`
`(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2007/0022301 A1
`Nicholson et al.
`(43) Pub. Date:
`Jan. 25, 2007
`
`(54)
`
`(75)
`
`SYSTEM AND METHOD FOR HIGHLY
`RELIABLE MULTI-FACTOR
`AUTHENTICATION
`
`Inventors: J. Joseph Nicholson, New York, NY
`(US); Paul Murphy, Fort Lauderdale,
`FL (US); Ivo Rothschild, Westmount
`(CA)
`
`Correspondence Address:
`Paul D. Greeley
`Ohlandt, Greeley, Ruggiero & Perle, L.L.P.
`10th Floor
`
`One Landmark Square
`Stamford, CT 06901-2682 (US)
`
`(73)
`
`Assignee:
`
`Intelligent Voice Research, LLC
`
`(21)
`
`Appl. No.:
`
`11/486,880
`
`(22)
`
`Filed:
`
`Jul. 14, 2006
`
`Related U.S. Application Data
`
`(60)
`
`Provisional application No. 60/700,506, filed on Jul.
`19, 2005.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`H04K 1/00
`(52) U.S.Cl.
`............................................................ ..713/184
`
`(57)
`
`ABSTRACT
`
`A system and method for authenticating an online user by
`using different and independent communication services to
`enhance security. A key server validates the factors of
`authentication, namely a first factor (usernarne/password)
`and a second factor (key). The key server generates and
`sends the key to the user with a different and independent
`communication service, e.g., telephone, SMS or email. The
`user then submits the key using the online communication
`service. A third factor, e.g., a second password or a biometric
`symbol of the user, can also be used. Validation of the
`biometric symbol can be a prerequisite to delivery of the key
`to the user. A plurality of the independent services can be
`daisy-chained.
`
`28
`
`
`
` Comm. Server
`Key Delivery
`
`Program
`
`Key Generation
`and Management
`
`Program
`
`
` Directory
`
`
`
` Username
`
`\\ C9)
`CD‘, \
`
`\
`
`\
`
`\
`
`\ \
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`26
`
`1
`
`USAA 1034
`
`1
`
`USAA 1034
`
`
`
`Patent Application Publication Jan. 25, 2007 Sheet 1 of 3
`
`US 2007/0022301 A1
`
`memsms
`
`E238.
`
`
`
`.EmEmmm:§Em.
`
`eofiacmoAux
`
`238$
`
`aewmSE8mu
`
`5953$2
`
`Esme;E:SE8
`
`
`
`owlEmimbma
`
`smmmoem
`
`2
`
`
`
`
`
`
`
`
`Patent Application Publication Jan. 25, 2007 Sheet 2 of 3
`
`US 2007/0022301 A1
`
`8.38am:
`
`9..@@aSm@aw
`
`Esm@©®-i--
`
`EmsmmmcmzEm
`
`E._§9.awfix
`
`E83:
`
`=.§$3mq
`
`393$
`
`N.8
`
`3
`
`
`
`
`Patent Application Publication Jan. 25, 2007 Sheet 3 of 3
`
`US 2007/0022301 A1
`
`28
`22 24
`
`
`
`Comm. Server
`
`
`
`
`Key Delivery
`Program
`
` Key Generation
`
`and Management
`Program
`
`‘/N
`1
`I
`I
`L
`
`
`ThIrd'pa'Iy
`Username
`70
`/V 34
`Directory
`I
`I
`J
`
`\\
`
`\
`
`\
`
`26
`
`,
`// @
`
`x
`
`20/
`
`\
`
`CD \
`
`\
`
`\
`
`\
`
`\\
`
`/
`
`/
`
`/
`
`/
`
`/
`
`/
`
`Fig. 3
`
`4
`
`
`
`US 2007/0022301 A1
`
`Jan. 25, 2007
`
`SYSTEM AND METHOD FOR HIGHLY RELIABLE
`MULTI—FAC TOR AUTHENTICATION
`
`RELATED APPLICATION
`
`[0001] This application claims the benefit of U.S. Provi-
`sional Patent Application, Ser. No. 60/700,506, filed Jul. 19,
`2005, the entire contents of which are hereby incorporated
`by reference.
`
`FIELD OF THE INVENTION
`
`[0002] The present disclosure generally relates to multi-
`factor authentication of an on-line user and, in particular, to
`a system and method that employs two or more different and
`independent communication services.
`
`BACKGROUND OF THE INVENTION
`
`[0003] Multi-factor authentication is used to ensure that a
`person accessing a computer system is the person they claim
`to bc by prcscnting multiplc crcdcntials of different types.
`Single-factor authentication requires the presentation of a
`datum known by the individual (e.g., a password, a user
`name or both). Two-factor authentication requires the addi-
`tional presentation of something the user possesses (e.g., a
`key generated by a device).
`
`[0004] For the sake of the present description, the term
`“fob” will mean any physical device capable of generating
`a o11e-time, expiring key. The fob could be a classic key-
`chain, a card or software designed to execute on a particular
`mobile phone, etc. Two-factor authentication with fob-based
`keys for the second factor was initially used by only very
`secure computing facilities. Today it is used to protect many
`corporate networks against phishing, identity theft and other
`intrusive activities. In classic two-factor authentication, the
`first factor is something the user knows, e.g., a password or
`pass phrase. The second factor is something the user has, the
`fob-based key that generates and displays information syn-
`chronized with a central server, usually an alpha-numeric
`key that changes periodically. An IP provider has recently
`adopted two-factor authentication that gives users the option
`of using fobs to protect their accounts.
`
`[0005] As the price of implementing multi-factor authen-
`tication decreases, it will be adopted by more and more of
`the institutions with which we interact on a daily basis. How
`long will it be before the average professional has to carry
`around a dozen fobs?
`
`[0006] There is a need for authentication with high level
`security.
`
`[0007] There is also a need to eliminate the use of fobs
`used to provide the second authentication factor.
`
`SUMMARY OF THE INVENTION
`
`[0008] A system of the present disclosure authenticates a
`user with a computer that receives a first factor and a third
`factor that are sent by the user using a first communication
`service and a second communication service, respectively.
`The computer comprises a program that generates a second
`factor, validates the first and third factors, then causes the
`second factor to be sent
`to the user using the second
`communication service and after receipt of the second factor
`sent by the user using the first communication service
`authenticates the user by validating the second factor.
`
`In one embodiment of the system of the present
`[0009]
`disclosure, the first and third factors are different from one
`another.
`
`In another embodiment of the system of the present
`[0010]
`disclosure, the first and third factors are selected from the
`group consisting of: password, pass phrase, usemarne and
`any combination thereof.
`
`In another embodiment of the system of the present
`[0011]
`disclosure, the third factor is a biometric symbol of the user.
`Preferably, the biometric symbol is selected from the group
`consisting of: a voiceprint, an iris scan, a fingerprint, a
`photograph or other symbol of a physical part of the user.
`
`In another embodiment of the system of the present
`[0012]
`disclosure,
`the first communication service is an online
`service.
`
`In another embodiment of the system of the present
`[0013]
`disclosure, the second communication service is selected
`from the group consisting of: SMS, telephone (land line or
`cellular) and page.
`
`In another embodiment of the system of the present
`[0014]
`disclosure, the second factor comprises one or more series of
`alphabetic characters, numeric characters or both.
`
`In another embodiment of the system of the present
`[0015]
`disclosure, the program validates the first and third factors
`by comparison with a repository of personal data of the user.
`
`[0016] The method of the present disclosure authenticates
`a user by using a computer to perform the steps of:
`
`receiving a first factor and a third factor that are
`[0017]
`sent by the user using a first communication service and a
`second communication service, respectively;
`
`[0018]
`
`generating a second factor;
`
`[0019]
`
`validating the first and third factors;
`
`then causing the second factor to be sent to the user
`[0020]
`using the second communication service; and
`
`after receipt of the second factor sent by the user
`[0021]
`using the first communication service, authenticating the
`user by validating the second factor.
`
`In one embodiment of the method of the present
`[0022]
`disclosure the first and third factors are different from one
`another.
`
`In another embodiment of the method of the
`[0023]
`present disclosure, the first and third factors are selected
`from the group consisting of: password, pass phrase, user-
`name and any combination thereof.
`
`In another embodiment of the method of the
`[0024]
`present disclosure, the third factor is a biometric symbol of
`the user. Preferably, the biometric symbol is selected froin
`the group consisting of: a voiceprint, an iris scan, a finger-
`print, a photograph and other symbol of a physical part of the
`user.
`
`In another embodiment of the method of the
`[0025]
`present disclosure, the first communication service is an
`online service.
`
`In another embodiment of the method of the
`[0026]
`present disclosure,
`the second communication service is
`selected from the group consisting of: SMS, telephone (land
`line or cellular) and page.
`
`5
`
`
`
`US 2007/0022301 A1
`
`Jan. 25, 2007
`
`In another embodiment of the method of the
`[0027]
`present disclosure, the second factor comprises one or more
`series of alphabetic characters, numeric characters or both.
`
`factor. The first factor is a first password and/or username.
`The second factor is a key and the third factor is a second
`password.
`
`In another embodiment of the method of the
`[0028]
`present disclosure, the program validates the first and third
`factors by comparison with a repository of personal data of
`the user.
`
`In another embodiment of the system of the present
`[0029]
`disclosure, a computer validates a user of an online service
`using a first factor and a second factor. The computer sends
`the second factor to the user using an order of communica-
`tion services other than the online service for delivery of the
`second factor to the user. If there is a failure of delivery in
`a first communication service used in the order, the computer
`sends the second factor to the user using one of the com-
`munication services that is second in the order.
`
`In another embodiment of the system of the present
`[0030]
`disclosure, the first and second communication services are
`different than and independent of one another and the online
`service.
`
`In another embodiment of the system of the present
`[0031]
`disclosure,
`the computer automatically uses the second
`communication service without any input from the user.
`
`In another embodiment of the system of the present
`[0032]
`disclosure, the communication service is a member of the
`group consisting of: SMS, email and telephone.
`
`In another embodiment of the system of the present
`[0033]
`disclosure, the computer authenticates the user using the first
`factor, the second factor and a third factor. The first factor is
`a first password and/or username, the second factor is a key
`and the third factor is a second password.
`
`In another embodiment of the method of the
`[0034]
`present disclosure, a user of an online service is authenti-
`cated by using a computer to perform steps comprising:
`
`[0035]
`factor,
`
`validating the user using a first factor and a second
`
`sending the second factor to the user using an order
`[0036]
`of communication services other than the online service for
`
`delivery of the second factor to the user; and
`
`if there is a failure of delivery in a first communi-
`[0037]
`cation service used in the order, sending the key to the user
`using one of the communication services that is second in
`the order.
`
`In another embodiment of the method of the
`[0038]
`present disclosure,
`the first and second communication
`services are different than and independent of one another
`and the online service.
`
`In another embodiment of the method of the
`[0039]
`present disclosure, the second communication service auto-
`matically sends the second factor without any input from the
`user.
`
`In another embodiment of the method of the
`[0040]
`present disclosure, the communication service is a member
`of the group consisting of: SMS, email and telephone.
`
`In another embodiment of the method of the
`[0041]
`present disclosure, the user is further validated using a third
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0042] Other and further objects, advantages and features
`of the present disclosure will be understood by reference to
`the following specification in conjunction with the accom-
`panying drawings, in which like reference characters denote
`like elements of structure and:
`
`[0043] FIG. 1 is a schematic representation of a two-factor
`authentication with two or more communication services
`
`according to the present disclosure;
`
`[0044] FIG. 2 is a schematic representation of chained key
`delivery in the face of delivery failure of the system of FIG.
`1; and
`
`[0045] FIG. 3 is a schematic representation of a three-
`factor authentication using two or 111ore communication
`services according to the present disclosure.
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENT
`
`[0046] The system and method of the present disclosure
`provides multi-factor authentication to ensure that a person
`accessing a computer system is the person they claim to be
`by presenting multiple credentials of different types. Single-
`factor authentication requires the presentation of a datum
`known by the individual (e.g., a password, a user name or
`both). Two-factor authentication requires the additional pre-
`sentation of something the user possesses (e.g., a key
`generated by a device). Three-factor authentication, in one
`embodiment, requires the user to present some physical part
`of themselves (e.g., a voiceprint, an iris scan, a fingerprint,
`a photograph or other biometric symbol).
`
`[0047] The system and method of the present disclosure
`provides authentication with security for an online transac-
`tion in which a user enters a usemame and password using
`an online service. The security is enhanced by using two or
`more communication services the user already has available,
`e.g., an email account, an SMS account or a telephone to
`deliver a key to the user. This key comprises a computer
`recognizable expression, e.g., one or more series of alpha-
`numeric characters. This key has an expiration date. This
`key is the second factor is sent to one of the user’s devices.
`This key eliminates the fob.
`
`In some embodiments, a third factor is also used to
`[0048]
`ide11tify the user. For example, a voicepri11t ca11 be required
`before a key is delivered over the telephone. In the absence
`of voiceprint software, a challenge-response dialogue can be
`used. Another approach is also supported with the introduc-
`tion of a fingerprint reader or iris scanner. These devices
`require additional support for the system on the user’s
`device.
`
`In some embodiments, the system and method of
`[0049]
`the present disclosure monitors the delivery of keys. In case
`of failure of delivery (e.g., because of an unreliable SMS
`network), another key delivery service associated with the
`user is used. These communication services have a prede-
`termined order of delivery. If, for example, the first device
`in the chain or order is an SMS service, the system waits a
`
`6
`
`
`
`US 2007/0022301 A1
`
`Jan. 25, 2007
`
`defined period of time for delivery to the user to be con-
`firmed. If this confinnation is not received, the key may be
`automatically sent to the same telephone, via a standard
`voice call.
`
`input/output devices, such as a keyboard, display, a printer
`and other input/output devices. Key server 24 may comprise
`one or more computers or servers to perform its role in the
`authentication method of the present disclosure.
`
`[0050] Referring to FIG. 1, an authentication system 20 of
`the present disclosure comprises a facility computer 22 (e.g.,
`a web site), a key server 24, a communication server 28 and
`a user device 26 (e.g., a computer, a telephone, a pager). A
`user 30 uses user device 26 (e.g., a computer) to commu-
`nicate with facility computer 22 via a first communication
`service 32 (e.g., IP network). Communication server 28 uses
`one of its sub-systems (82, 84, 86, etc.) to deliver a key to
`user device 26.
`
`[0051] First communication service 32 may be a typical
`online dialog between user 30 and facility computer 22
`using a web page with prompts for user 30 to enter infor-
`mation. Second communication service 34 can be any one of
`a plurality of services that are different and independent of
`one another and of first commtmication service 32. For
`
`example, second communication service 34 may be email,
`SMS, telephone (land line or cellular), page or other service.
`All of these services can be offered over a multiple user
`network, such as an Internet, an Intranet or other network.
`Alternatively, the telephone service may be offered over the
`telephone and/or cellular network.
`
`[0052] Facility computer 22, e.g., has possession of infor-
`mation concerning user 30, which is to be protected from
`access by unauthorized persons or entities. For example,
`facility computer 22 may be used in the conduct of a service
`business with which user 30 has an account. The provided
`service might be financial, utility, travel, maintenance or
`repair or any service that needs to protect private informa-
`tion of user 30.
`
`[0053] User 30 can access a user account with the facility
`by using user device 26 and first communication service 32
`to communicate with facility computer 22. Both user device
`26 and facility computer 22 are provided with a communi-
`cation module (not shown) for the purpose of using first
`communication service 32.
`
`[0054] Facility computer 22 comprises a processor 40, a
`communication module 42 and a memory 44 that are inter-
`connected with a bus 46. Facility computer 22 also com-
`prises an input/output unit (not shown) to communicate with
`various input/output devices, such as a keyboard, display, a
`printer and other input/output devices. Facility computer 22
`may comprise one or more computers or servers to perform
`the authentication role of the facility.
`
`[0055] A library program 48 is stored in memory 44.
`Library program 48 is used by application developers to
`request the generation and authentication of keys. Library
`program 48 allows facility application developers to inte-
`grate the authentication method of the present disclosure
`into the software of facility computer 22. Library program
`48 includes a function to request a key and a function to
`request the checking of the validity of a key entered by the
`user. Both functions require valid usemame and password
`tokens.
`
`[0056] Key server 24 comprises a processor 40, a com-
`munication module 42 and a memory 44 that are intercon-
`nected with a bus 46. Key server 24 also comprises an
`input/output unit (not shown) to communicate with various
`
`[0057] A key generation and management program 68
`uses a database 70 of user profile information that includes
`usemames and passwords. The usernames and passwords
`can be managed internally or externally by a separate server
`74, e.g., a Microsoft Active Directory server. If managed
`internally, key server 24 accesses the user authentication
`data via a communication link 72. If server 24 and database
`
`70 are located near one another, communication link 72 may
`simply be a wired link or a short-range wireless link. In other
`embodiments, communication link 72 could be the Internet
`or an Intranet. In still other embodiments, the user profile
`can be stored in memory 64 of key server 24.
`
`If managed externally, key generation and manage-
`[0058]
`ment program 68 can access that data in server 74 using
`plug-i11 authentication bridges (11ot shown) via a communi-
`cation link 76, which may be the Internet or an Intranet.
`
`[0059] Key generation and management program 68 gen-
`erates random keys. By default, the system uses a series of
`randomly generated numbers to create a key. The system
`allows the use of third party key generation software.
`
`[0060] Communication server 28 comprises a key delivery
`program 80 that manages the delivery of keys provided by
`key server 24 to user 30 via second communication service
`34. Communication server 28 can deliver keys via email,
`SMS or by automated voice application. To this end, a
`plug-in email communication bridge program 82 is instan-
`tiated to deliver keys via email. A plug-in SMS communi-
`cation bridge program 84 is instantiated to deliver keys via
`SMS message. An automated voice bridge program 86 is
`instantiated to deliver keys via a telephone voice message.
`
`In one embodiment of the present disclosure, sys-
`[0061]
`tem 20 performs the following procedure in which the
`numbered procedural steps correspond to the encircled num-
`bers in FIG. 1:
`
`1. User 30 uses user device 26 and first commu-
`[0062]
`nication service 32 to enter and send a usemame and a
`
`password to facility computer 22.
`
`2. Library program 48 receives the usemame and
`[0063]
`password and requests key server 24 to send a key to
`user 30.
`
`3. Key generation and management program 68
`[0064]
`validates the usemame and password using the user
`profile information.
`
`Y g
`g
`eneration and mana eme11t
`4. If validated, ke
`0065
`program 68 generates the key, stores it in the user
`profile and hands the key to communication server 28.
`
`5. Communication server 28 uses a predeter-
`[0066]
`mined one of communication bridges 82, 84 or 86 and
`second communication service 34 to deliver the key to
`user 30.
`
`6. User 30 receives and uses user device 26 and
`[0067]
`first communication service 32 to enter and send the
`
`key to key server 24.
`
`7
`
`
`
`US 2007/0022301 A1
`
`Jan. 25, 2007
`
`7. Key generation and management program 68
`[0068]
`authenticates user 30, using the username, password
`and key.
`[0069]
`In the above example, the key (password or phrase)
`is delivered to the user using a second communication
`service (email, SMS or telephone) to which user 30 already
`subscribes. This is implemented by allowing user 30 of the
`service (email, SMS or telephone) to return the key by using
`user device 26 and communication service 32 to system 20.
`The key is processed by key generation and management
`program 68 and authenticated in the same way that the first
`factor (password) is authenticated. The use of second com-
`munication service 34 makes the overall process far more
`secure than a classic two-factor authentication system using
`only first communication service 32. In this embodiment,
`key generation and management program 68 comprises code
`for steps 3, 4 and 7 and key delivery program 80 comprises
`code for step 5.
`
`[0070] Library program 48, key generation and manage-
`ment program 68, key delivery program 80, email bridge
`communication program 82, SMS bridge communication
`program 84 and voice bridge program 86 can be written in
`any suitable language. In one embodiment of key server 24,
`key generation and management program 68 is written in
`Java and library program 48 is written in Java and PHP.
`
`[0071] Referring to FIG. 2, key generation and manage-
`ment program 68 comprises a daisy-chain manager 90.
`Daisy chain manager 90 enables for the purpose of contact-
`ing user 30 a predetermined ordering of SMS, voice and
`email. For example, should the ordering be SMS, telephone
`and email, user 30 would first be contacted by SMS. Should
`the SMS contact fail, user 30 would then automatically be
`contacted by telephone. Should the telephone contact fail,
`user 30 would then automatically be contacted by email.
`
`[0072] Daisy-chain manager 90 has a first activity that
`gathers a preferred order of contact from user 30. The user’s
`preferred order of contact can be obtained either by online,
`email, voice or SMS communication service. The preferred
`order, once gathered is entered into user profile 70.
`
`[0073] Daisy-chain manager 90 has a second activity to
`effect delivery of the key without any input from user 30 in
`the following manner. When a new key has been generated
`for user 30, daisy chain manager 90 uses the preferred order
`to send the key to user 30. Using the above preferred order
`example, daisy chain manager 90 first instructs key delivery
`program 80 to select SMS bridge communication program
`84 to send the key using SMS service. Second, daisy-chain
`manager 90 monitors delivery of the key. Third, should
`delivery fail daisy-chain manager 90 instructs key delivery
`program 80 to select voice bridge program 86 to send the
`key using telephone service. Fourth, daisy-chain manager 90
`monitors delivery of the key. Fifth, should delivery fail
`daisy-chain manager 90 instructs key delivery program 80 to
`select email bridge program 82 to send the key using email
`scrvicc. Sixth, daisy-chain manager 90 monitors dclivcry of
`the key. If the delivery fails, daisy-chain manager 90 gen-
`erates an error message. If any delivery succeeds,
`the
`delivery activity ends.
`
`[0074] Referring to FIG. 3, in another embodiment of the
`present disclosure, system 20 performs the following pro-
`cedure in which the numbered procedural steps correspond
`to the encircled numbers in FIG. 3:
`
`1. User 30 uses user device 26 and first commu-
`[0075]
`nication service 32 to enter and send a usemame and a
`
`password to facility computer 22.
`
`2. Library program 48 receives the usemame and
`[0076]
`password and requests key server 24 to send a key to
`user 30.
`
`3. Key generation and management program 68
`[0077]
`validates the usemame and password using the user
`profile information.
`
`Y g
`g
`eneration and mana eme11t
`4. If validated, ke
`0078
`program 68 generates the key, stores it in the user
`profile and hands the key to communication server 28.
`
`5. Communication server 28 uses a predeter-
`[0079]
`mined one of communication bridges 82, 84 or 86 and
`second communication service 34 to deliver the key to
`user 30.
`
`6. User 30 enters a second password [or biomet-
`[0080]
`ric token] using user device 26 and second communi-
`cation service 34.
`
`7. Communication server 28 receives and deliv-
`[0081]
`ers the second password to key server 24.
`
`8. Key generation and management program 68
`[0082]
`stores the second pass word in user profile 70.
`
`9. User 30 enters key using user device 26 and
`[0083]
`first communication service 32.
`
`10. Facility computer 22 sends the key to key
`[0084]
`server 24 and key generation and management program
`68 authenticates user 30 using username, first pass-
`word, second password and key.
`
`In the above embodiment, user 30 enters a user-
`[0085]
`narne and first password into system 20. Library program 48
`requests that a key be sent to the user 30. Key server 24
`validates the usemame and first password using user profile
`70 or external authentication source 74. If valid to date, key
`server 24 generates the key, stores it in user profile (with
`expiry time), and hands it to communication server 28 with
`the identity of the appropriate communication bridge
`(defined in user profile). Communication server 28 using the
`second communication service 34 then notifies user 30 that
`
`a key is ready and requests a second password. User 30
`enters the second password (or biometric token) using user
`device 26 and second communication service 34. Commu-
`
`nication server 28 delivers the second password to key
`server 24. Key server 24 validates that token before instruct-
`ing communication server 28 to send the key using com-
`munication service 34. User 30 uses user device 26 a11d
`
`communication service 32 to enter the key into system 22.
`Facility server 22 sends the key to key server 24. Key server
`24 further authenticates user 30 using the key.
`In this
`embodiment, key generation and management program 68
`comprises code for steps 3, 4, 8 and 10. Key delivery
`program 80 comprises code for steps 5 and 7. Library
`program 48 comprises code for steps 2 and 9.
`
`[0086] The second password can be any word, phrase,
`biometric token, or any combination thereof. In one pre-
`ferred embodiment,
`the second password is a biometric
`symbol of user 30. The biometric symbol, for example may
`be a voiceprint, an iris scan, a fingerprint, a photograph or
`other biometric symbol of user 30.
`
`8
`
`
`
`US 2007/0022301 A1
`
`Jan. 25, 2007
`
`[0087] The present disclosure defines the components
`required for the process to operate within set norms of
`security, but does not place any limitations on implementa-
`tion. The norms defined are: (a) two-factor, with the key
`from the second factor (the virtual fob) being sent over the
`same service as the password;
`(b) two-factor, over two
`services, with a second key (something the user knows)
`being sent over the second service; and (c) tl1ree-factor over
`two services; and (d) device chaining in order to ensure
`delivery of requested keys.
`
`[0088] The present disclosure having been thus described
`with particular reference to the preferred forms thereof, it
`will be obvious that various changes and modifications may
`be made therein without departing from the spirit and scope
`of the present disclosure as defined in the appended claims.
`
`What is claimed is:
`
`1. A system that authenticates a user comprising a com-
`puter that receives a first factor and a third factor that are sent
`by said user using a first communication service and a
`second communication service, respectively, wherein said
`computer comprises a program that (a) generates a second
`factor,
`(b) validates said first and third factors,
`(c) then
`causes said second factor to be sent to said user using said
`second co111n1unicatio11 service a11d (d) after receipt of said
`second factor sent by said user, using said first communi-
`cation service authenticates said user by validating said
`second factor.
`
`2. The system of claim 1, wherein said first and third
`factors are different from one another.
`
`3. The system of claim 2, wherein said first and third
`factors are selected from the group consisting of: password,
`pass phrase, username and any combination thereof.
`4. The system of claim 2, wherein said third factor is a
`biometric symbol of said user.
`5. The system of claim 4, wherein said biometric symbol
`is selected from the group consisting of: a voiceprint, an iris
`scan, a fingerprint, a photograph or other symbol of a
`physical part of said user.
`6. The system of claim 1, wherein said first communica-
`tion service is an online service.
`
`7. The system of claim 1, wherein said second commu-
`nication service is selected from the group consisting of:
`SMS, email, telephone and page.
`8. The system of claim 1, wherein said second factor
`comprises one or more series of alphabetic characters,
`numeric characters or both.
`
`9. The system of claim 1, wherein said program validates
`said first and third factors by comparison with a repository
`of personal data of said user.
`10. A method that authenticates a user comprising:
`
`using a computer to perform the steps of:
`
`receiving a first factor and a third factor that are sent by
`said user using a first communication service and a
`second communication service, respectively;
`
`generating a second factor;
`
`validating said first and third factors;
`
`then causing said second factor to be sent to said user
`using said second communication service; and
`
`after receipt of said second factor sent by said user using
`said first communication service, authenticating said
`user by validating said second factor.
`11. The method of claim 10, wherein said first and third
`factors are different from one another.
`
`12. "he method of claim 11, wherein said first and third
`factors are selected from the group consisting of: password,
`pass phrase, username and any combination thereof.
`13. "he method of claim 11, wherein said third factor is
`a biometric symbol of said user.
`14. The method of claim 13, wherein said biometric
`symbol is selected from the group consisting of: a voice-
`print, an iris scan, a fingerprint, a photograph and other
`symbol of a physical part of said user.
`15. "he method of claim 10, wherein said first commu-
`nication service is an online service.
`
`16. "he method of claim 10, wherein said second com-
`munication service is selected from the group consisting of:
`SMS, email, telephone and page.
`17. "he method of claim 10, wherein said second factor
`comprises one or more series of alphabetic characters,
`numeric characters or both.
`
`18. The method of claim 10, wherein said program
`validates said first and third factors by comparison with a
`repository of personal data of said user.
`19. A system comprising a computer that validates a user
`of an online service using a first factor and a second factor,
`wherein said computer sends said second factor to said user
`using an order of communication services other than said
`online service for delivery of said second factor to said user,
`wherein if there is a failure of delivery in a first communi-
`cation service used in said order, said computer sends said
`second factor to said user using one of said communication
`services that is second in said order.
`
`20. The system of claim 19, wherein said first and second
`communication services are different than and independent
`of one another and said online service.
`
`21. The system of claim 19, wherein said computer
`automatically uses said second communication service with-
`out any input from said user.
`22. The system of claim 19, wherein said communication
`service is a member of the group consisting of: SMS, email,
`telephone and page.
`23. The system of claim 19, wherein said computer
`authenticates said user using said first factor, said second
`factor and a third factor, wherein said first factor is a first
`password and/or usemame, wherein said second factor is a
`key and wherei