Authentication device and/or method
An authentication device and authentication code technology, which are used in secure communication devices, user identity/authority verification, digital transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0198] Example 1: Initial registration of an authentication device with an authentication server
[0199] Authentication device 106 may be provided to a user prior to registration of authentication device 106 with remote service 104 , wherein authentication device 106 may be used to enable access to remote service 104 .
[0200] In such an embodiment, user 102 may log in to remote service 104 using existing credentials, such as a user ID and password. If already logged in, user 102 may choose to register authentication device 106 with authentication server 116 . The registration of the authentication device 106 to the authentication server 116 generally includes the following steps:
[0201] 1. Activation and verification phase;
[0202] 2. Select a user PIN; and
[0203] 3. Register user information.
[0204] Each of the above steps will be described in more detail below.
[0205] Activation and verification
[0206] In order to register the authentication device 106 wi...
example 2A
[0229] Example 2A: Regular login
[0230] The user 102 will log in to a specific remote service 104, and the authentication device 106 provides an authentication tool for the remote service 104 by inputting an activation code, which is obtained by pressing the "ACT" button on the authentication device 106 .
[0231] Remote service 104 then transmits the activation code to authentication server 116 . The authentication server 116 then responds with a service authentication code to verify that the user 102 is indeed using the authentication device 106 that has been indicated based on the entered activation code.
[0232]Upon sending the service authentication code to the user 102, a timer may be started to limit the validity of the user's encoded user PIN to a predetermined period of time, such as sixty seconds. This prevents the encoded user PIN from being used if the mirror site successfully matches the service authentication code, and also somewhat limits the opportunity for...
example 2B
[0246] Example 2B: Secondary Co-registration
[0247] When a second third party, other than the authenticating device issuer, becomes available to the user 102 to use their authenticating device 106 as a means of authenticating to the remote service 104, then the user 102 can follow a simple registration process.
[0248] First, a user 102 will log into a remote service 104, such as a site, using their existing credentials, such as a user ID and password, according to the third party's standards and security requirements. If already logged in, the user 102 will choose to register their authentication device 106 .
[0249] Activation and verification
[0250] Remote service 104 should first prompt user 102 for an activation code (in this example: "RF6D9S"). Further, the activation code is obtained on the display of the authentication device 106 by pressing the "ACT" button. Once provided to the authentication server 116, the authentication server 116 can respond with a servi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 