Authentication system and method therefor

A technology of authentication system and authentication request, applied in the direction of transmission system, payment system structure, security device, etc.

Inactive Publication Date: 2014-05-07
VALIDSOFT UK
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, this approach has many limitations, not least its reliance on each MNO actually distributing this information through their network
Also, even if the information exists on the network, it still requires a dedicated device to access it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method therefor
  • Authentication system and method therefor
  • Authentication system and method therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] now refer to figure 1 , figure 1 is a schematic diagram of the main components of the authentication system implementing the present invention. The system includes an authentication server or an authorization server or both an authentication server and an authorization server 101 communicatively coupled to a telecommunications server 103 . The system may include a remote home location register (HLR) 105 operable to detect the unconditional call forwarding status of one or more mobile phones. An HLR database is maintained by each mobile network provider and includes information about that provider's permanent and visiting subscribers. The home location register may be stored in memory such as random access memory or other memory. Typically the home location register is stored on a server. HLR 105 is communicatively coupled to authorization server 101 . This is usually accomplished by wireless means, but wired connections, such as dedicated fiber optic links, may als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An authentication system is disclosed. The system comprises means for receiving an authentication request associated with the transaction wherein the request comprises data identifying a communication device associated with a user authorised to perform the transaction; means for sending a Mobile Application Part, MAP, protocol request message in response to the authentication request; means for receiving, in response to the MAP protocol request, data indicative of whether a communication sent to the communication device will be forwarded to a different communication device. The received data indicative of whether a communication sent to the communication device will be forwarded to a different communication device is used in determining whether to authenticate the transaction.

Description

technical field [0001] The present invention relates to a method and system for detecting call forwarding of a mobile phone. More particularly, the present invention relates to detecting call forwarding of mobile phones for user authentication in e-commerce, especially online banking or mobile banking applications. Background technique [0002] The increase in the number and sophistication of fraudulent attacks against e-commerce, especially online banking applications, has forced many banks to adopt more secure protections for these applications. [0003] One form of protection called Out-of-Band (OOB) authentication requires authentication of the user, and optionally verification of the content of the transaction, to be performed on the OOB channel, which Not the same as the Internet channel where transactions are sent. OOB channels are typically mobile or fixed telephone channels using voice or SMS protocols. OOB authentication is typically performed automatically by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0853H04L63/0876H04M3/54H04M2207/18H04W12/06G06Q20/322G06Q20/401G06F21/313
Inventor 约翰·彼得森帕特里克·卡罗尔乔纳森·马克·阿尔福丹尼尔·桑希尔
Owner VALIDSOFT UK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products