Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication device and/or method

An authentication device and authentication code technology, which are used in secure communication devices, user identity/authority verification, digital transmission systems, etc.

Active Publication Date: 2010-05-12
EMUE HLDG
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Thus, if the remote computer is able to mimic the behavior of the remote service, the user can be tricked or "phished" into thinking he or she is communicating with the correct remote service

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device and/or method
  • Authentication device and/or method
  • Authentication device and/or method

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0198] Example 1: Initial registration of an authentication device with an authentication server

[0199] Authentication device 106 may be provided to a user prior to registration of authentication device 106 with remote service 104 , wherein authentication device 106 may be used to enable access to remote service 104 .

[0200] In such an embodiment, user 102 may log in to remote service 104 using existing credentials, such as a user ID and password. If already logged in, user 102 may choose to register authentication device 106 with authentication server 116 . The registration of the authentication device 106 to the authentication server 116 generally includes the following steps:

[0201] 1. Activation and verification phase;

[0202] 2. Select a user PIN; and

[0203] 3. Register user information.

[0204] Each of the above steps will be described in more detail below.

[0205] Activation and verification

[0206] In order to register the authentication device 106 wi...

example 2A

[0229] Example 2A: Regular login

[0230] The user 102 will log in to a specific remote service 104, and the authentication device 106 provides an authentication tool for the remote service 104 by inputting an activation code, which is obtained by pressing the "ACT" button on the authentication device 106 .

[0231] Remote service 104 then transmits the activation code to authentication server 116 . The authentication server 116 then responds with a service authentication code to verify that the user 102 is indeed using the authentication device 106 that has been indicated based on the entered activation code.

[0232]Upon sending the service authentication code to the user 102, a timer may be started to limit the validity of the user's encoded user PIN to a predetermined period of time, such as sixty seconds. This prevents the encoded user PIN from being used if the mirror site successfully matches the service authentication code, and also somewhat limits the opportunity for...

example 2B

[0246] Example 2B: Secondary Co-registration

[0247] When a second third party, other than the authenticating device issuer, becomes available to the user 102 to use their authenticating device 106 as a means of authenticating to the remote service 104, then the user 102 can follow a simple registration process.

[0248] First, a user 102 will log into a remote service 104, such as a site, using their existing credentials, such as a user ID and password, according to the third party's standards and security requirements. If already logged in, the user 102 will choose to register their authentication device 106 .

[0249] Activation and verification

[0250] Remote service 104 should first prompt user 102 for an activation code (in this example: "RF6D9S"). Further, the activation code is obtained on the display of the authentication device 106 by pressing the "ACT" button. Once provided to the authentication server 116, the authentication server 116 can respond with a servi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of authenticating a remote service (104) to a user (102) via a communications network (106) is disclosed. The remote service (104) obtains a service authentication code that has been generated, using a code generation algorithm, based on a first secret key. The service authentication code is communicated to the user (102) via the communications network (106) and received, or entered, intoan authentication device (106) associated with the user (102). The authentication device (106) then generates, using the same code generation algorithm, an expected code value based on a second secret key and compares the expected code value to the service authentication code. Responsive to the comparison, and in the event that the expected code value correlates with the service authentication code, the authentication device (106) generates a response that indicates to the user (102) the authenticity of the remote service (104).

Description

[0001] This application claims priority to Australian Provisional Patent Application No. 2004907210 filed 21 December 2004, the contents of which are incorporated herein by reference. technical field [0002] The invention relates to a method and device for authenticating remote services to users. In a typical application, the authentication method or apparatus may be used to authenticate a remote service such as a site to a user operating a workstation connected to a communication network. However, authentication means or methods may also be used to authenticate the user to the remote service, or indeed, to mutually authenticate the remote service and the user. Background technique [0003] In general, conventional authentication methods and apparatus allow users to be authenticated to remote services. Generally speaking, traditional authentication methods need to make the authentication service authenticate the user simply by asking the user for a password. [0004] Ofte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/00G06F21/33G06F21/34G06F21/44
CPCH04L2209/80H04L9/3226H04L2209/56H04L9/3273
Inventor 西蒙·查尔斯·休斯·休伊特贾森·弗雷德里克·班德尔詹姆斯·伊万·列侬
Owner EMUE HLDG