CN1650603A - System and method for acoustic two factor authentication - Google Patents

System and method for acoustic two factor authentication Download PDF

Info

Publication number
CN1650603A
CN1650603A CNA038070316A CN03807031A CN1650603A CN 1650603 A CN1650603 A CN 1650603A CN A038070316 A CNA038070316 A CN A038070316A CN 03807031 A CN03807031 A CN 03807031A CN 1650603 A CN1650603 A CN 1650603A
Authority
CN
China
Prior art keywords
signature
signal
pin
receiver
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA038070316A
Other languages
Chinese (zh)
Inventor
A·甘特曼
G·G·罗斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/077,365 external-priority patent/US7251730B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of CN1650603A publication Critical patent/CN1650603A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3272Short range or proximity payments by means of M-devices using an audio code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/346Cards serving only as information carrier of service
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F19/00Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
    • G07F19/20Automatic teller machines [ATMs]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)
  • Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A hand-held token can be operated to generate an acoustic or other wireless signal representing a digital signature produced from the private key of a public key pair (44), with the public key being confidential in that it is known only to authorized entities, such as bank computers. The signal from the token can be received by, e.g., a receiver at a bank ATM (46) that also requires a PIN for account access. The user enters the PIN into the ATM (48), and the ATM (52) encrypts the signal from the token with the PIN and sends it on to the bank computer (54) over a link that need not be secure, since even if the PIN is guessed there is no way to verify that it is the correct PIN without also knowing the confidential public key held by the bank computer.

Description

The system and method for acoustic two factor authentication
Relevant application
The application is the U.S. Patent application of submitting on February 15th, 2002 the 10/077th, No. 365 denominations of invention are the continuation application of " Method and Apparatus for Simplified Audio Authentication (method and apparatus of the audio authentication of simplification) " this patent application of awaiting the reply jointly, and this patent application is incorporated into this by reference.
I. invention field
The present invention relates generally to use the authentication of audio tones.
II. background of invention
Along with the growth that the internet uses, the convenient type ecommerce of many types has become possibility, is connected to ATM (ATM) of remote bank or the like such as on-line purchase commodity and service, online bank and use.But the convenience of ecommerce also makes the burglar steal valuable information and/or disguises oneself as and do not want to buy commodity and do not want to be more prone to from the people of bank account drawing or the like just.
Therefore, in electronic transaction, provide safety most important.For this reason, the encrypted personal information that is exchanged of hiding of many electronic transactions.But encrypt a just aspect of safety, because the burglar may crack encryption method or and then hold the transaction of encrypting such as the effective article of this class of credit card, the owner and participating in of disguising oneself as.
Notice this point, just understanding authentication easily is a safe importance.At electronic commerce context, the individual of authentication attempt finishes by computer interface.Therefore, if the infrastructure of bio-sensing type computer annex generally is not installed, take to check individual biological property to verify that this people is that he claims that the people that he is is not practical usually so.
This can use two authentication key elements, that is, and and based on people of item authentication such as credit card or key chain that the individual had, or based on people of the authentication of the things such as password or PIN(Personal Identification Number) known to the individual.To some responsive especially application such as ATM withdrawal, perhaps two kinds of key elements all need.
At present, ATM user inserts ATM to the authenticating device such as credit card, imports PIN then.This method has been finished two factor authentication.But ATM must send to secret information on the card and PIN both Central Bank's computer and authenticates.Therefore, the link between bank and the ATM must safety, with prevent the burglar eavesdrop on the line and find to authenticate key element both, described authentication key element makes the burglar steal money from user account.This brings great burden for the link basis facility.
The patent application of pointing out has above disclosed hand-held " token " based on sound wave, the individual can operate the acoustic signal that it comes to send to the equipment that is called " authenticator ", " validator " or " receiver " the expression secret information, so that based on this people of this signal authentication.Generally acknowledging in those applications, is to have existed the huge mounted infrastructure that is used to receive and send speech and derives from the electronic signal of speech based on the advantage of the token of sound wave.Specifically, existed global telephone system to send the data of representing acoustic information, also have, except phone, the many computing equipments that connected by this same system (being included in the internet) all have microphone and loud speaker (maybe can be easy to be modified as them) now.
As generally acknowledging here, when being used in the ATM environment, the advantage of sonic token is in the mode that stops ATM can forge personal information when not having secret keys the personal information on the token to be sent to ATM.ATM sends to Central Bank's computer to personal information simply and authenticates.Like this, the link of ATM and ATM and bank all need not safety and protects this authentication key element.But the present invention recognizes that also second authentication key element PIN still needs link safety.This is because PIN generally has only 4 to 6 Arabic numerals to form, the assailant can spy upon the link between ATM and the bank, if and communication allows the PIN of conjecture to be verified, the assailant just can test out about 1,000,000 possible PIN values and of remembeing to work simply, can steal token and can visit the account up to the assailant.Therefore, unfortunately, it is essential that the secure communication between bank and the ATM will remain.
Recognize top problem, the invention that here discloses is provided.
Summary of the invention
A kind of authentication method comprises at first to providing PIN and secret PKI such as the such authorization computer of banking computer, sets up communication link then between authorization computer and the such receiver such as ATM away from computer.It is safe that communication link is not limited to.Subsequently, user's acoustic signal can be received machine (for example ATM) and receive, the digital signature that on behalf of private key, signal produce, and receiver is converted to signature signal to acoustic signal.PIN by user for example with data input device that receiver is associated on key in such mode and also be received machine and receive, so PIN and acoustic signal are received dividually.Encrypt the signature signal that obtains an encryption with PIN to signature signal, then the latter is dealt into authorization computer and comes certifying signature to use PIN and secret PKI.
Signature signal is preferably encrypted with PIN by receiver.On the other hand, the most handy hand-held token of acoustic signal sends.The transaction of expectation can be input to receiver, and only after signature was verified, authorization computer just authorized receiver was carried out transaction.
By using PIN to give the ciphering signature decrypted signal to obtain signature signal, signature is verified by authorization computer.Then, the signature signal that is produced uses secret public key verifications.
In a preferred embodiment, token is by producing signature signal to message and private key combination.Described message can comprise at least a portion of timestamp, for example, and than the least significant bit that pre-determines quantity in the timestamp that pre-determines number and have multidigit more.
On the other hand, disclosed that a kind of to be used to be not limited to be the system of the two factor authentication on the safe link.Described system comprises the portable token that produces the wireless signal of representing digital signature message.Receiver receives wireless signal and PIN, and PIN and wireless signal separately receive.Receiver is encrypted the signature information that obtains encrypting with PIN to signature information.The signature information that authorization computer receive to be encrypted by link, and Access PIN and secret PKI are to attempt certifying signature message.
Also have on the other hand, Verification System comprises that Access PIN is with secret PKI and by link and at least one authorization computer of communicating by letter away from the receiver of this computer at least.It is safe that communication link is not limited to.System comprises the device that is used for receiving at receiver the wireless signal represent a digital signature, and described digital front produces by message and private key are combined.Receiver is converted to signature signal to wireless signal.Device in receiver also receives PIN.Generator is encrypted the signature signal of encrypting to produce with PIN to signature signal.The signature signal of encrypting is sent to authorization computer by link, so that use PIN and secret PKI to come certifying signature.
The present invention can better understand with reference to the accompanying drawings about the details of two aspects of its structure and operation.In whole accompanying drawing, identical label identifies corresponding parts.
The accompanying drawing summary
Fig. 1 is based on the block diagram of the system of the present invention of audio authentication; And
Fig. 2 is the flow chart of logic of the present invention.
Preferred embodiment describes in detail
With reference to Fig. 1, shown a system at first, referred generally to be decided to be 10, described system comprises the portable hand-held token 12 that can be configured to key chain or other mini-plant.But, as required, the present invention also can be applied to other token configuration, for example hand-held or portable resembling is placed in the mobile communication station on the vehicles (comprising automobile, truck, canoe, aircraft and train), comprises that kneetop computer, wireless phone or phone, data transceiver or paging and position determine receiver.Wireless Telecom Equipment is called " user " and " moving " also can being called user terminal, mobile radio station, mobile unit, subscriber unit, mobile radio or radio telephone, radio-cell sometimes or resembling in some communication systems simply.
Anyway, token 12 can both produce the acoustic signal that the machine that can be received 16 receives, and schematically shows with many lines 14.Receiver 16 and authorization computer 18 are associated.In illustrative embodiment, receiver 16 is ATM (ATM), authorization computer 18 is bank's master computers, but be appreciated that, receiver 16 can be a receiving equipment, described receiving equipment be associated such as building, family, the vehicles, or use the two factor authentication restriction that any other parts of the visit of authorized user in advance are associated with expectation.It is also understood that, preferred token 12 is sonic token that produce acoustic signal, principle of the present invention can be applied to other wireless signal and generate token, comprises those may use the next digital signature that discloses of electromagnetic wave wireless communication principles (for example such as bluetooth and infrared such radio frequency) below receiver 16 emissions token.
Preferred acoustic signal 14 can be represented the digital signature of the private key generation of using in the electronic data memory 20 that is stored in token 12.Pseudo random number (PN) generator 21 also can be included in the token 12.For simple announcement also can be stored in the there with corresponding secret PKI or secret PKI sign.
According to know in this area and the illustrated private/public key principle of (U.S.) National Institute of Standards and Tech (NIST) Federal Information Processing Standards publication 186-2. .2000 in January, signature algorithm in the token 12 (being carried out by the microprocessor in the token 12 22) receives at least a portion of private key and the message that will be signed as input (thereby and " combination "), add random number " k " from PN generator 21, to produce digital signature, promptly at random to (r, s).Microprocessor 22 is preferably in to be received and carries out signature algorithm from such as the activation signal of the so one or more active elements 24 of toggle switch, voice activation equipment or button the time immediately.Also preferably include in the signal that microprocessor 22 produces by the message of being signed with corresponding to the sign of the secret PKI of private key.Be appreciated that microprocessor 22 can comprise the digital processing unit of knowing in this area, necessary clock, analog to digital conversion circuit and D/A converting circuit.
Microprocessor 22 accesses data memory 20 make that one or more active element can be associated with the respective private keys in the memory 22 when using a plurality of active element 24.The electronic signature signal is sent to audio tweeter 26 so that an electronic signature conversion of signals is an acoustic signal 14.Acoustic signal can be audible, also can be inaudible.If desired, also can provide microphone 28 to receive acoustic signal in token 12 and they are converted to electronic signal, described electronic signal be sent to microprocessor 22 and handles.When using the electromagnetic wave wireless principles, loud speaker 26 is substituted, and is for example replaced by radio frequency sending set or infrared transmitter.
Microphone or other acoustics receiving equipment 30 that preferred acoustic signal 14 is received in the machine 16 receive.Microphone 30 is the acoustic signal conversion sub-signature signal (if desired, also being accompanied by message before secret PKI ID and the initial signature) of wiring back, send to as required then can accesses data memory 34 microprocessor 32.If desired, also can in receiver 16, provide loud speaker 36, receive described signal by the microphone in the token 12 28 so that acoustic signal is sent back to token 12.
When receiver 16 is that ATM and authorization computer 18 are when being Central Bank's computer, authorization computer 18 can comprise a processor 38, and processor 38 accesses data memory 40 are optionally granted and authorized by the digital signature that receives from receiver 16 being verified (or not verifying).Data storage 40 can comprise the data structure as tabulation or database table, the secret PKI (with its ID) that the private key that described data structure storage and represented by signal is associated.In any case because the cryptographic novel usage that discloses below, it is safe that the link 41 of connection bank and ATM need not.
Fig. 2 has shown logic of the present invention.The secret PKI that is associated from square 42 and token 12 and the ID of PKI are provided for authorization computer 18 (for example, main banking computer) together.But also provide user's PIN.This provide process in person or by the safety attachment security finish." secret PKI " be meant with this area in the consistent PKI of private/public key principle known, can not visit publicly except secret PKI but only be provided for the such trusted entity of for example main banking computer.
Move on to square 44, when one of actuator-activated element 24 of user, signature algorithm in the token 12 receive private key, pseudo random number and such as all or part of such message of timestamp as input, to produce electronic signature, for example at random to (r, s).The user is input to receiver 16 to two key elements of authentication then.Especially, at square 46 places, digital signature with wireless mode (for example is, acoustically) and through the signature message together, if desired also and the ID of corresponding secret PKI together, be sent to receiver 16, at square 48 places, the numeric keypad input PIN that the user uses as provides on most ATM.Enter the transaction (as withdrawing deposit, transferring accounts or the like) of expectation at square 50 places.The step that is appreciated that square 46,48 and 50 can be carried out with any order.
According to the present invention, at square 52, receiver 16 usefulness PIN give signature, and (r s) encrypts.This encryption can be to use the symmetric cryptography such as the AES encryption principle.Encrypted signature with the secret PKI ID that does not encrypt and the preceding quilt of signature that not have the to encrypt message (for example, timestamp or its two least significant bits) of signing be sent to host computer processor 38 together.
At square 54, primary processor 38 is deciphered to digital signature with PIN earlier.Then, by using the message before secret PKI ID and the initial signature, processor is searched suitable secret PKI from data storage 40, and comes certifying signature according to the public/private keys principle of knowing in this area.If be proved to be successful, authorization computer 18 is just signaled receiver 16 and is allowed visit.Under the situation of ATM validator 16 and banking computer authorization computer 18, banking computer is signaled ATM and is carried out the transaction of being asked.
The assailant who is appreciated that the ATM-bank correspondence that may intercept on the link 41 now can not derive PIN.Especially, use " correct " PIN to the signature deciphering with use incorrect PIN that it is separated secret meeting to produce equal result: that just can not be understood during certifying signature is right at random, does not just have secret PKI and thing (several least significant bits of noting the only time stamp are sent out) that the data of being signed just can not be finished.This feature has been eliminated on the link 41 the last requirement to fail safe.
Specific " system and method for acoustic two factor authentication " that here at length show and describe can reach the above-described target of the present invention fully, be appreciated that, this is the present preferred embodiment of the present invention, it is the representative of the theme that extensively can conceive of the present invention, scope of the present invention comprises significantly other embodiment that may become to those skilled in the art fully, thereby, scope of the present invention is not subjected to any restriction except appended claims, the element of odd number indication in claims, be not to refer to " one and have only one " outside clearly stating unless, but " one or more ".All structural or functional equivalent specific reference of those of ordinary skill in the art having been known element in the above preferred embodiment that maybe will know, and are included in these claims as reference at this.In addition, the equipment or the method that needn't require the present invention to solve to be devoted to each problem are only because it is comprised in these claims.In addition, of the present invention is to offer to masses without any element, element or method step, does not state in claims clearly no matter this element, element or method step have.Here do not have the claim element to be interpreted as to be under 35 U.S.C § 112 the 6th joint regulation, unless this with " be used for ... device " clearly narration, or this is narrated with " step " rather than " action " under the situation of claim to a method.

Claims (30)

1. an authentication method comprises
PIN and secret PKI are provided at least for authorization computer;
Set up communication link between authorization computer and at least one receiver away from computer, it is safe that communication link is not limited to;
Receive the acoustic signal that at least one represents the signal of at least one private key generation at the receiver place, receiver is converted to signature signal to described acoustic signal;
Receive PIN at the receiver place, PIN and acoustic signal are separated to receive;
Signature signal is encrypted the signature signal of encrypting to produce with PIN; And
The signature signal of encrypting is sent to authorization computer to use PIN and secret public key verifications signature.
2. the method for claim 1 is characterized in that, encryption acts is finished at the receiver place.
3. the method for claim 1 is characterized in that, uses hand-held token to send described acoustic signal.
4. the method for claim 1 is characterized in that, also comprises the transaction of expectation is input to receiver, and only when signature was verified, authorization computer just authorized receiver was carried out transaction.
5. the method for claim 1 is characterized in that, signature is checking like this:
Give the signature signal deciphering of encrypting to obtain signature signal with PIN; Then
Use secret PKI to come the certifying signature signal.
6. method as claimed in claim 3 is characterized in that, described token produces signature signal by at least one message and private key are combined.
7. method as claimed in claim 6 is characterized in that described message comprises the part of at least one timestamp at least.
8. method as claimed in claim 7 is characterized in that, the part of described timestamp is than the least significant bit that pre-determines quantity in the timestamp that pre-determines number and have multidigit more.
One to be not limited to be two factor authentication system on the safe link, comprising:
At least one portable token, it produces at least one wireless signal of representing digital signature message;
At least one receiver, it receives wireless signal and PIN, and PIN and wireless signal are separated to receive, and receiver is encrypted signature information to obtain encrypting with PIN to signature information; And
At least one authorization computer, it receives the signature information of at least one encryption on link, and authorization computer Access PIN and secret PKI are to attempt certifying signature message;
10. system as claimed in claim 9 is characterized in that, described wireless signal is also represented the ID of secret PKI and at least corresponding to the message after the private key signature of PKI, to obtain the message of digital signature.
11. system as claimed in claim 10 is characterized in that, the message that described receiver sends ciphering signature message, ID and signed to authorization computer.
12. system as claimed in claim 10 is characterized in that, described authorization computer uses PIN to the ciphering signature decrypted signal, and by using ID and using secret PKI addressing machine Migong key to come certifying signature message.
13. a Verification System that comprises authorization computer, described authorization computer are visited at least one PIN and communicated by letter away from the receiver of computer with at least one with a secret PKI and by link, it is safe that communication link is not limited to, and described system comprises:
Receive the device of at least one representative from the wireless signal of at least one digital signature of private key generation at the receiver place, described receiver is converted to signature signal to wireless signal;
Be used for receiving the device of PIN at the receiver place; And
With PIN signature signal is encrypted producing the device of ciphering signature signal, described ciphering signature signal is sent to authorization computer by link so that use described PIN and secret PKI comes certifying signature.
14. system as claimed in claim 13 is characterized in that, the described device that is used for encrypting is at receiver.
15. system as claimed in claim 13 is characterized in that, also comprises the device that uses hand-held token to send wireless signal.
16. system as claimed in claim 13 is characterized in that, also comprises the device that the transaction of expectation is input to receiver, only when signature was verified, authorization computer just authorized receiver was carried out transaction.
17. system as claimed in claim 13 is characterized in that, comprising:
Use PIN to the device of ciphering signature decrypted signal with the generation signature signal; And
Use the device of secret public key verifications signature signal.
18. system as claimed in claim 15 is characterized in that, described token produces signature signal by at least one message and private key are combined.
19. system as claimed in claim 18 is characterized in that, described message comprises at least a portion of at least one timestamp.
20. system as claimed in claim 18 is characterized in that, described message also with the pseudo random number combination.
21. system as claimed in claim 13 is characterized in that, described wireless signal is an acoustic signal.
22. system as claimed in claim 9 is characterized in that, described wireless signal is an acoustic signal.
23. a computer readable medium comprises the program that the control computer system is carried out a kind of method, described method comprises:
Provide at least one PIN and a secret PKI to authorization computer;
Set up communication link between authorization computer and at least one receiver away from computer, it is safe that communication link is not limited to;
Receive the acoustic signal that at least one represents the signal of at least one private key generation at the receiver place, receiver is converted to signature signal to described acoustic signal;
Receive PIN at the receiver place, PIN and acoustic signal are separated to receive;
With PIN signature signal is encrypted to produce the ciphering signature signal; And
The ciphering signature signal is sent to authorization computer to use PIN and secret public key verifications signature.
24. computer readable medium as claimed in claim 23 is characterized in that, described encryption acts is finished at the receiver place.
25. computer readable medium as claimed in claim 23 is characterized in that, also comprises using hand-held token to send described acoustic signal.
26. computer readable medium as claimed in claim 23 is characterized in that, also comprises the transaction of expectation is input to receiver, only when signature was verified, authorization computer just authorized receiver was carried out transaction.
27. computer readable medium as claimed in claim 23 is characterized in that, signature is checking like this:
With PIN to the ciphering signature decrypted signal to produce signature signal; Then
Use the described signature signal of secret public key verifications.
28. computer readable medium as claimed in claim 25 is characterized in that, described token produces signature signal by at least one message and private key are combined.
29. computer readable medium as claimed in claim 28 is characterized in that, described message comprises at least a portion of at least one timestamp.
30. computer readable medium as claimed in claim 29 is characterized in that, the part of described timestamp is than the least significant bit that pre-determines quantity in the timestamp that pre-determines number and have multidigit more.
CNA038070316A 2002-02-15 2003-02-12 System and method for acoustic two factor authentication Pending CN1650603A (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US10/077,365 US7251730B2 (en) 2001-12-21 2002-02-15 Method and apparatus for simplified audio authentication
US10/077,365 2002-02-15
US10/139,873 2002-05-06
US10/139,873 US7966497B2 (en) 2002-02-15 2002-05-06 System and method for acoustic two factor authentication

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN2010102822394A Division CN101944246A (en) 2002-02-15 2003-02-12 The system and method for acoustic two factor authentication

Publications (1)

Publication Number Publication Date
CN1650603A true CN1650603A (en) 2005-08-03

Family

ID=27732633

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2010102822394A Pending CN101944246A (en) 2002-02-15 2003-02-12 The system and method for acoustic two factor authentication
CNA038070316A Pending CN1650603A (en) 2002-02-15 2003-02-12 System and method for acoustic two factor authentication

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN2010102822394A Pending CN101944246A (en) 2002-02-15 2003-02-12 The system and method for acoustic two factor authentication

Country Status (16)

Country Link
US (2) US7966497B2 (en)
EP (1) EP1481535B1 (en)
JP (1) JP4565840B2 (en)
CN (2) CN101944246A (en)
AT (1) ATE462239T1 (en)
AU (1) AU2003219752B2 (en)
BR (1) BR0307657A (en)
CA (1) CA2476485A1 (en)
CO (1) CO5611229A2 (en)
DE (1) DE60331817D1 (en)
IL (1) IL163527A (en)
MX (1) MXPA04007869A (en)
NZ (1) NZ534700A (en)
RU (1) RU2313916C2 (en)
TW (1) TWI268688B (en)
WO (1) WO2003071770A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883350A (en) * 2014-02-28 2015-09-02 Ncr公司 End-to-end device authentication

Families Citing this family (67)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7487362B2 (en) * 2002-02-15 2009-02-03 Qualcomm, Inc. Digital authentication over acoustic channel
US7966497B2 (en) * 2002-02-15 2011-06-21 Qualcomm Incorporated System and method for acoustic two factor authentication
US7401224B2 (en) * 2002-05-15 2008-07-15 Qualcomm Incorporated System and method for managing sonic token verifiers
US7308703B2 (en) * 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
US8100323B1 (en) * 2002-12-26 2012-01-24 Diebold Self-Service Systems Division Of Diebold, Incorporated Apparatus and method for verifying components of an ATM
JP2005204126A (en) * 2004-01-16 2005-07-28 Amano Corp Electronic signature method and electronic signature device
WO2005119608A1 (en) * 2004-06-03 2005-12-15 Tyfone, Inc. System and method for securing financial transactions
US7616764B2 (en) * 2004-07-07 2009-11-10 Oracle International Corporation Online data encryption and decryption
US7581678B2 (en) 2005-02-22 2009-09-01 Tyfone, Inc. Electronic transaction card
US8009644B2 (en) 2005-12-01 2011-08-30 Ruckus Wireless, Inc. On-demand services by wireless base station virtualization
US9769655B2 (en) 2006-04-24 2017-09-19 Ruckus Wireless, Inc. Sharing security keys with headless devices
US9071583B2 (en) 2006-04-24 2015-06-30 Ruckus Wireless, Inc. Provisioned configuration for automatic wireless connection
CN103441984B (en) 2006-04-24 2017-09-05 鲁库斯无线公司 Dynamic authentication in safety wireless network
US8739278B2 (en) * 2006-04-28 2014-05-27 Oracle International Corporation Techniques for fraud monitoring and detection using application fingerprinting
NZ547903A (en) * 2006-06-14 2008-03-28 Fronde Anywhere Ltd A method of generating an authentication token and a method of authenticating an online transaction
US9106422B2 (en) * 2006-12-11 2015-08-11 Oracle International Corporation System and method for personalized security signature
US7991158B2 (en) * 2006-12-13 2011-08-02 Tyfone, Inc. Secure messaging
US9741027B2 (en) 2007-12-14 2017-08-22 Tyfone, Inc. Memory card based contactless devices
US8451122B2 (en) 2008-08-08 2013-05-28 Tyfone, Inc. Smartcard performance enhancement circuits and systems
US7961101B2 (en) 2008-08-08 2011-06-14 Tyfone, Inc. Small RFID card with integrated inductive element
US12147863B2 (en) 2008-08-08 2024-11-19 Icashe, Inc. Method and apparatus for transmitting data via NFC for mobile applications including mobile payments and ticketing
US8904177B2 (en) * 2009-01-27 2014-12-02 Sony Corporation Authentication for a multi-tier wireless home mesh network
CA3184461A1 (en) 2009-02-10 2010-09-02 4361423 Canada Inc. Apparatus and method for commercial transactions using a communication device
TWI420398B (en) 2009-02-24 2013-12-21 Tyfone Inc Contactless device with miniaturized antenna
EP2282297A1 (en) * 2009-07-21 2011-02-09 Openways Sas Security system to control the opening of locking devices using encoded acoustic verifications
US10713341B2 (en) * 2011-07-13 2020-07-14 Scott F. McNulty System, method and apparatus for generating acoustic signals based on biometric information
US9560035B2 (en) * 2010-08-04 2017-01-31 At&T Mobility Ii Llc Systems, devices, methods and computer program products for establishing network connections between service providers and applications that run natively on devices
US8917631B2 (en) * 2010-08-23 2014-12-23 Ortsbo Inc. System and method for sharing information between two or more devices
GB2546026B (en) * 2010-10-01 2017-08-23 Asio Ltd Data communication system
CN103477372A (en) * 2011-04-18 2013-12-25 埃戈耐克塞斯有限公司 Digital token generator, server for recording digital tokens and method for issuing digital tokens
MY168381A (en) 2011-05-01 2018-10-31 Ruckus Wireless Inc Remote cable access point reset
US8756668B2 (en) 2012-02-09 2014-06-17 Ruckus Wireless, Inc. Dynamic PSK for hotspots
US8752156B1 (en) * 2012-03-30 2014-06-10 Emc Corporation Detecting soft token copies
US9092610B2 (en) 2012-04-04 2015-07-28 Ruckus Wireless, Inc. Key assignment for a brand
WO2013156076A1 (en) * 2012-04-20 2013-10-24 Payfair International Gmbh Transfer connector
US9184915B2 (en) * 2012-08-30 2015-11-10 Vasco Data Security, Inc. Strong authentication token with acoustic data input over multiple carrier frequencies
US9460590B2 (en) 2012-09-24 2016-10-04 Wal-Mart Stores, Inc. Determination of customer proximity to a register through use of sound and methods thereof
WO2014104284A1 (en) * 2012-12-28 2014-07-03 楽天株式会社 Ultrasonic-wave communication system
WO2014135989A2 (en) * 2013-03-06 2014-09-12 Assa Abloy Ab Localized pin management with reader verification and no disclosure
US9742825B2 (en) * 2013-03-13 2017-08-22 Comcast Cable Communications, Llc Systems and methods for configuring devices
US9100395B2 (en) * 2013-09-24 2015-08-04 International Business Machines Corporation Method and system for using a vibration signature as an authentication key
US9450682B2 (en) 2013-10-07 2016-09-20 International Business Machines Corporation Method and system using vibration signatures for pairing master and slave computing devices
US9722984B2 (en) * 2014-01-30 2017-08-01 Netiq Corporation Proximity-based authentication
TWI563853B (en) * 2014-02-27 2016-12-21 Beseye Cloud Security Co Ltd Surveillance system and the operation process thereof
RU2737509C2 (en) * 2014-04-07 2020-12-01 Айверифай Инк. User authentication biometric binding
US10235512B2 (en) * 2014-06-24 2019-03-19 Paypal, Inc. Systems and methods for authentication via bluetooth device
US10652739B1 (en) 2014-11-14 2020-05-12 United Services Automobile Association (Usaa) Methods and systems for transferring call context
US9648164B1 (en) 2014-11-14 2017-05-09 United Services Automobile Association (“USAA”) System and method for processing high frequency callers
US9336092B1 (en) * 2015-01-01 2016-05-10 Emc Corporation Secure data deduplication
US9805344B1 (en) 2015-01-23 2017-10-31 Island Intellectual Property, Llc Notification system and method
TWI576823B (en) * 2015-05-12 2017-04-01 A sound transmission system for improving audio recognition rate and its data processing
US10509892B2 (en) * 2016-07-10 2019-12-17 B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University Acoustic security code transmission
US10409974B2 (en) * 2016-10-01 2019-09-10 Intel Corporation Technologies for authorizing a user to a protected system
GB201617408D0 (en) 2016-10-13 2016-11-30 Asio Ltd A method and system for acoustic communication of data
GB201617409D0 (en) 2016-10-13 2016-11-30 Asio Ltd A method and system for acoustic communication of data
GB201704636D0 (en) 2017-03-23 2017-05-10 Asio Ltd A method and system for authenticating a device
GB2565751B (en) 2017-06-15 2022-05-04 Sonos Experience Ltd A method and system for triggering events
GB2570634A (en) 2017-12-20 2019-08-07 Asio Ltd A method and system for improved acoustic transmission of data
US11436311B2 (en) * 2018-05-22 2022-09-06 Arizona Board Of Regents On Behalf Of Arizona State University Method and apparatus for secure and usable mobile two-factor authentication
KR102179085B1 (en) * 2018-10-26 2020-11-16 주식회사 뮤즈라이브 Non-contact based user authentification method
US11295758B2 (en) 2020-03-20 2022-04-05 Seagate Technology Llc Trusted listening
US11988784B2 (en) 2020-08-31 2024-05-21 Sonos, Inc. Detecting an audio signal with a microphone to determine presence of a playback device
JP7254753B2 (en) 2020-09-18 2023-04-10 株式会社東芝 System and server equipment
CN112506267B (en) * 2020-12-01 2024-04-19 上海银基信息安全技术股份有限公司 RTC calibration method, vehicle-mounted terminal, user and storage medium
US11593807B2 (en) 2021-03-22 2023-02-28 Bank Of America Corporation Information security system and method for multi-factor authentication for ATMS using authentication media
US11640455B2 (en) 2021-05-27 2023-05-02 Bank Of America Corporation Systems and methods for dynamic polychrome lattice image security
US11876804B2 (en) * 2021-07-21 2024-01-16 Capital One Services, Llc Systems and methods for providing access to a secure device

Family Cites Families (104)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4305143A (en) 1979-08-08 1981-12-08 Simms Larry L Automatic man overboard sensor and rescue system
IL64675A0 (en) * 1981-12-30 1982-03-31 Greenberg Avigdor Data verification system
US4961142A (en) * 1988-06-29 1990-10-02 Mastercard International, Inc. Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer
FR2640835B1 (en) 1988-12-07 1994-06-24 France Etat AUTHENTICATION DEVICE FOR INTERACTIVE SERVER
JPH03214834A (en) 1990-01-19 1991-09-20 Canon Inc Multi-medium network system
US5196840A (en) * 1990-11-05 1993-03-23 International Business Machines Corporation Secure communications system for remotely located computers
US5200993A (en) 1991-05-10 1993-04-06 Bell Atlantic Network Services, Inc. Public telephone network including a distributed imaging system
US5561710A (en) 1992-11-17 1996-10-01 Helms; Ramon E. Interactive voice communication terminal with alpha and numeric keypad
US6408388B1 (en) * 1993-05-05 2002-06-18 Addison M. Fischer Personal date/time notary device
US5422953A (en) 1993-05-05 1995-06-06 Fischer; Addison M. Personal date/time notary device
US5450491A (en) 1993-08-26 1995-09-12 At&T Corp. Authenticator card and system
WO1995016238A1 (en) 1993-12-06 1995-06-15 Telequip Corporation Secure computer memory card
US5481611A (en) 1993-12-09 1996-01-02 Gte Laboratories Incorporated Method and apparatus for entity authentication
US5583933A (en) * 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data
US6236724B1 (en) 1994-10-04 2001-05-22 Enco-Tone Ltd. Methods and apparatus for encoding and decoding data transmitted over telephone lines
US20010055320A1 (en) 1994-12-15 2001-12-27 Pierzga Wayne Francis Multiplex communication
CA2167631A1 (en) * 1995-01-20 1996-07-21 W. Dale Hopkins Method and apparatus for user and security device authentication
JPH08305662A (en) 1995-05-02 1996-11-22 Fujitsu Ltd Client authentication system and method
US5696879A (en) 1995-05-31 1997-12-09 International Business Machines Corporation Method and apparatus for improved voice transmission
US6505160B1 (en) 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
WO1997024857A1 (en) 1995-12-29 1997-07-10 Mci Communications Corporation Security for calling card validation
AU1615097A (en) 1996-02-20 1997-09-10 Sonic Systems Digital sonic and ultrasonic communications networks
CA2249463A1 (en) 1996-03-22 1997-10-02 Yves Audebert System for controlling access to a function, using a plurality of dynamic encryption variables
US5802176A (en) * 1996-03-22 1998-09-01 Activcard System for controlling access to a function, using a plurality of dynamic encryption variables
US6216231B1 (en) 1996-04-30 2001-04-10 At & T Corp. Specifying security protocols and policy constraints in distributed systems
DE19632025C2 (en) * 1996-08-08 1998-07-23 Daimler Benz Ag Authentication device with electronic authentication communication
FR2753860B1 (en) 1996-09-25 1998-11-06 METHOD AND SYSTEM FOR SECURING REMOTE SERVICES PROVIDED BY FINANCIAL ORGANIZATIONS
JPH10134157A (en) 1996-10-28 1998-05-22 Nippon Telegr & Teleph Corp <Ntt> Method and device for cipher authenticating process utilizing computer card
DE19647833B4 (en) 1996-11-19 2005-07-07 Deutsches Zentrum für Luft- und Raumfahrt e.V. Method for simultaneous radio transmission of digital data between a plurality of subscriber stations and a base station
SG64957A1 (en) 1996-12-04 1999-05-25 Inst Of Systems Science Nation Microprocessor card payment system
US6023676A (en) * 1996-12-12 2000-02-08 Dspc Israel, Ltd. Keyword recognition system and method
US6359923B1 (en) * 1997-12-18 2002-03-19 At&T Wireless Services, Inc. Highly bandwidth efficient communications
JP2957507B2 (en) 1997-02-24 1999-10-04 インターナショナル・ビジネス・マシーンズ・コーポレイション Small information processing equipment
US6282522B1 (en) * 1997-04-30 2001-08-28 Visa International Service Association Internet payment system using smart card
US6018739A (en) * 1997-05-15 2000-01-25 Raytheon Company Biometric personnel identification system
US5953700A (en) 1997-06-11 1999-09-14 International Business Machines Corporation Portable acoustic interface for remote access to automatic speech/speaker recognition server
US6213391B1 (en) 1997-09-10 2001-04-10 William H. Lewis Portable system for personal identification based upon distinctive characteristics of the user
US6084967A (en) * 1997-10-29 2000-07-04 Motorola, Inc. Radio telecommunication device and method of authenticating a user with a voice authentication token
US6130859A (en) 1997-12-01 2000-10-10 Divecom Ltd. Method and apparatus for carrying out high data rate and voice underwater communication
IL122375A (en) 1997-12-01 2001-05-20 Divecom Ltd Method and apparatus for carrying out high data rate underwater communication
US7328350B2 (en) * 2001-03-29 2008-02-05 Arcot Systems, Inc. Method and apparatus for secure cryptographic key generation, certification and use
US6347122B1 (en) 1998-01-13 2002-02-12 Agere Systems Guardian Corp. Optimal complement punctured convolutional codes for use in digital audio broadcasting and other applications
US6389055B1 (en) 1998-03-30 2002-05-14 Lucent Technologies, Inc. Integrating digital data with perceptible signals
US6327314B1 (en) 1998-04-01 2001-12-04 At&T Corp. Method and apparatus for channel estimation for multicarrier systems
JPH11289324A (en) 1998-04-03 1999-10-19 Matsushita Electric Ind Co Ltd Transmission / reception device and transmission / reception method
JPH11316740A (en) 1998-05-06 1999-11-16 Meidensha Corp One time password authentication system
US6157820A (en) * 1998-06-12 2000-12-05 Ericsson Inc. Pilot strength measurement and multipath delay searcher for CDMA receiver
US6272176B1 (en) 1998-07-16 2001-08-07 Nielsen Media Research, Inc. Broadcast encoding system and method
DE19981652D2 (en) 1998-08-21 2001-07-26 Rudolf Bannasch Process for the transmission of information and a suitable system for this
US6594705B1 (en) 1998-09-11 2003-07-15 Lv Partners, L.P. Method and apparatus for utilizing an audibly coded signal to conduct commerce over the internet
US6607136B1 (en) 1998-09-16 2003-08-19 Beepcard Inc. Physical presence digital authentication system
AU5997299A (en) 1998-10-02 2000-04-26 Comsense Technologies Ltd. Card for interaction with a computer
US6460138B1 (en) * 1998-10-05 2002-10-01 Flashpoint Technology, Inc. User authentication for portable electronic devices using asymmetrical cryptography
US6275934B1 (en) 1998-10-16 2001-08-14 Soft Book Press, Inc. Authentication for information exchange over a communication network
RU2128856C1 (en) * 1998-11-05 1999-04-10 Закрытое акционерное общество "Оптическая техника и технология" Method and device for production and keeping records of driving licenses
US6463537B1 (en) 1999-01-04 2002-10-08 Codex Technologies, Inc. Modified computer motherboard security and identification system
EP1024626A1 (en) 1999-01-27 2000-08-02 International Business Machines Corporation Method, apparatus, and communication system for exchange of information in pervasive environments
JP3515408B2 (en) 1999-02-15 2004-04-05 日本電信電話株式会社 Time authentication device
JP2000284689A (en) 1999-04-01 2000-10-13 Hitachi Ltd Information storage method
US6778828B1 (en) * 1999-04-12 2004-08-17 Lucent Technologies Inc. Personal mobility registration system for registration of a user's identity in a telecommunications terminal
RU2163745C2 (en) * 1999-04-29 2001-02-27 Щеглов Андрей Юрьевич Protective system for virtual channel of corporate network using authentication router and built around shared communication network channels and switching facilities
DE19923983B4 (en) 1999-05-25 2005-03-17 Siemens Ag Method and arrangement for remote access control
JP4519963B2 (en) 1999-06-21 2010-08-04 富士通株式会社 Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information
US6376952B1 (en) 1999-07-14 2002-04-23 E. I. Du Pont De Nemours And Company Bearing system for a rotating shaft
US6553494B1 (en) * 1999-07-21 2003-04-22 Sensar, Inc. Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document
KR20020019581A (en) 1999-08-03 2002-03-12 마이클 알. 쿠리 System and method for secured data transmission within a wireless communication system
WO2001011575A1 (en) 1999-08-09 2001-02-15 Wow Company S.A. Portable certification device with acoustic coupling
US6397368B1 (en) 1999-12-06 2002-05-28 Intellon Corporation Forward error correction with channel adaptation
IL133584A (en) * 1999-12-19 2010-02-17 Enco Tone Ltd Method for the acoustic encodification of dynamic identification codes
JP2001203688A (en) 2000-01-24 2001-07-27 Kyocera Corp Voice communication terminal
US20010039619A1 (en) * 2000-02-03 2001-11-08 Martine Lapere Speaker verification interface for secure transactions
AUPQ564400A0 (en) 2000-02-16 2000-03-09 Ong, Yong Kin (Michael) Electronic credit card-ecc
FI20000529L (en) 2000-03-08 2001-09-09 Nokia Mobile Phones Ltd Method for entering a key code into an electronic device and electronic device
JP2001265217A (en) 2000-03-17 2001-09-28 Cti Co Ltd Device and method for monitoring alteration of digital contents, and recorded medium therefor
CN1263324A (en) 2000-03-20 2000-08-16 后健慈 Fingerprint identification keyboard device and identification method thereof
WO2001071590A1 (en) 2000-03-22 2001-09-27 Zetabits Inc. Communication system
JP2001309159A (en) 2000-04-20 2001-11-02 Hitachi Ltd Recording device
CA2416202A1 (en) 2000-07-07 2002-01-17 Qualcomm Incorporated Method and apparatus for secure identity authentication with audible tones
WO2002013444A2 (en) 2000-08-04 2002-02-14 First Data Corporation Trusted authentication digital signature (tads) system
JP2002064461A (en) 2000-08-18 2002-02-28 Mitsubishi Electric Corp Communication device and method
IL138109A (en) 2000-08-27 2009-11-18 Enco Tone Ltd Method and devices for digitally signing files by means of a hand-held device
US6343049B1 (en) 2000-09-19 2002-01-29 Kohji Toda Ultrasonic transmitting and receiving system for digital communication
US7093131B1 (en) 2000-09-29 2006-08-15 Seiko Epson Corporation Information authenticating apparatus and authenticating station
US6889209B1 (en) 2000-11-03 2005-05-03 Shieldip, Inc. Method and apparatus for protecting information and privacy
US6438367B1 (en) 2000-11-09 2002-08-20 Magis Networks, Inc. Transmission security for wireless communications
US20020095587A1 (en) 2001-01-17 2002-07-18 International Business Machines Corporation Smart card with integrated biometric sensor
US7162634B2 (en) 2001-04-18 2007-01-09 Thomson Licensing Method for providing security on a powerline-modem network
JP4174191B2 (en) 2001-04-19 2008-10-29 日本電気株式会社 Copyright protection system and method
WO2002091653A1 (en) 2001-05-08 2002-11-14 Siemens Aktiengesellschaft Method and device for transmitting data in a multi-carrier system comprising parallel concatenated coding and modulation
US7010806B2 (en) * 2001-05-18 2006-03-07 Sun Microsystems, Inc. Dynamic downloading of keyboard keycode data to a networked client
US7493363B2 (en) * 2001-09-19 2009-02-17 Microsoft Corporation Peer-to-peer group management and method for maintaining peer-to-peer graphs
US7146500B2 (en) 2001-11-14 2006-12-05 Compass Technology Management, Inc. System for obtaining signatures on a single authoritative copy of an electronic record
US7251730B2 (en) 2001-12-21 2007-07-31 Qualcomm Incorporated Method and apparatus for simplified audio authentication
US7533735B2 (en) * 2002-02-15 2009-05-19 Qualcomm Corporation Digital authentication over acoustic channel
US7487362B2 (en) * 2002-02-15 2009-02-03 Qualcomm, Inc. Digital authentication over acoustic channel
US7966497B2 (en) 2002-02-15 2011-06-21 Qualcomm Incorporated System and method for acoustic two factor authentication
GB2386236A (en) * 2002-03-05 2003-09-10 Marconi Comm Ltd Cashless transactions via a telecommunications network
KR100687523B1 (en) * 2002-04-16 2007-02-27 울트라 프로쯔보든자 일렉트론스키 나프라브 디.오.오. Payment terminal device for payment data exchange
US20030212549A1 (en) * 2002-05-10 2003-11-13 Jack Steentra Wireless communication using sound
US7401224B2 (en) * 2002-05-15 2008-07-15 Qualcomm Incorporated System and method for managing sonic token verifiers
US7349481B2 (en) * 2002-07-01 2008-03-25 Qualcomm Incorporated Communication using audible tones
US20110191253A1 (en) * 2009-04-17 2011-08-04 Geomonkey, Inc. Use of mobile devices for communicating sound-based virtual transaction data
SI23227A (en) 2010-03-10 2011-05-31 Margento R&D D.O.O. Wireless mobile transaction system and procedure of carrying out transaction with mobile telephone
US20110270764A1 (en) * 2010-08-08 2011-11-03 Ali Mizani Oskui Method and a sytem for electronic transaction using point of sales (pos) device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883350A (en) * 2014-02-28 2015-09-02 Ncr公司 End-to-end device authentication

Also Published As

Publication number Publication date
CO5611229A2 (en) 2006-02-28
EP1481535A4 (en) 2006-07-26
AU2003219752A1 (en) 2003-09-09
US8391480B2 (en) 2013-03-05
RU2004127588A (en) 2006-01-27
ATE462239T1 (en) 2010-04-15
JP2005518721A (en) 2005-06-23
DE60331817D1 (en) 2010-05-06
MXPA04007869A (en) 2004-11-26
RU2313916C2 (en) 2007-12-27
WO2003071770A1 (en) 2003-08-28
AU2003219752B2 (en) 2008-05-22
BR0307657A (en) 2005-04-26
TW200307438A (en) 2003-12-01
CA2476485A1 (en) 2003-08-28
US20030159050A1 (en) 2003-08-21
CN101944246A (en) 2011-01-12
NZ534700A (en) 2005-03-24
TWI268688B (en) 2006-12-11
US7966497B2 (en) 2011-06-21
IL163527A (en) 2010-04-29
US20090141890A1 (en) 2009-06-04
EP1481535A1 (en) 2004-12-01
EP1481535B1 (en) 2010-03-24
JP4565840B2 (en) 2010-10-20

Similar Documents

Publication Publication Date Title
CN1650603A (en) System and method for acoustic two factor authentication
JP2005518721A5 (en)
US7565297B2 (en) Method and apparatus for the secure identification of the owner of a portable device
JP4680505B2 (en) Simple voice authentication method and apparatus
US9378518B2 (en) Electronic signature security system
US6119227A (en) Methods and apparatus for authenticating an originator of a message
US20050091492A1 (en) Portable security transaction protocol
JPH0451864B2 (en)
JP2000357156A (en) System and method for authentication sheet distribution
JP2002300155A (en) Mutual authentication method and mutual authentication system
CN113793149A (en) Off-line transaction authentication system and method, central server and client
JP3889660B2 (en) Authentication method and authentication system
CN1480871A (en) Method of digit identity authentication based on features of non-biophysics
JPH02247790A (en) Ic card apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1078405

Country of ref document: HK

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20050803

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1078405

Country of ref document: HK

OSZAR »