CN1650603A - System and method for acoustic two factor authentication - Google Patents
System and method for acoustic two factor authentication Download PDFInfo
- Publication number
- CN1650603A CN1650603A CNA038070316A CN03807031A CN1650603A CN 1650603 A CN1650603 A CN 1650603A CN A038070316 A CNA038070316 A CN A038070316A CN 03807031 A CN03807031 A CN 03807031A CN 1650603 A CN1650603 A CN 1650603A
- Authority
- CN
- China
- Prior art keywords
- signature
- signal
- pin
- receiver
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3272—Short range or proximity payments by means of M-devices using an audio code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/346—Cards serving only as information carrier of service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3672—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/65—Environment-dependent, e.g. using captured environmental data
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
- Lock And Its Accessories (AREA)
Abstract
A hand-held token can be operated to generate an acoustic or other wireless signal representing a digital signature produced from the private key of a public key pair (44), with the public key being confidential in that it is known only to authorized entities, such as bank computers. The signal from the token can be received by, e.g., a receiver at a bank ATM (46) that also requires a PIN for account access. The user enters the PIN into the ATM (48), and the ATM (52) encrypts the signal from the token with the PIN and sends it on to the bank computer (54) over a link that need not be secure, since even if the PIN is guessed there is no way to verify that it is the correct PIN without also knowing the confidential public key held by the bank computer.
Description
Relevant application
The application is the U.S. Patent application of submitting on February 15th, 2002 the 10/077th, No. 365 denominations of invention are the continuation application of " Method and Apparatus for Simplified Audio Authentication (method and apparatus of the audio authentication of simplification) " this patent application of awaiting the reply jointly, and this patent application is incorporated into this by reference.
I. invention field
The present invention relates generally to use the authentication of audio tones.
II. background of invention
Along with the growth that the internet uses, the convenient type ecommerce of many types has become possibility, is connected to ATM (ATM) of remote bank or the like such as on-line purchase commodity and service, online bank and use.But the convenience of ecommerce also makes the burglar steal valuable information and/or disguises oneself as and do not want to buy commodity and do not want to be more prone to from the people of bank account drawing or the like just.
Therefore, in electronic transaction, provide safety most important.For this reason, the encrypted personal information that is exchanged of hiding of many electronic transactions.But encrypt a just aspect of safety, because the burglar may crack encryption method or and then hold the transaction of encrypting such as the effective article of this class of credit card, the owner and participating in of disguising oneself as.
Notice this point, just understanding authentication easily is a safe importance.At electronic commerce context, the individual of authentication attempt finishes by computer interface.Therefore, if the infrastructure of bio-sensing type computer annex generally is not installed, take to check individual biological property to verify that this people is that he claims that the people that he is is not practical usually so.
This can use two authentication key elements, that is, and and based on people of item authentication such as credit card or key chain that the individual had, or based on people of the authentication of the things such as password or PIN(Personal Identification Number) known to the individual.To some responsive especially application such as ATM withdrawal, perhaps two kinds of key elements all need.
At present, ATM user inserts ATM to the authenticating device such as credit card, imports PIN then.This method has been finished two factor authentication.But ATM must send to secret information on the card and PIN both Central Bank's computer and authenticates.Therefore, the link between bank and the ATM must safety, with prevent the burglar eavesdrop on the line and find to authenticate key element both, described authentication key element makes the burglar steal money from user account.This brings great burden for the link basis facility.
The patent application of pointing out has above disclosed hand-held " token " based on sound wave, the individual can operate the acoustic signal that it comes to send to the equipment that is called " authenticator ", " validator " or " receiver " the expression secret information, so that based on this people of this signal authentication.Generally acknowledging in those applications, is to have existed the huge mounted infrastructure that is used to receive and send speech and derives from the electronic signal of speech based on the advantage of the token of sound wave.Specifically, existed global telephone system to send the data of representing acoustic information, also have, except phone, the many computing equipments that connected by this same system (being included in the internet) all have microphone and loud speaker (maybe can be easy to be modified as them) now.
As generally acknowledging here, when being used in the ATM environment, the advantage of sonic token is in the mode that stops ATM can forge personal information when not having secret keys the personal information on the token to be sent to ATM.ATM sends to Central Bank's computer to personal information simply and authenticates.Like this, the link of ATM and ATM and bank all need not safety and protects this authentication key element.But the present invention recognizes that also second authentication key element PIN still needs link safety.This is because PIN generally has only 4 to 6 Arabic numerals to form, the assailant can spy upon the link between ATM and the bank, if and communication allows the PIN of conjecture to be verified, the assailant just can test out about 1,000,000 possible PIN values and of remembeing to work simply, can steal token and can visit the account up to the assailant.Therefore, unfortunately, it is essential that the secure communication between bank and the ATM will remain.
Recognize top problem, the invention that here discloses is provided.
Summary of the invention
A kind of authentication method comprises at first to providing PIN and secret PKI such as the such authorization computer of banking computer, sets up communication link then between authorization computer and the such receiver such as ATM away from computer.It is safe that communication link is not limited to.Subsequently, user's acoustic signal can be received machine (for example ATM) and receive, the digital signature that on behalf of private key, signal produce, and receiver is converted to signature signal to acoustic signal.PIN by user for example with data input device that receiver is associated on key in such mode and also be received machine and receive, so PIN and acoustic signal are received dividually.Encrypt the signature signal that obtains an encryption with PIN to signature signal, then the latter is dealt into authorization computer and comes certifying signature to use PIN and secret PKI.
Signature signal is preferably encrypted with PIN by receiver.On the other hand, the most handy hand-held token of acoustic signal sends.The transaction of expectation can be input to receiver, and only after signature was verified, authorization computer just authorized receiver was carried out transaction.
By using PIN to give the ciphering signature decrypted signal to obtain signature signal, signature is verified by authorization computer.Then, the signature signal that is produced uses secret public key verifications.
In a preferred embodiment, token is by producing signature signal to message and private key combination.Described message can comprise at least a portion of timestamp, for example, and than the least significant bit that pre-determines quantity in the timestamp that pre-determines number and have multidigit more.
On the other hand, disclosed that a kind of to be used to be not limited to be the system of the two factor authentication on the safe link.Described system comprises the portable token that produces the wireless signal of representing digital signature message.Receiver receives wireless signal and PIN, and PIN and wireless signal separately receive.Receiver is encrypted the signature information that obtains encrypting with PIN to signature information.The signature information that authorization computer receive to be encrypted by link, and Access PIN and secret PKI are to attempt certifying signature message.
Also have on the other hand, Verification System comprises that Access PIN is with secret PKI and by link and at least one authorization computer of communicating by letter away from the receiver of this computer at least.It is safe that communication link is not limited to.System comprises the device that is used for receiving at receiver the wireless signal represent a digital signature, and described digital front produces by message and private key are combined.Receiver is converted to signature signal to wireless signal.Device in receiver also receives PIN.Generator is encrypted the signature signal of encrypting to produce with PIN to signature signal.The signature signal of encrypting is sent to authorization computer by link, so that use PIN and secret PKI to come certifying signature.
The present invention can better understand with reference to the accompanying drawings about the details of two aspects of its structure and operation.In whole accompanying drawing, identical label identifies corresponding parts.
The accompanying drawing summary
Fig. 1 is based on the block diagram of the system of the present invention of audio authentication; And
Fig. 2 is the flow chart of logic of the present invention.
Preferred embodiment describes in detail
With reference to Fig. 1, shown a system at first, referred generally to be decided to be 10, described system comprises the portable hand-held token 12 that can be configured to key chain or other mini-plant.But, as required, the present invention also can be applied to other token configuration, for example hand-held or portable resembling is placed in the mobile communication station on the vehicles (comprising automobile, truck, canoe, aircraft and train), comprises that kneetop computer, wireless phone or phone, data transceiver or paging and position determine receiver.Wireless Telecom Equipment is called " user " and " moving " also can being called user terminal, mobile radio station, mobile unit, subscriber unit, mobile radio or radio telephone, radio-cell sometimes or resembling in some communication systems simply.
Anyway, token 12 can both produce the acoustic signal that the machine that can be received 16 receives, and schematically shows with many lines 14.Receiver 16 and authorization computer 18 are associated.In illustrative embodiment, receiver 16 is ATM (ATM), authorization computer 18 is bank's master computers, but be appreciated that, receiver 16 can be a receiving equipment, described receiving equipment be associated such as building, family, the vehicles, or use the two factor authentication restriction that any other parts of the visit of authorized user in advance are associated with expectation.It is also understood that, preferred token 12 is sonic token that produce acoustic signal, principle of the present invention can be applied to other wireless signal and generate token, comprises those may use the next digital signature that discloses of electromagnetic wave wireless communication principles (for example such as bluetooth and infrared such radio frequency) below receiver 16 emissions token.
Preferred acoustic signal 14 can be represented the digital signature of the private key generation of using in the electronic data memory 20 that is stored in token 12.Pseudo random number (PN) generator 21 also can be included in the token 12.For simple announcement also can be stored in the there with corresponding secret PKI or secret PKI sign.
According to know in this area and the illustrated private/public key principle of (U.S.) National Institute of Standards and Tech (NIST) Federal Information Processing Standards publication 186-2. .2000 in January, signature algorithm in the token 12 (being carried out by the microprocessor in the token 12 22) receives at least a portion of private key and the message that will be signed as input (thereby and " combination "), add random number " k " from PN generator 21, to produce digital signature, promptly at random to (r, s).Microprocessor 22 is preferably in to be received and carries out signature algorithm from such as the activation signal of the so one or more active elements 24 of toggle switch, voice activation equipment or button the time immediately.Also preferably include in the signal that microprocessor 22 produces by the message of being signed with corresponding to the sign of the secret PKI of private key.Be appreciated that microprocessor 22 can comprise the digital processing unit of knowing in this area, necessary clock, analog to digital conversion circuit and D/A converting circuit.
Microphone or other acoustics receiving equipment 30 that preferred acoustic signal 14 is received in the machine 16 receive.Microphone 30 is the acoustic signal conversion sub-signature signal (if desired, also being accompanied by message before secret PKI ID and the initial signature) of wiring back, send to as required then can accesses data memory 34 microprocessor 32.If desired, also can in receiver 16, provide loud speaker 36, receive described signal by the microphone in the token 12 28 so that acoustic signal is sent back to token 12.
When receiver 16 is that ATM and authorization computer 18 are when being Central Bank's computer, authorization computer 18 can comprise a processor 38, and processor 38 accesses data memory 40 are optionally granted and authorized by the digital signature that receives from receiver 16 being verified (or not verifying).Data storage 40 can comprise the data structure as tabulation or database table, the secret PKI (with its ID) that the private key that described data structure storage and represented by signal is associated.In any case because the cryptographic novel usage that discloses below, it is safe that the link 41 of connection bank and ATM need not.
Fig. 2 has shown logic of the present invention.The secret PKI that is associated from square 42 and token 12 and the ID of PKI are provided for authorization computer 18 (for example, main banking computer) together.But also provide user's PIN.This provide process in person or by the safety attachment security finish." secret PKI " be meant with this area in the consistent PKI of private/public key principle known, can not visit publicly except secret PKI but only be provided for the such trusted entity of for example main banking computer.
Move on to square 44, when one of actuator-activated element 24 of user, signature algorithm in the token 12 receive private key, pseudo random number and such as all or part of such message of timestamp as input, to produce electronic signature, for example at random to (r, s).The user is input to receiver 16 to two key elements of authentication then.Especially, at square 46 places, digital signature with wireless mode (for example is, acoustically) and through the signature message together, if desired also and the ID of corresponding secret PKI together, be sent to receiver 16, at square 48 places, the numeric keypad input PIN that the user uses as provides on most ATM.Enter the transaction (as withdrawing deposit, transferring accounts or the like) of expectation at square 50 places.The step that is appreciated that square 46,48 and 50 can be carried out with any order.
According to the present invention, at square 52, receiver 16 usefulness PIN give signature, and (r s) encrypts.This encryption can be to use the symmetric cryptography such as the AES encryption principle.Encrypted signature with the secret PKI ID that does not encrypt and the preceding quilt of signature that not have the to encrypt message (for example, timestamp or its two least significant bits) of signing be sent to host computer processor 38 together.
At square 54, primary processor 38 is deciphered to digital signature with PIN earlier.Then, by using the message before secret PKI ID and the initial signature, processor is searched suitable secret PKI from data storage 40, and comes certifying signature according to the public/private keys principle of knowing in this area.If be proved to be successful, authorization computer 18 is just signaled receiver 16 and is allowed visit.Under the situation of ATM validator 16 and banking computer authorization computer 18, banking computer is signaled ATM and is carried out the transaction of being asked.
The assailant who is appreciated that the ATM-bank correspondence that may intercept on the link 41 now can not derive PIN.Especially, use " correct " PIN to the signature deciphering with use incorrect PIN that it is separated secret meeting to produce equal result: that just can not be understood during certifying signature is right at random, does not just have secret PKI and thing (several least significant bits of noting the only time stamp are sent out) that the data of being signed just can not be finished.This feature has been eliminated on the link 41 the last requirement to fail safe.
Specific " system and method for acoustic two factor authentication " that here at length show and describe can reach the above-described target of the present invention fully, be appreciated that, this is the present preferred embodiment of the present invention, it is the representative of the theme that extensively can conceive of the present invention, scope of the present invention comprises significantly other embodiment that may become to those skilled in the art fully, thereby, scope of the present invention is not subjected to any restriction except appended claims, the element of odd number indication in claims, be not to refer to " one and have only one " outside clearly stating unless, but " one or more ".All structural or functional equivalent specific reference of those of ordinary skill in the art having been known element in the above preferred embodiment that maybe will know, and are included in these claims as reference at this.In addition, the equipment or the method that needn't require the present invention to solve to be devoted to each problem are only because it is comprised in these claims.In addition, of the present invention is to offer to masses without any element, element or method step, does not state in claims clearly no matter this element, element or method step have.Here do not have the claim element to be interpreted as to be under 35 U.S.C § 112 the 6th joint regulation, unless this with " be used for ... device " clearly narration, or this is narrated with " step " rather than " action " under the situation of claim to a method.
Claims (30)
1. an authentication method comprises
PIN and secret PKI are provided at least for authorization computer;
Set up communication link between authorization computer and at least one receiver away from computer, it is safe that communication link is not limited to;
Receive the acoustic signal that at least one represents the signal of at least one private key generation at the receiver place, receiver is converted to signature signal to described acoustic signal;
Receive PIN at the receiver place, PIN and acoustic signal are separated to receive;
Signature signal is encrypted the signature signal of encrypting to produce with PIN; And
The signature signal of encrypting is sent to authorization computer to use PIN and secret public key verifications signature.
2. the method for claim 1 is characterized in that, encryption acts is finished at the receiver place.
3. the method for claim 1 is characterized in that, uses hand-held token to send described acoustic signal.
4. the method for claim 1 is characterized in that, also comprises the transaction of expectation is input to receiver, and only when signature was verified, authorization computer just authorized receiver was carried out transaction.
5. the method for claim 1 is characterized in that, signature is checking like this:
Give the signature signal deciphering of encrypting to obtain signature signal with PIN; Then
Use secret PKI to come the certifying signature signal.
6. method as claimed in claim 3 is characterized in that, described token produces signature signal by at least one message and private key are combined.
7. method as claimed in claim 6 is characterized in that described message comprises the part of at least one timestamp at least.
8. method as claimed in claim 7 is characterized in that, the part of described timestamp is than the least significant bit that pre-determines quantity in the timestamp that pre-determines number and have multidigit more.
One to be not limited to be two factor authentication system on the safe link, comprising:
At least one portable token, it produces at least one wireless signal of representing digital signature message;
At least one receiver, it receives wireless signal and PIN, and PIN and wireless signal are separated to receive, and receiver is encrypted signature information to obtain encrypting with PIN to signature information; And
At least one authorization computer, it receives the signature information of at least one encryption on link, and authorization computer Access PIN and secret PKI are to attempt certifying signature message;
10. system as claimed in claim 9 is characterized in that, described wireless signal is also represented the ID of secret PKI and at least corresponding to the message after the private key signature of PKI, to obtain the message of digital signature.
11. system as claimed in claim 10 is characterized in that, the message that described receiver sends ciphering signature message, ID and signed to authorization computer.
12. system as claimed in claim 10 is characterized in that, described authorization computer uses PIN to the ciphering signature decrypted signal, and by using ID and using secret PKI addressing machine Migong key to come certifying signature message.
13. a Verification System that comprises authorization computer, described authorization computer are visited at least one PIN and communicated by letter away from the receiver of computer with at least one with a secret PKI and by link, it is safe that communication link is not limited to, and described system comprises:
Receive the device of at least one representative from the wireless signal of at least one digital signature of private key generation at the receiver place, described receiver is converted to signature signal to wireless signal;
Be used for receiving the device of PIN at the receiver place; And
With PIN signature signal is encrypted producing the device of ciphering signature signal, described ciphering signature signal is sent to authorization computer by link so that use described PIN and secret PKI comes certifying signature.
14. system as claimed in claim 13 is characterized in that, the described device that is used for encrypting is at receiver.
15. system as claimed in claim 13 is characterized in that, also comprises the device that uses hand-held token to send wireless signal.
16. system as claimed in claim 13 is characterized in that, also comprises the device that the transaction of expectation is input to receiver, only when signature was verified, authorization computer just authorized receiver was carried out transaction.
17. system as claimed in claim 13 is characterized in that, comprising:
Use PIN to the device of ciphering signature decrypted signal with the generation signature signal; And
Use the device of secret public key verifications signature signal.
18. system as claimed in claim 15 is characterized in that, described token produces signature signal by at least one message and private key are combined.
19. system as claimed in claim 18 is characterized in that, described message comprises at least a portion of at least one timestamp.
20. system as claimed in claim 18 is characterized in that, described message also with the pseudo random number combination.
21. system as claimed in claim 13 is characterized in that, described wireless signal is an acoustic signal.
22. system as claimed in claim 9 is characterized in that, described wireless signal is an acoustic signal.
23. a computer readable medium comprises the program that the control computer system is carried out a kind of method, described method comprises:
Provide at least one PIN and a secret PKI to authorization computer;
Set up communication link between authorization computer and at least one receiver away from computer, it is safe that communication link is not limited to;
Receive the acoustic signal that at least one represents the signal of at least one private key generation at the receiver place, receiver is converted to signature signal to described acoustic signal;
Receive PIN at the receiver place, PIN and acoustic signal are separated to receive;
With PIN signature signal is encrypted to produce the ciphering signature signal; And
The ciphering signature signal is sent to authorization computer to use PIN and secret public key verifications signature.
24. computer readable medium as claimed in claim 23 is characterized in that, described encryption acts is finished at the receiver place.
25. computer readable medium as claimed in claim 23 is characterized in that, also comprises using hand-held token to send described acoustic signal.
26. computer readable medium as claimed in claim 23 is characterized in that, also comprises the transaction of expectation is input to receiver, only when signature was verified, authorization computer just authorized receiver was carried out transaction.
27. computer readable medium as claimed in claim 23 is characterized in that, signature is checking like this:
With PIN to the ciphering signature decrypted signal to produce signature signal; Then
Use the described signature signal of secret public key verifications.
28. computer readable medium as claimed in claim 25 is characterized in that, described token produces signature signal by at least one message and private key are combined.
29. computer readable medium as claimed in claim 28 is characterized in that, described message comprises at least a portion of at least one timestamp.
30. computer readable medium as claimed in claim 29 is characterized in that, the part of described timestamp is than the least significant bit that pre-determines quantity in the timestamp that pre-determines number and have multidigit more.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/077,365 US7251730B2 (en) | 2001-12-21 | 2002-02-15 | Method and apparatus for simplified audio authentication |
US10/077,365 | 2002-02-15 | ||
US10/139,873 | 2002-05-06 | ||
US10/139,873 US7966497B2 (en) | 2002-02-15 | 2002-05-06 | System and method for acoustic two factor authentication |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102822394A Division CN101944246A (en) | 2002-02-15 | 2003-02-12 | The system and method for acoustic two factor authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1650603A true CN1650603A (en) | 2005-08-03 |
Family
ID=27732633
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102822394A Pending CN101944246A (en) | 2002-02-15 | 2003-02-12 | The system and method for acoustic two factor authentication |
CNA038070316A Pending CN1650603A (en) | 2002-02-15 | 2003-02-12 | System and method for acoustic two factor authentication |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102822394A Pending CN101944246A (en) | 2002-02-15 | 2003-02-12 | The system and method for acoustic two factor authentication |
Country Status (16)
Country | Link |
---|---|
US (2) | US7966497B2 (en) |
EP (1) | EP1481535B1 (en) |
JP (1) | JP4565840B2 (en) |
CN (2) | CN101944246A (en) |
AT (1) | ATE462239T1 (en) |
AU (1) | AU2003219752B2 (en) |
BR (1) | BR0307657A (en) |
CA (1) | CA2476485A1 (en) |
CO (1) | CO5611229A2 (en) |
DE (1) | DE60331817D1 (en) |
IL (1) | IL163527A (en) |
MX (1) | MXPA04007869A (en) |
NZ (1) | NZ534700A (en) |
RU (1) | RU2313916C2 (en) |
TW (1) | TWI268688B (en) |
WO (1) | WO2003071770A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883350A (en) * | 2014-02-28 | 2015-09-02 | Ncr公司 | End-to-end device authentication |
Families Citing this family (67)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7487362B2 (en) * | 2002-02-15 | 2009-02-03 | Qualcomm, Inc. | Digital authentication over acoustic channel |
US7966497B2 (en) * | 2002-02-15 | 2011-06-21 | Qualcomm Incorporated | System and method for acoustic two factor authentication |
US7401224B2 (en) * | 2002-05-15 | 2008-07-15 | Qualcomm Incorporated | System and method for managing sonic token verifiers |
US7308703B2 (en) * | 2002-12-18 | 2007-12-11 | Novell, Inc. | Protection of data accessible by a mobile device |
US8100323B1 (en) * | 2002-12-26 | 2012-01-24 | Diebold Self-Service Systems Division Of Diebold, Incorporated | Apparatus and method for verifying components of an ATM |
JP2005204126A (en) * | 2004-01-16 | 2005-07-28 | Amano Corp | Electronic signature method and electronic signature device |
WO2005119608A1 (en) * | 2004-06-03 | 2005-12-15 | Tyfone, Inc. | System and method for securing financial transactions |
US7616764B2 (en) * | 2004-07-07 | 2009-11-10 | Oracle International Corporation | Online data encryption and decryption |
US7581678B2 (en) | 2005-02-22 | 2009-09-01 | Tyfone, Inc. | Electronic transaction card |
US8009644B2 (en) | 2005-12-01 | 2011-08-30 | Ruckus Wireless, Inc. | On-demand services by wireless base station virtualization |
US9769655B2 (en) | 2006-04-24 | 2017-09-19 | Ruckus Wireless, Inc. | Sharing security keys with headless devices |
US9071583B2 (en) | 2006-04-24 | 2015-06-30 | Ruckus Wireless, Inc. | Provisioned configuration for automatic wireless connection |
CN103441984B (en) | 2006-04-24 | 2017-09-05 | 鲁库斯无线公司 | Dynamic authentication in safety wireless network |
US8739278B2 (en) * | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
NZ547903A (en) * | 2006-06-14 | 2008-03-28 | Fronde Anywhere Ltd | A method of generating an authentication token and a method of authenticating an online transaction |
US9106422B2 (en) * | 2006-12-11 | 2015-08-11 | Oracle International Corporation | System and method for personalized security signature |
US7991158B2 (en) * | 2006-12-13 | 2011-08-02 | Tyfone, Inc. | Secure messaging |
US9741027B2 (en) | 2007-12-14 | 2017-08-22 | Tyfone, Inc. | Memory card based contactless devices |
US8451122B2 (en) | 2008-08-08 | 2013-05-28 | Tyfone, Inc. | Smartcard performance enhancement circuits and systems |
US7961101B2 (en) | 2008-08-08 | 2011-06-14 | Tyfone, Inc. | Small RFID card with integrated inductive element |
US12147863B2 (en) | 2008-08-08 | 2024-11-19 | Icashe, Inc. | Method and apparatus for transmitting data via NFC for mobile applications including mobile payments and ticketing |
US8904177B2 (en) * | 2009-01-27 | 2014-12-02 | Sony Corporation | Authentication for a multi-tier wireless home mesh network |
CA3184461A1 (en) | 2009-02-10 | 2010-09-02 | 4361423 Canada Inc. | Apparatus and method for commercial transactions using a communication device |
TWI420398B (en) | 2009-02-24 | 2013-12-21 | Tyfone Inc | Contactless device with miniaturized antenna |
EP2282297A1 (en) * | 2009-07-21 | 2011-02-09 | Openways Sas | Security system to control the opening of locking devices using encoded acoustic verifications |
US10713341B2 (en) * | 2011-07-13 | 2020-07-14 | Scott F. McNulty | System, method and apparatus for generating acoustic signals based on biometric information |
US9560035B2 (en) * | 2010-08-04 | 2017-01-31 | At&T Mobility Ii Llc | Systems, devices, methods and computer program products for establishing network connections between service providers and applications that run natively on devices |
US8917631B2 (en) * | 2010-08-23 | 2014-12-23 | Ortsbo Inc. | System and method for sharing information between two or more devices |
GB2546026B (en) * | 2010-10-01 | 2017-08-23 | Asio Ltd | Data communication system |
CN103477372A (en) * | 2011-04-18 | 2013-12-25 | 埃戈耐克塞斯有限公司 | Digital token generator, server for recording digital tokens and method for issuing digital tokens |
MY168381A (en) | 2011-05-01 | 2018-10-31 | Ruckus Wireless Inc | Remote cable access point reset |
US8756668B2 (en) | 2012-02-09 | 2014-06-17 | Ruckus Wireless, Inc. | Dynamic PSK for hotspots |
US8752156B1 (en) * | 2012-03-30 | 2014-06-10 | Emc Corporation | Detecting soft token copies |
US9092610B2 (en) | 2012-04-04 | 2015-07-28 | Ruckus Wireless, Inc. | Key assignment for a brand |
WO2013156076A1 (en) * | 2012-04-20 | 2013-10-24 | Payfair International Gmbh | Transfer connector |
US9184915B2 (en) * | 2012-08-30 | 2015-11-10 | Vasco Data Security, Inc. | Strong authentication token with acoustic data input over multiple carrier frequencies |
US9460590B2 (en) | 2012-09-24 | 2016-10-04 | Wal-Mart Stores, Inc. | Determination of customer proximity to a register through use of sound and methods thereof |
WO2014104284A1 (en) * | 2012-12-28 | 2014-07-03 | 楽天株式会社 | Ultrasonic-wave communication system |
WO2014135989A2 (en) * | 2013-03-06 | 2014-09-12 | Assa Abloy Ab | Localized pin management with reader verification and no disclosure |
US9742825B2 (en) * | 2013-03-13 | 2017-08-22 | Comcast Cable Communications, Llc | Systems and methods for configuring devices |
US9100395B2 (en) * | 2013-09-24 | 2015-08-04 | International Business Machines Corporation | Method and system for using a vibration signature as an authentication key |
US9450682B2 (en) | 2013-10-07 | 2016-09-20 | International Business Machines Corporation | Method and system using vibration signatures for pairing master and slave computing devices |
US9722984B2 (en) * | 2014-01-30 | 2017-08-01 | Netiq Corporation | Proximity-based authentication |
TWI563853B (en) * | 2014-02-27 | 2016-12-21 | Beseye Cloud Security Co Ltd | Surveillance system and the operation process thereof |
RU2737509C2 (en) * | 2014-04-07 | 2020-12-01 | Айверифай Инк. | User authentication biometric binding |
US10235512B2 (en) * | 2014-06-24 | 2019-03-19 | Paypal, Inc. | Systems and methods for authentication via bluetooth device |
US10652739B1 (en) | 2014-11-14 | 2020-05-12 | United Services Automobile Association (Usaa) | Methods and systems for transferring call context |
US9648164B1 (en) | 2014-11-14 | 2017-05-09 | United Services Automobile Association (“USAA”) | System and method for processing high frequency callers |
US9336092B1 (en) * | 2015-01-01 | 2016-05-10 | Emc Corporation | Secure data deduplication |
US9805344B1 (en) | 2015-01-23 | 2017-10-31 | Island Intellectual Property, Llc | Notification system and method |
TWI576823B (en) * | 2015-05-12 | 2017-04-01 | A sound transmission system for improving audio recognition rate and its data processing | |
US10509892B2 (en) * | 2016-07-10 | 2019-12-17 | B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University | Acoustic security code transmission |
US10409974B2 (en) * | 2016-10-01 | 2019-09-10 | Intel Corporation | Technologies for authorizing a user to a protected system |
GB201617408D0 (en) | 2016-10-13 | 2016-11-30 | Asio Ltd | A method and system for acoustic communication of data |
GB201617409D0 (en) | 2016-10-13 | 2016-11-30 | Asio Ltd | A method and system for acoustic communication of data |
GB201704636D0 (en) | 2017-03-23 | 2017-05-10 | Asio Ltd | A method and system for authenticating a device |
GB2565751B (en) | 2017-06-15 | 2022-05-04 | Sonos Experience Ltd | A method and system for triggering events |
GB2570634A (en) | 2017-12-20 | 2019-08-07 | Asio Ltd | A method and system for improved acoustic transmission of data |
US11436311B2 (en) * | 2018-05-22 | 2022-09-06 | Arizona Board Of Regents On Behalf Of Arizona State University | Method and apparatus for secure and usable mobile two-factor authentication |
KR102179085B1 (en) * | 2018-10-26 | 2020-11-16 | 주식회사 뮤즈라이브 | Non-contact based user authentification method |
US11295758B2 (en) | 2020-03-20 | 2022-04-05 | Seagate Technology Llc | Trusted listening |
US11988784B2 (en) | 2020-08-31 | 2024-05-21 | Sonos, Inc. | Detecting an audio signal with a microphone to determine presence of a playback device |
JP7254753B2 (en) | 2020-09-18 | 2023-04-10 | 株式会社東芝 | System and server equipment |
CN112506267B (en) * | 2020-12-01 | 2024-04-19 | 上海银基信息安全技术股份有限公司 | RTC calibration method, vehicle-mounted terminal, user and storage medium |
US11593807B2 (en) | 2021-03-22 | 2023-02-28 | Bank Of America Corporation | Information security system and method for multi-factor authentication for ATMS using authentication media |
US11640455B2 (en) | 2021-05-27 | 2023-05-02 | Bank Of America Corporation | Systems and methods for dynamic polychrome lattice image security |
US11876804B2 (en) * | 2021-07-21 | 2024-01-16 | Capital One Services, Llc | Systems and methods for providing access to a secure device |
Family Cites Families (104)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4305143A (en) | 1979-08-08 | 1981-12-08 | Simms Larry L | Automatic man overboard sensor and rescue system |
IL64675A0 (en) * | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
US4961142A (en) * | 1988-06-29 | 1990-10-02 | Mastercard International, Inc. | Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer |
FR2640835B1 (en) | 1988-12-07 | 1994-06-24 | France Etat | AUTHENTICATION DEVICE FOR INTERACTIVE SERVER |
JPH03214834A (en) | 1990-01-19 | 1991-09-20 | Canon Inc | Multi-medium network system |
US5196840A (en) * | 1990-11-05 | 1993-03-23 | International Business Machines Corporation | Secure communications system for remotely located computers |
US5200993A (en) | 1991-05-10 | 1993-04-06 | Bell Atlantic Network Services, Inc. | Public telephone network including a distributed imaging system |
US5561710A (en) | 1992-11-17 | 1996-10-01 | Helms; Ramon E. | Interactive voice communication terminal with alpha and numeric keypad |
US6408388B1 (en) * | 1993-05-05 | 2002-06-18 | Addison M. Fischer | Personal date/time notary device |
US5422953A (en) | 1993-05-05 | 1995-06-06 | Fischer; Addison M. | Personal date/time notary device |
US5450491A (en) | 1993-08-26 | 1995-09-12 | At&T Corp. | Authenticator card and system |
WO1995016238A1 (en) | 1993-12-06 | 1995-06-15 | Telequip Corporation | Secure computer memory card |
US5481611A (en) | 1993-12-09 | 1996-01-02 | Gte Laboratories Incorporated | Method and apparatus for entity authentication |
US5583933A (en) * | 1994-08-05 | 1996-12-10 | Mark; Andrew R. | Method and apparatus for the secure communication of data |
US6236724B1 (en) | 1994-10-04 | 2001-05-22 | Enco-Tone Ltd. | Methods and apparatus for encoding and decoding data transmitted over telephone lines |
US20010055320A1 (en) | 1994-12-15 | 2001-12-27 | Pierzga Wayne Francis | Multiplex communication |
CA2167631A1 (en) * | 1995-01-20 | 1996-07-21 | W. Dale Hopkins | Method and apparatus for user and security device authentication |
JPH08305662A (en) | 1995-05-02 | 1996-11-22 | Fujitsu Ltd | Client authentication system and method |
US5696879A (en) | 1995-05-31 | 1997-12-09 | International Business Machines Corporation | Method and apparatus for improved voice transmission |
US6505160B1 (en) | 1995-07-27 | 2003-01-07 | Digimarc Corporation | Connected audio and other media objects |
WO1997024857A1 (en) | 1995-12-29 | 1997-07-10 | Mci Communications Corporation | Security for calling card validation |
AU1615097A (en) | 1996-02-20 | 1997-09-10 | Sonic Systems | Digital sonic and ultrasonic communications networks |
CA2249463A1 (en) | 1996-03-22 | 1997-10-02 | Yves Audebert | System for controlling access to a function, using a plurality of dynamic encryption variables |
US5802176A (en) * | 1996-03-22 | 1998-09-01 | Activcard | System for controlling access to a function, using a plurality of dynamic encryption variables |
US6216231B1 (en) | 1996-04-30 | 2001-04-10 | At & T Corp. | Specifying security protocols and policy constraints in distributed systems |
DE19632025C2 (en) * | 1996-08-08 | 1998-07-23 | Daimler Benz Ag | Authentication device with electronic authentication communication |
FR2753860B1 (en) | 1996-09-25 | 1998-11-06 | METHOD AND SYSTEM FOR SECURING REMOTE SERVICES PROVIDED BY FINANCIAL ORGANIZATIONS | |
JPH10134157A (en) | 1996-10-28 | 1998-05-22 | Nippon Telegr & Teleph Corp <Ntt> | Method and device for cipher authenticating process utilizing computer card |
DE19647833B4 (en) | 1996-11-19 | 2005-07-07 | Deutsches Zentrum für Luft- und Raumfahrt e.V. | Method for simultaneous radio transmission of digital data between a plurality of subscriber stations and a base station |
SG64957A1 (en) | 1996-12-04 | 1999-05-25 | Inst Of Systems Science Nation | Microprocessor card payment system |
US6023676A (en) * | 1996-12-12 | 2000-02-08 | Dspc Israel, Ltd. | Keyword recognition system and method |
US6359923B1 (en) * | 1997-12-18 | 2002-03-19 | At&T Wireless Services, Inc. | Highly bandwidth efficient communications |
JP2957507B2 (en) | 1997-02-24 | 1999-10-04 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Small information processing equipment |
US6282522B1 (en) * | 1997-04-30 | 2001-08-28 | Visa International Service Association | Internet payment system using smart card |
US6018739A (en) * | 1997-05-15 | 2000-01-25 | Raytheon Company | Biometric personnel identification system |
US5953700A (en) | 1997-06-11 | 1999-09-14 | International Business Machines Corporation | Portable acoustic interface for remote access to automatic speech/speaker recognition server |
US6213391B1 (en) | 1997-09-10 | 2001-04-10 | William H. Lewis | Portable system for personal identification based upon distinctive characteristics of the user |
US6084967A (en) * | 1997-10-29 | 2000-07-04 | Motorola, Inc. | Radio telecommunication device and method of authenticating a user with a voice authentication token |
US6130859A (en) | 1997-12-01 | 2000-10-10 | Divecom Ltd. | Method and apparatus for carrying out high data rate and voice underwater communication |
IL122375A (en) | 1997-12-01 | 2001-05-20 | Divecom Ltd | Method and apparatus for carrying out high data rate underwater communication |
US7328350B2 (en) * | 2001-03-29 | 2008-02-05 | Arcot Systems, Inc. | Method and apparatus for secure cryptographic key generation, certification and use |
US6347122B1 (en) | 1998-01-13 | 2002-02-12 | Agere Systems Guardian Corp. | Optimal complement punctured convolutional codes for use in digital audio broadcasting and other applications |
US6389055B1 (en) | 1998-03-30 | 2002-05-14 | Lucent Technologies, Inc. | Integrating digital data with perceptible signals |
US6327314B1 (en) | 1998-04-01 | 2001-12-04 | At&T Corp. | Method and apparatus for channel estimation for multicarrier systems |
JPH11289324A (en) | 1998-04-03 | 1999-10-19 | Matsushita Electric Ind Co Ltd | Transmission / reception device and transmission / reception method |
JPH11316740A (en) | 1998-05-06 | 1999-11-16 | Meidensha Corp | One time password authentication system |
US6157820A (en) * | 1998-06-12 | 2000-12-05 | Ericsson Inc. | Pilot strength measurement and multipath delay searcher for CDMA receiver |
US6272176B1 (en) | 1998-07-16 | 2001-08-07 | Nielsen Media Research, Inc. | Broadcast encoding system and method |
DE19981652D2 (en) | 1998-08-21 | 2001-07-26 | Rudolf Bannasch | Process for the transmission of information and a suitable system for this |
US6594705B1 (en) | 1998-09-11 | 2003-07-15 | Lv Partners, L.P. | Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet |
US6607136B1 (en) | 1998-09-16 | 2003-08-19 | Beepcard Inc. | Physical presence digital authentication system |
AU5997299A (en) | 1998-10-02 | 2000-04-26 | Comsense Technologies Ltd. | Card for interaction with a computer |
US6460138B1 (en) * | 1998-10-05 | 2002-10-01 | Flashpoint Technology, Inc. | User authentication for portable electronic devices using asymmetrical cryptography |
US6275934B1 (en) | 1998-10-16 | 2001-08-14 | Soft Book Press, Inc. | Authentication for information exchange over a communication network |
RU2128856C1 (en) * | 1998-11-05 | 1999-04-10 | Закрытое акционерное общество "Оптическая техника и технология" | Method and device for production and keeping records of driving licenses |
US6463537B1 (en) | 1999-01-04 | 2002-10-08 | Codex Technologies, Inc. | Modified computer motherboard security and identification system |
EP1024626A1 (en) | 1999-01-27 | 2000-08-02 | International Business Machines Corporation | Method, apparatus, and communication system for exchange of information in pervasive environments |
JP3515408B2 (en) | 1999-02-15 | 2004-04-05 | 日本電信電話株式会社 | Time authentication device |
JP2000284689A (en) | 1999-04-01 | 2000-10-13 | Hitachi Ltd | Information storage method |
US6778828B1 (en) * | 1999-04-12 | 2004-08-17 | Lucent Technologies Inc. | Personal mobility registration system for registration of a user's identity in a telecommunications terminal |
RU2163745C2 (en) * | 1999-04-29 | 2001-02-27 | Щеглов Андрей Юрьевич | Protective system for virtual channel of corporate network using authentication router and built around shared communication network channels and switching facilities |
DE19923983B4 (en) | 1999-05-25 | 2005-03-17 | Siemens Ag | Method and arrangement for remote access control |
JP4519963B2 (en) | 1999-06-21 | 2010-08-04 | 富士通株式会社 | Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information |
US6376952B1 (en) | 1999-07-14 | 2002-04-23 | E. I. Du Pont De Nemours And Company | Bearing system for a rotating shaft |
US6553494B1 (en) * | 1999-07-21 | 2003-04-22 | Sensar, Inc. | Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document |
KR20020019581A (en) | 1999-08-03 | 2002-03-12 | 마이클 알. 쿠리 | System and method for secured data transmission within a wireless communication system |
WO2001011575A1 (en) | 1999-08-09 | 2001-02-15 | Wow Company S.A. | Portable certification device with acoustic coupling |
US6397368B1 (en) | 1999-12-06 | 2002-05-28 | Intellon Corporation | Forward error correction with channel adaptation |
IL133584A (en) * | 1999-12-19 | 2010-02-17 | Enco Tone Ltd | Method for the acoustic encodification of dynamic identification codes |
JP2001203688A (en) | 2000-01-24 | 2001-07-27 | Kyocera Corp | Voice communication terminal |
US20010039619A1 (en) * | 2000-02-03 | 2001-11-08 | Martine Lapere | Speaker verification interface for secure transactions |
AUPQ564400A0 (en) | 2000-02-16 | 2000-03-09 | Ong, Yong Kin (Michael) | Electronic credit card-ecc |
FI20000529L (en) | 2000-03-08 | 2001-09-09 | Nokia Mobile Phones Ltd | Method for entering a key code into an electronic device and electronic device |
JP2001265217A (en) | 2000-03-17 | 2001-09-28 | Cti Co Ltd | Device and method for monitoring alteration of digital contents, and recorded medium therefor |
CN1263324A (en) | 2000-03-20 | 2000-08-16 | 后健慈 | Fingerprint identification keyboard device and identification method thereof |
WO2001071590A1 (en) | 2000-03-22 | 2001-09-27 | Zetabits Inc. | Communication system |
JP2001309159A (en) | 2000-04-20 | 2001-11-02 | Hitachi Ltd | Recording device |
CA2416202A1 (en) | 2000-07-07 | 2002-01-17 | Qualcomm Incorporated | Method and apparatus for secure identity authentication with audible tones |
WO2002013444A2 (en) | 2000-08-04 | 2002-02-14 | First Data Corporation | Trusted authentication digital signature (tads) system |
JP2002064461A (en) | 2000-08-18 | 2002-02-28 | Mitsubishi Electric Corp | Communication device and method |
IL138109A (en) | 2000-08-27 | 2009-11-18 | Enco Tone Ltd | Method and devices for digitally signing files by means of a hand-held device |
US6343049B1 (en) | 2000-09-19 | 2002-01-29 | Kohji Toda | Ultrasonic transmitting and receiving system for digital communication |
US7093131B1 (en) | 2000-09-29 | 2006-08-15 | Seiko Epson Corporation | Information authenticating apparatus and authenticating station |
US6889209B1 (en) | 2000-11-03 | 2005-05-03 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
US6438367B1 (en) | 2000-11-09 | 2002-08-20 | Magis Networks, Inc. | Transmission security for wireless communications |
US20020095587A1 (en) | 2001-01-17 | 2002-07-18 | International Business Machines Corporation | Smart card with integrated biometric sensor |
US7162634B2 (en) | 2001-04-18 | 2007-01-09 | Thomson Licensing | Method for providing security on a powerline-modem network |
JP4174191B2 (en) | 2001-04-19 | 2008-10-29 | 日本電気株式会社 | Copyright protection system and method |
WO2002091653A1 (en) | 2001-05-08 | 2002-11-14 | Siemens Aktiengesellschaft | Method and device for transmitting data in a multi-carrier system comprising parallel concatenated coding and modulation |
US7010806B2 (en) * | 2001-05-18 | 2006-03-07 | Sun Microsystems, Inc. | Dynamic downloading of keyboard keycode data to a networked client |
US7493363B2 (en) * | 2001-09-19 | 2009-02-17 | Microsoft Corporation | Peer-to-peer group management and method for maintaining peer-to-peer graphs |
US7146500B2 (en) | 2001-11-14 | 2006-12-05 | Compass Technology Management, Inc. | System for obtaining signatures on a single authoritative copy of an electronic record |
US7251730B2 (en) | 2001-12-21 | 2007-07-31 | Qualcomm Incorporated | Method and apparatus for simplified audio authentication |
US7533735B2 (en) * | 2002-02-15 | 2009-05-19 | Qualcomm Corporation | Digital authentication over acoustic channel |
US7487362B2 (en) * | 2002-02-15 | 2009-02-03 | Qualcomm, Inc. | Digital authentication over acoustic channel |
US7966497B2 (en) | 2002-02-15 | 2011-06-21 | Qualcomm Incorporated | System and method for acoustic two factor authentication |
GB2386236A (en) * | 2002-03-05 | 2003-09-10 | Marconi Comm Ltd | Cashless transactions via a telecommunications network |
KR100687523B1 (en) * | 2002-04-16 | 2007-02-27 | 울트라 프로쯔보든자 일렉트론스키 나프라브 디.오.오. | Payment terminal device for payment data exchange |
US20030212549A1 (en) * | 2002-05-10 | 2003-11-13 | Jack Steentra | Wireless communication using sound |
US7401224B2 (en) * | 2002-05-15 | 2008-07-15 | Qualcomm Incorporated | System and method for managing sonic token verifiers |
US7349481B2 (en) * | 2002-07-01 | 2008-03-25 | Qualcomm Incorporated | Communication using audible tones |
US20110191253A1 (en) * | 2009-04-17 | 2011-08-04 | Geomonkey, Inc. | Use of mobile devices for communicating sound-based virtual transaction data |
SI23227A (en) | 2010-03-10 | 2011-05-31 | Margento R&D D.O.O. | Wireless mobile transaction system and procedure of carrying out transaction with mobile telephone |
US20110270764A1 (en) * | 2010-08-08 | 2011-11-03 | Ali Mizani Oskui | Method and a sytem for electronic transaction using point of sales (pos) device |
-
2002
- 2002-05-06 US US10/139,873 patent/US7966497B2/en active Active
-
2003
- 2003-02-12 AU AU2003219752A patent/AU2003219752B2/en not_active Ceased
- 2003-02-12 CN CN2010102822394A patent/CN101944246A/en active Pending
- 2003-02-12 WO PCT/US2003/004387 patent/WO2003071770A1/en active IP Right Grant
- 2003-02-12 CN CNA038070316A patent/CN1650603A/en active Pending
- 2003-02-12 AT AT03716025T patent/ATE462239T1/en not_active IP Right Cessation
- 2003-02-12 NZ NZ534700A patent/NZ534700A/en not_active IP Right Cessation
- 2003-02-12 JP JP2003570546A patent/JP4565840B2/en not_active Expired - Fee Related
- 2003-02-12 BR BR0307657-1A patent/BR0307657A/en not_active IP Right Cessation
- 2003-02-12 EP EP03716025A patent/EP1481535B1/en not_active Expired - Lifetime
- 2003-02-12 DE DE60331817T patent/DE60331817D1/en not_active Expired - Lifetime
- 2003-02-12 CA CA002476485A patent/CA2476485A1/en not_active Abandoned
- 2003-02-12 RU RU2004127588/09A patent/RU2313916C2/en not_active IP Right Cessation
- 2003-02-12 MX MXPA04007869A patent/MXPA04007869A/en active IP Right Grant
- 2003-02-14 TW TW092103106A patent/TWI268688B/en not_active IP Right Cessation
-
2004
- 2004-08-12 IL IL163527A patent/IL163527A/en not_active IP Right Cessation
- 2004-09-13 CO CO04090727A patent/CO5611229A2/en not_active Application Discontinuation
-
2009
- 2009-02-03 US US12/365,126 patent/US8391480B2/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104883350A (en) * | 2014-02-28 | 2015-09-02 | Ncr公司 | End-to-end device authentication |
Also Published As
Publication number | Publication date |
---|---|
CO5611229A2 (en) | 2006-02-28 |
EP1481535A4 (en) | 2006-07-26 |
AU2003219752A1 (en) | 2003-09-09 |
US8391480B2 (en) | 2013-03-05 |
RU2004127588A (en) | 2006-01-27 |
ATE462239T1 (en) | 2010-04-15 |
JP2005518721A (en) | 2005-06-23 |
DE60331817D1 (en) | 2010-05-06 |
MXPA04007869A (en) | 2004-11-26 |
RU2313916C2 (en) | 2007-12-27 |
WO2003071770A1 (en) | 2003-08-28 |
AU2003219752B2 (en) | 2008-05-22 |
BR0307657A (en) | 2005-04-26 |
TW200307438A (en) | 2003-12-01 |
CA2476485A1 (en) | 2003-08-28 |
US20030159050A1 (en) | 2003-08-21 |
CN101944246A (en) | 2011-01-12 |
NZ534700A (en) | 2005-03-24 |
TWI268688B (en) | 2006-12-11 |
US7966497B2 (en) | 2011-06-21 |
IL163527A (en) | 2010-04-29 |
US20090141890A1 (en) | 2009-06-04 |
EP1481535A1 (en) | 2004-12-01 |
EP1481535B1 (en) | 2010-03-24 |
JP4565840B2 (en) | 2010-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1650603A (en) | System and method for acoustic two factor authentication | |
JP2005518721A5 (en) | ||
US7565297B2 (en) | Method and apparatus for the secure identification of the owner of a portable device | |
JP4680505B2 (en) | Simple voice authentication method and apparatus | |
US9378518B2 (en) | Electronic signature security system | |
US6119227A (en) | Methods and apparatus for authenticating an originator of a message | |
US20050091492A1 (en) | Portable security transaction protocol | |
JPH0451864B2 (en) | ||
JP2000357156A (en) | System and method for authentication sheet distribution | |
JP2002300155A (en) | Mutual authentication method and mutual authentication system | |
CN113793149A (en) | Off-line transaction authentication system and method, central server and client | |
JP3889660B2 (en) | Authentication method and authentication system | |
CN1480871A (en) | Method of digit identity authentication based on features of non-biophysics | |
JPH02247790A (en) | Ic card apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1078405 Country of ref document: HK |
|
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20050803 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1078405 Country of ref document: HK |