transmits, from the ATM communication interface to the authentication communication interface, said card information and said one or more MAC addresses; iv) the authentication processor receives, from the authentication communication interface, said card information and said one or more MAC addresses; v) the authentication processor retrieves, from the authentication memory, account information corresponding to the card information and a known list of the user's local wireless devices; vi) the authentication processor calculates a trust score based on: (1) the account information, and (2) a ratio of said one or more MAC addresses that were detected to the known list of the user's local wireless devices, where in the trust score varies directly with the ratio; vii) the authentication processor sets a transaction limit based on the trust score and the account information; viii) the authentication processor transmits, from the authentication communication interface to the ATM communication interface, the transaction limit; ix) the ATM processor receives, from the ATM communication interface, the transaction limit; x) the ATM processor processes a transaction if an amount of the transaction is less than or equal to the transaction limit authorization; and xi) the ATM processor rejects the transaction if the amount of the ATM transaction is greater than the transaction limit authorization.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
DETAILED DESCRIPTION
[0031] In the following description of the various embodiments to accomplish the foregoing, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration, various embodiments in which the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made.
[0032]
[0033] Users 100 may have one or more Bluetooth, UWB, or otherwise wirelessly enabled portable electronic devices 102 with them when approaching an ATM (or POS) machine 106, such as in ATM network 104, which may comprise ATMs or POS machines 106, 108, 110, 112, 114, etc. Although reference is made in the drawings to ATMs, the present disclosure is not limited to ATMs and would apply equally to POS machines and have the same or similar components as the ATMs. For brevity, only ATM nomenclature is used in the drawings.
[0034] User wireless portable electronic devices 102 may include smartphones 102-1, smart watches 102-2, smart glasses 102-3, tablets 102-4, fitness trackers 102-5, Tile trackers or AirTags 102-6, headphones 102-7, or any other wirelessly accessible electronic device with a unique hardware address 102-N. Preferably, each wireless device 102 will have a media access control (MAC) address that uniquely identifies it. As such, a list of a user's electronic devices and a corresponding list of MAC addresses can be compiled. These devices and MAC addresses can be preregistered with a company, associated with the user's account(s), and stored in memory, databases, and/or the like. If desired, hardware addresses can include additionally or alternatively device make/model names with serial numbers, MAC address(es), Bluetooth address(es), IMEI numbers, ICCID numbers, SEID identifiers, and/or any other identifier that may be unique for the hardware device. For brevity, only MAC addresses are referenced herein, but any type of unique address may be used.
[0035] ATM 106 is in wireless communication 103 via Bluetooth, UWB, or the like with portable electronic devices 102 as the user approaches the ATM 106. The ATM 106 may have various hardware components such as processor(s) 106A, network interface(s) 106B, UWB/Bluetooth or other wireless interface(s) 106C, a card reader 106D to read magnetic cards or chipped cards such as debit and credit cards, etc., 106D biometric interface(s) 106E, display(s) 106F, cash dispenser(s) 106G, touchscreen or keypad input interface(s) 106H, speaker(s) 1061, and/or microphone(s) 106J.
[0036] ATM 106 may also have one or more memories 106K that can store processor-executable instructions/modules and can store or access data. These modules, routines, components, and/or functions may reside in non-volatile local memory in one or more sectors of memory, data stores, and/or data structures in the memory.
[0037] For example, a user validation module 106-1 may enable user identification and/or security confirmation by reading card information and processing securing information such as PINs, zip codes, or the like. A Bluetooth, UWB, or other wireless device detection and hardware address identification module 106-2 can detect when a user's wireless devices are within range of the ATM 106 (or POS) and can read unique hardware addresses, such as MAC addresses, from the devices. A trust authentication module 106-3 may decide locally about the level of trust to be associated with the transaction based on user information and/or the detected local devices, or may process the data and transmit it to an authentication server for trust processing.
[0038] A log processing module 106-4 may log the transaction and may keep a log of past transactions. Such log information may be used in the trust processing and/or may be provided to an authentication server for archival purposes or for trust processing of future transactions. A session handling module 106-5 may control the ATM session and handle inputs and outputs for the session. A network communication module 106-6 may facilitate transmission of information from an ATM or POS to an authentication server and may receive transmissions therefrom. An encryption module 106-7 may encrypt or decrypt data transfers and transmissions sent to and/or received by the ATM or POS, the user's card, and authentication servers. An I/O processing module may handle all inputs from the user or card to the ATM or POS or outputs to the user.
[0039] A biometrics processing module 106-9 may allow the ATM or POS to perform facial recognition, fingerprint scanning, retinal scanning, and/or voice recognition in order to further validate the user at the time of transaction. This processing may be performed entirely on the ATM or POS. Or the data input may be handled by module 106-9 and transferred to an authentication server for validation. Alternatively, the processing may be performed in conjunction with an app or other component on smart device 102, which would be in communication directly with the ATM or POS or indirectly through the cloud to a processing server or the ATM or POS.
[0040] A GUI processing module 106-10 can handle generation of graphical user interfaces and display instructions or inputs on the ATM or POS. It may also handle display of texts or graphical objects, selectable buttons or icons or the like. A cash dispensing module 106-11 may handle physical inputs or outputs of physical currency.
[0041] ATM or POS 106 may be in wired and/or wireless communication with one or more authentication servers 118 or data sources. Authentication hardware and/or processing implemented on server(s), with central processing hardware, and/or central processing components such as processor(s) 118A, network interface(s) 118B, input interface(s) 118C, and display(s) 118D. One or more centralized and/or distributed memories, storage device(s), and/or databases 118E in communication therewith may be used to store relevant modules, jobs, routines, data, and/or computer-executable instructions for implementing various server aspects of this disclosure. This includes user information 118-1, account information 118-2, user and hardware validation 118-3, Bluetooth, UWB, or the like storage of preregistered hardware devices associated with the user, trust calculation processing 118-5, transaction processing 118-6, biometrics information or processing correlated to the user and/or for interacting with third party mobile biometric devices 118-7, encryption processing 118-8 to encrypt and/or decrypt information exchanged with users or ATMs/POS machines etc., logging modules and data logs for storing historical information and updating accounts 118-9, network communication modules 118-10 to communicate with distributed processing or data stores or to communicate with ATMs and POS machines, geolocating information regarding present and past transaction locations or user travels 118-11, mobile app processing 118-12 for preregistration purposes or biometrics handling, and web processing 118-13 for preregistration purposes. One or more portions of the foregoing may be stored in one or more sectors of integrated and/or accessible non-volatile memory, memories, data stores, databases or the like.
[0042]
[0043]
[0044] As illustrated in
[0045]
[0046] On the horizontal axis, the trust score 412 for a user and/or requested transaction can vary across a range of, for example, from 0% reliability to 100% reliable. The range may be represented in percentages and/or as other various numeric values or the like. On the vertical axis, different levels of transaction limits or usage rights may be assigned to corresponding trust score levels.
[0047] For example, if the trust score is 0%, a security alert (i.e., level 400) may be triggered. This might be the case if none of the user's wireless devices are detected, the PIN, zip code, or other security code information is incorrect, one or more biometric challenges fail, or the like. Or it may be triggered if duplicative differing devices are detected that do not match the preregistered known devices. In such a case, no rights or limits may be authorized.
[0048] At level 402, perhaps a trust score of 10% is detected based on trust score criteria. This might be associated with a minimum transaction limit level or limited transaction type rights. As an example, this minimal level may only allow a transaction of $100 or less and may only allow the user to withdraw funds from a certain account or access only a certain account.
[0049] Rights and limits may be progressively increased at levels 404, 406, 408, and ultimately 410 as the trust score increases from 10-100%. Increased levels 404-410 may allow higher transaction amounts such as respectively $300, $500, $1000, or unlimited. And may also allow additional transaction types (e.g., wire transfers, account transfers, bill payments, deposits, cryptocurrency transactions, equity transactions, account modifications, etc.) and may allow access to different accounts other than just the base account.
[0050]
[0051]
[0052] In step 600, a user can preregister one or more of their wireless devices with unique hardware addresses. This information could be registered manually or automatically by accessing a company's app on a smart device or via an institution web site. The hardware address information can be associated with the user and/or the user's accounts, and can be stored for future reference and trust scoring/validating.
[0053] Also in step 600, a user may approach an ATM or POS and may attempt to initiate a transaction. Traditional identification and verification processes may be performed. Biometrics or other validation may also be performed.
[0054] In step 602, an ATM or POS may read account information corresponding to the card. This may take the form of reading information from a magnetic strip on the card or reading the chip on the card. It may also take place by wirelessly reading the information from the card via Bluetooth, UWB, or other wireless protocol.
[0055] In step 604, the ATM or POS may wirelessly detect one or more of the user's local wireless devices via Bluetooth, UWB, or other wireless protocol. And, in step 606, may wirelessly read, scan, or otherwise identify the unique hardware address(es) for the user's devices. An example type of address that could be identified is the MAC address for each device.
[0056] In step 608, the ATM or POS can transmit the account information, the security code, requested transaction type, requested transaction amount, and/or the MAC addresses to an authentication server for authentication and for computation of a trust score. Alternatively, such information may be used locally by the ATM or POS to perform the same functionality. One or more trust scores may be calculated based on the number of authenticated devices that are detected, historical information, validated biometric information, geographical location of the proposed transaction, etc. The number of authenticated devices (i.e., the number of preregistered devices that are confirmed to be locally present with the user at the proposed transaction site) can be compared with the known list of preregistered devices. For example, a user may have only one of their five devices with them, which might result in a lower trust score, or might have all five of five devices with them, which might warrant a higher trust score.
[0057] After calculation of a trust score and identification of corresponding transaction limits and/or rights like discussed above with respect to
[0058] In step 612, the ATM or POS can then process a transaction up to the transaction limit authorization corresponding to the trust score and/or allow certain transaction types based on the trust score. If the trust score is insufficient or other security criteria is not satisfied, the transaction may also be rejected.
[0059]
[0060] In step 700, transaction processing may be commenced. This may result from an authentication server receiving a transaction request from an ATM or POS.
[0061] In step 702, the transaction request amount and type, the account identifier, security information, and/or list of detected devices present at the ATM or POS can be received or retrieved.
[0062] In steps 704 and 706, the user, account, and security information can be validated as successfully received. This may include account numbers, account types, user information, user preferences, user profiles, PINs, zip codes, security codes, and biometric information. And corresponding information may be retrieved from secure memory for comparison purposes to validate against the information received from the ATM or POS machines.
[0063] In particular, a known list of hardware addresses for the user's preregistered hardware devices may be retrieved from memory to compare against the devices locally detected (i.e., based on their local hardware addresses) in step 708. The more successfully detected devices that are detected the higher the trust score can be. Similarly, if different phones or devices are detected that are duplicative of the known devices, the potential for an unauthorized transaction may be present. For example, if a user has a particular iPhone that is preregistered and the detected iPhone at the ATM or POS is different, this may set a red flag for a potential problem. This problem would be increased as the number of non-matching devices are detected thereby reducing the trust score.
[0064] In step 710, a trust score can be calculated based on any number of desired variables. Again, this may be based on the number of detected preregistered devices, if there are duplicative non-registered devices detected, historical usage of the ATM or POS in the past, historical transaction types and amounts, the geographical location of the user and/or ATM or POS, etc. Any type of algorithm could be used. The primary thrust is that various of these factors increase the likelihood that the transaction is valid and the trust score would then be increased, and other factors would reduce the level of confidence in the requested transaction.
[0065] In step 712, if the trust score is zero, the transaction may be rejected for one or more reasons in step 716, and the rejection may be communicated to the ATM or POS in step 718, after which the process can be terminated.
[0066] Alternatively, if there is a positive trust score in step 712, the transaction limits and/or types can be dynamically set in accordance with predetermined levels in step 714 based on trust scores as shown in
[0067] Although the present technology has been described in detail for the purpose of illustration based on what is currently considered to be the most practical and preferred implementations, it is to be understood that such detail is solely for that purpose and that the technology is not limited to the disclosed implementations, but, on the contrary, is intended to cover modifications and equivalent arrangements that are within the spirit and scope of the appended claims. For example, it is to be understood that the present technology contemplates that, to the extent possible, one or more features of any implementation can be combined with one or more features of any other implementation.