Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for abstracted and randomized one-time use passwords for transactional authentication

a transactional authentication and password technology, applied in the field of authentication systems and methods, can solve the problems of fraudulent transactions to be processed, the individual's password or pin to be reverse-engineered, and the difficulty of reverse-engineering the individual's password or pin from a copy of data, etc., to achieve simple or more complex determination, easy monitoring or observation, and improved security. the effect of security matrix

Inactive Publication Date: 2012-05-31
FORTICODE
View PDF15 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention is a method for validating a user's authenticity to access a secure system. The method involves receiving an authentication request from the user, generating a security matrix based on the user's ID and user preference data, sending the security matrix to the user, receiving a one-time code from the user, validating the one-time code using the security matrix, the user's keyword, and user preference data, and sending an authentication result to the user. The method ensures that the user's key word is never directly entered during the authentication process and keeps it improbable that the user's keyword can be identified. The strength of the security matrix can be altered by the user to make the determination simpler or more complex. The method can be applied to any system requiring user authentication with minimal changes to the secure system or the user experience. The method works against any transaction that requires a user to validate his identity."

Problems solved by technology

Hash functions and smart security methods between the client and the server make it difficult to reverse-engineer the individual's Password or PIN from a copy of the data.
However, using visual observation along with phishing techniques, most passwords or PINs can be compromised thereby allowing fraudulent transactions to be processed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for abstracted and randomized one-time use passwords for transactional authentication
  • Method and system for abstracted and randomized one-time use passwords for transactional authentication
  • Method and system for abstracted and randomized one-time use passwords for transactional authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]In the following description the following identifications are used.

[0032]The Secure System 20 is a system that requires a User to authenticate as a pre-requisite to processing transactions or requests for information.

[0033]The Security System 30 is the system in which the User's Keyword and Preferences, the Secure Systems preferences are stored and where processing for the Security System's interfaces is performed.[0034]Authentication Request 11[0035]Security Matrix 31[0036]One-Time Code 12[0037]Authentication Result 32[0038]Success Message 33

[0039]The User Preferences 40 are defined in Table 3 and are stored internally by the Security System 30.

[0040]A keyword 41 is a linear string of alpha characters that is defined by the User 10. In the examples given, the keyword is limited to being alpha characters only (A to Z) however, the method and system supports Alpha (case sensitive or case insensitive), Numeric, Symbolic or any combination thereof.

[0041]The Secure System Prefere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security system and method for authenticating a user's access to a system is disclosed. The security system receives an authentication request from the user and responds by generating a security matrix based on a previously stored user keyword and user preference data, the security matrix being different for each authentication request. The security system sends the security matrix to the user and awaits a one-time code in response to the security matrix. The user forms the one-time code based on the user keyword, the user preferences, and the security matrix. The security system validates the one-time code against the security matrix, the keyword, and the user preferences, and responds by sending an authentication result to the user that either permits or denies access to the system. Additionally, the security system sends a success or fail message to the system to be accessed.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application claims priority to U.S. provisional patent application No. 61 / 418,276, filed on Nov. 30, 2010, and titled “METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION”, which application is incorporated by reference into the present application. Additionally, this application claims the benefit of U.S. utility application Ser. No. 13 / 281,330, filed on Oct. 24, 2011, and titled “METHOD AND SYSTEM FOR ABSTRACTED AND RANDOMIZED ONE-TIME USE PASSWORDS FOR TRANSACTIONAL AUTHENTICATION”, which application is incorporated by reference into the present application.FIELD OF THE INVENTION[0002]The present invention relates generally to authentication systems and methods and more particularly to authentication systems that are highly secure.DESCRIPTION OF THE RELATED ART[0003]Security relating to personal identity has become the fundamental cornerstone of all transactions in the modern ele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32
CPCG06F21/31G06F21/36G06F21/83H04L9/3226H04L63/0838H04L9/3271
Inventor SMALES, ANTONY
Owner FORTICODE