throbber
US008266432B2
`
`(12) United States Patent
`Asghari-Kamrani et a].
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 8,266,432 B2
`*Sep. 11, 2012
`
`(54)
`
`(76)
`
`CENTRALIZED IDENTIFICATION AND
`AUTHENTICATION SYSTEM AND METHOD
`
`Inventors: Nader Asghari-Kamrani, Centreville,
`VA (US); Kamran Asghari-Kamrani,
`Centreville, VA (US)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`USC 154(b) by 0 days.
`This patent is subject to a terminal dis
`claimer.
`
`(21)
`
`Appl. N0.: 12/210,926
`
`(22)
`
`Filed:
`
`Sep. 15, 2008
`
`(65)
`
`(63)
`
`(60)
`
`(51)
`
`(52)
`
`(58)
`
`Prior Publication Data
`
`US 2009/0013182 A1
`
`Jan. 8, 2009
`
`Related US. Application Data
`
`Continuation of application No. 11/239,046, ?led on
`Sep. 30, 2005, now Pat. No. 7,444,676, which is a
`continuation of application No. 09/940,635, ?led on
`Aug. 29, 2001, now Pat. No. 7,356,837.
`
`Provisional application No. 60/615,603, ?led on Oct.
`5, 2004.
`
`Int. Cl.
`(2006.01)
`H04L 29/06
`(2012.01)
`G06Q 20/00
`US. Cl. .......... .. 713/168; 713/184; 705/67; 705/74;
`705/78
`
`Field of Classi?cation Search .................. .. 726/21,
`726/25, 212, 8, 18, 27, 28; 713/155, 168,
`713/170, 182*186; 705/35, 39, 44, 50, 64,
`705/67, 72, 76, 78
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,747,050 A
`5/1988 Brachtlet 31.
`4,965,568 A 10/1990 Atalla et a1.
`5,535,276 A *
`7/1996 Ganesan ..................... .. 713/155
`5,732,137 A *
`3/1998 Aziz ............ ..
`713/155
`5,883,810 A *
`3/1999 Franklin et a1.
`700/232
`6,067,621 A *
`5/2000 Yu et a1. ....... ..
`713/172
`
`6,236,981 B1* 5/2001 Hill . . . . . . . . . . . . .
`
`. . . .. 705/67
`
`6,338,140 B1* 1/2002 Owens et a1. ............... .. 713/168
`(Continued)
`Primary Examiner * Gilberto Barron, Jr.
`Assistant Examiner * Abdulhakim Nobahar
`(74) Attorney, Agent, or Firm *Michael P. Fortkort, Esq.;
`Michael P For‘tkort PC
`(57)
`ABSTRACT
`A method and system is provided by a Central-Entity, for
`identi?cation and authorization of users over a communica
`tion network such as lntemet. Central-Entity centralizes users
`personal and ?nancial information in a secure environment in
`order to prevent the distribution of user’s information in
`e-commerce. This information is then used to create digital
`identity for the users. The digital identity of each user is
`dynamic, non predictable and time dependable, because it is
`a combination of user name and a dynamic, non predictable
`and time dependable secure code that will be provided to the
`user for his identi?cation. The user will provide his digital
`identity to an EXtemal-Entity such as merchant or service
`provider. The EXtemal-Entity is dependent on Central-Entity
`to identify the user based on the digital identity given by the
`user. The External-Entity forwards user’s digital identity to
`the Central-Entity for identi?cation and authentication of the
`user and the transaction. The identi?cation and authentication
`system provided by the Central-Entity, determines whether
`the user is an authorized user by checking whether the digital
`identity provided by the user to the EXtemal-Entity, corre
`sponds to the digital identity being held for the user by the
`authentication system. If they correspond, then the authenti
`cation system identi?es the user as an authorized user, and
`sends an approval identi?cation and authorization message to
`the EXtemal-Entity, otherwise the authentication system will
`not identify the user as an authorized user and sends a denial
`identi?cation and authorization message to the EXtemal-En
`tity.
`
`55 Claims, 5 Drawing Sheets
`
`Cnmmunlclllnn
`
`m I [K
`(such as hum-n
`
`30
`
`1
`
`USAA 1001
`
`

`
`US 8,266,432 B2
`Page 2
`
`US. PATENT DOCUMENTS
`6,529,885 131* 30003 Johnson ““““““““““““ “ 705/64
`6,715,082 Bl* 3/2004 chang etal.
`.. 726/8
`7,150,038 Bl* 12/2006 sarnar .......... ..
`.. 726/8
`.
`.
`7,353,541 Bl* 4/2008 Ish1bash1 et a1.
`726/26
`7,546,274 B2* 6/2009 Ingrarn et a1.
`705/43
`2002/0040346 A“ ‘V2002 Kw‘m """" "
`705/51
`2002/0046189 Al* 4/2002 Moritaetal.
`705/67
`2002/0069174 A1* 6/2002 Fox et a1. ...................... .. 705/52
`
`2002/0133412 Al* 9/2002 Oliver et a1. .................. .. 705/26
`*
`2002/0184143 Al* 12/2002 Khater
`.. 705/39
`2002/0188481 A1 12/2002 Berg etal.
`705/4
`*
`2004/0030752 A1
`2/2004 Selgas et a1. ................ .. 709/206
`,,
`2005/0222963 A1 10/2005 Johnson ........................ .. 705/67
`,1
`-
`2007/0073621 A1
`3/2007 Du11n et a1.
`.. 705/50
`,1
`-
`2008/0016003 A1
`1/2008 Hutch1s0n et a1.
`.. 705/67
`2010/0100724 Al* 4/2010 Kaliski Jr
`713/155
`’
`' """"""""" "
`
`* cited by examiner
`
`2
`
`

`
`US. Patent
`
`Sep. 11,2012
`
`Sheet 1 of5
`
`US 8,266,432 B2
`
`10
`
`USER 1
`
`10
`
`USER 2
`
`10
`
`50
`
`20
`
`External-Entity 1
`
`20
`
`I
`
`0123:: Ion 1 External-Entlty 2
`(such as Internet)
`
`C
`
`.
`
`t.
`
`USER 3 1
`
`20
`
`External-Entity 3
`
`Central-Entity
`
`Figure 1
`
`3
`
`

`
`US. Patent
`
`Sep. 11,2012
`
`Sheet 2 of5
`
`US 8,266,432 B2
`
`Personal or Financial information
`
`SecureCode
`Generation
`
`.
`
`.
`
`.
`
`\ Dlgltalldentlty
`_Comparison
`
`/ G \
`
`i
`
`Account Information
`
`RoquestlReeeive SecureCode
`
`A Communication
`
`\ Central-Entity I,
`
`Registration Phase
`Steps:
`
`Transaction Phase
`Steps:
`
`Identification & Authorization Phase
`Steps:
`
`Figure 2
`
`4
`
`

`
`US. Patent
`
`Sep. 11, 2012
`
`Sheet 3 0f 5
`
`US 8,266,432 B2
`
`100
`
`104
`
`108
`
`User signs-up at the Central
`Entity by providing his personal
`or financial information
`
`Central-Entity creates an
`account for the USER
`
`USER receives account
`information from the Central
`Entity, including UserName and
`Password
`
`@
`
`110
`
`Figure 3
`
`5
`
`

`
`US. Patent
`
`Sep. 11,2012
`
`Sheet 4 of5
`
`US 8,266,432 B2
`
`108
`
`110\
`
`114\
`
`118\
`
`120
`
`124
`
`USER attempts to get access to
`a restricted web site OR to buy
`goods/services
`
`USER requests SecureCode
`from the Central-Entity over the
`communication network
`
`Central-Entity generates
`dynamic, non-predictable and
`time dependent SecureCode
`
`USER receives the SecureCode
`
`USER provides his UserName
`and SecureCode as digital
`identity to the External-Entity for
`identification
`
`130
`
`Figure 4
`
`6
`
`

`
`US. Patent
`
`Sep. 11,2012
`
`Sheet 5 of5
`
`US 8,266,432 B2
`
`124
`
`130 \
`
`The External-Entlty forwards the
`user's tllgllal Identity along wlth
`the Identl?cetlon and
`euthen?catlon request to the
`Oentral-Entlty
`
`134 \ The Central-Entlty locates the
`
`USER's dlgltal Identity In the
`system
`
`1 38
`\~. Central-Entity compares the
`user's digital identity retrieved
`‘from the system to the digital
`Identity resolved from the
`External-Entity
`
`150 /
`
`Central-Entity sends a denial
`l'll—ll ldenttlicatlon and authorlzatlen
`message to the Eartemal-Entlty
`
`Central-Entity sends an approval
`lrtentlfleatlon and aulhorlzstlen
`message to the External-Entlty
`
`Figure 5
`
`7
`
`

`
`US 8,266,432 B2
`
`1
`CENTRALIZED IDENTIFICATION AND
`AUTHENTICATION SYSTEM AND METHOD
`
`RELATED APPLICATIONS
`
`This application is a Continuation of application Ser. No.
`11/239,046, ?led Sep. 30, 2005 now US. Pat. No. 7,444,676,
`with a priority of a US. provisional application 60/615,603,
`?led Oct. 5, 2004, with the same inventors and assignee. This
`application is also a Continuation of another US. application
`Ser. No. 09/940,635, ?ledAug. 29, 2001, and patented as US.
`Pat. No. 7,356,837, on Apr. 8, 2008, titled “Centralized iden
`ti?cation and authentication system and method”, with the
`same inventors and assignee. Please note that the current
`application has the same exact speci?cation and Figures as
`those submitted with the original application Ser. No. 09/ 940,
`635, ?led Aug. 29, 2001.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of the Invention
`The present invention relates to a centralized identi?cation
`and authentication system and method for identifying an indi
`vidual over a communication network such as Internet, to
`increase security in e-commerce. More particularly a method
`and system for generation of a dynamic, non-predictable and
`time dependent SecureCode for the purpose of positively
`identifying an individual.
`2. Description of the Related Art
`The increasing use of the Internet and the increase of busi
`nesses utilizing e-commerce have lead to a dramatic increase
`in customers releasing con?dential personal and ?nancial
`information, in the form of social security numbers, names,
`addresses, credit card numbers and bank account numbers, to
`identify themselves. This will allow them to get access to the
`restricted web sites or electronically purchase desired goods
`or services. Unfortunately this type of identi?cation is not
`only unsafe but also it is not a foot proof that the user is really
`the person he says he is. The effect of these increases is
`re?ected in the related art.
`US. Pat. No. 5,732,137 issued to Aziz outlines a system
`and method for providing remote user authentication in a
`public computer network such as the Internet. More speci?
`cally, the system and method provides for remote authentica
`tion using a one-time password scheme having a secure out
`of-band channel for initial password delivery.
`US. Pat. No. 5,815,665 issued to Teper et al. outlines the
`use of a system and method for enabling consumers to anony
`mously, securely and conveniently purchase on-line services
`from multiple service providers over a distributed network,
`such as the Internet. Speci?cally, a trusted third-party broker
`provides billing and security services for registered service
`providers via an online brokering service, eliminating the
`need for the service providers to provide these services.
`US. Pat. No. 5,991,408 issued to Pearson, et al. outlines a
`system and method for using a biometric element to create a
`secure identi?cation and veri?cation system, and more spe
`ci?cally to an apparatus and a method for creating a hard
`problem which has a representation of a biometric element as
`its solution.
`Although each of the previous patents outline a valuable
`system and method, what is really needed is a system and
`method that offers digital identity to the users and allows
`them to participate in e-commerce without worrying about
`the privacy and security. In addition to offering security and
`privacy to the users, the new system has to be simple for
`businesses to adopt and also doesn’t require the ?nancial
`
`10
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`institutions to change their existing systems. Such a secure,
`?exible and scalable system and method would be of great
`value to the businesses that would like to participate in
`today’s electronic commerce.
`None of the above inventions and patents, taken either
`singularly or in combination, is seen to describe the instant
`invention as claimed. Thus a centralized identi?cation and
`authentication system and method solving the aforemen
`tioned problems is desired.
`For convenience, the term “user” is used throughout to
`represent both a typical person consuming goods and services
`as well as a business consuming goods and services.
`As used herein, a “Central-Entity” is any party that has
`user’s personal and/or ?nancial information, UserName,
`Password and generates dynamic, non-predictable and time
`dependable SecureCode for the user. Examples of Central
`Entity are: banks, credit card issuing companies or any inter
`mediary service companies.
`As also used herein, an “External-Entity” is any party
`offering goods or services that users utilize by directly pro
`viding their UserName and SecureCode as digital identity.
`Such entity could be a merchant, service provider or an online
`site. An “Extemal-Entity” could also be an entity that receives
`the user’s digital identity indirectly from the user through
`another External-Entity, in order to authenticate the user, such
`entity could be a bank or a credit card issuing company.
`The term “UserName” is used herein to denote any alpha
`numeric name, id, login name or other identi?cation phrase,
`which may be used by the “Central-Entity” to identify the
`user.
`The term “Password” is used herein to denote any alpha
`numeric password, secret code, PIN, prose phrase or other
`code, which may be stored in the system to authenticate the
`user by the “Central-Entity”.
`The term “SecureCode” is used herein to denote any
`dynamic, non-predictable and time dependent alphanumeric
`code, secret code, PIN or other code, which may be broadcast
`to the user over a communication network, and may be used
`as part of a digital identity to identify a user as an authorized
`user.
`The term “digital identity” is used herein to denote a com
`bination of user’ s “SecureCode” and user’s information such
`as “UserName”, which may result in a dynamic, non-predict
`able and time dependable digital identity that could be used to
`identify a user as an authorized user.
`The term “?nancial information” is used herein to denote
`any credit card and banking account information such as debit
`cards, savings accounts and checking accounts.
`
`SUMMARY OF THE INVENTION
`
`The invention relates to a system and method provided by
`a Central-Entity for centralized identi?cation and authentica
`tion of users and their transactions to increase security in
`e-commerce. The system includes:
`A Central-Entity: This entity centralizes users personal and
`?nancial information in a secure environment in order to
`prevent the distribution of user’ s information in e-com
`merce. This information is then used to create digital
`identity for the users. The users may use their digital
`identity to identify themselves instead of providing their
`personal and ?nancial information to the Extemal-Enti
`ties;
`A plurality of users: A user represents both a typical person
`consuming goods and services as well as a business
`consuming goods and services, who needs to be identi
`?ed in order to make online purchases or to get access to
`
`8
`
`

`
`US 8,266,432 B2
`
`3
`the restricted Web sites. The user registers at the Central
`Entity to receive his digital identity, Which is then pro
`vided to the EXtemal-Entity for identi?cation;
`A plurality of External-Entities: An EXtemal-Entity is any
`party offering goods or services in e-commerce and
`needs to authenticate the users based on digital identity.
`The user signs-up at the Central-Entity by providing his
`personal or ?nancial information. The Central-Entity creates
`a neW account With user’s personal or ?nancial information
`and issues a unique UserName and PassWord to the user. The
`user provides his Username and PassWord to the Central
`Entity for identi?cation and authentication purposes When
`accessing the services provided by the Central-Entity. The
`Central-Entity also generates dynamic, non-predictable and
`time dependent SecureCode for the user per user’s request
`and issues the SecureCode to the user. The Central-Entity
`maintains a copy of the SecureCode for identi?cation and
`authentication of the user’ s digital identity. The user presents
`his UserName and SecureCode as digital identity to the Exter
`nal-Entity for identi?cation. When an External-Entity
`receives the user’s digital identity (UserName and Secure
`Code), the External-Entity Will forWard this information to
`the Central-Entity to identify and authenticate the user. The
`Central-Entity Will validate the information and sends an
`approval or denial response back to the EXtemal-Entity.
`There are also communications netWorks for the user, the
`Central-Entity and the EXtemal-Entity to give and receive
`information betWeen each other.
`This invention also relates to a system and method pro
`vided by a Central-Entity for centraliZed identi?cation and
`authentication of users to alloW them access to restricted Web
`sites using their digital identity, preferably Without revealing
`con?dential personal or ?nancial information.
`This invention further relates to a system and method pro
`vided by a Central-Entity for centraliZed identi?cation and
`authentication of users to alloW them to purchase goods and
`services from an External-Entity using their digital identity,
`preferably Without revealing con?dential personal or ?nan
`cial information.
`Accordingly, it is a principal object of the invention to offer
`digital identity to the users for identi?cation in e-commerce.
`It is another object of the invention to centraliZe user’s
`personal and ?nancial information in a secure environment.
`It is another object of the invention to prevent the user from
`distributing their personal and ?nancial information.
`It is a further object of the invention to keep merchants,
`service providers, Internet sites and ?nancial institutions sat
`is?ed by positively identifying and authenticating the users.
`It is another object of the invention to reduce fraud and
`increase security for e-commerce.
`It is another object of the invention to alloW businesses to
`control visitor’s access to their Web sites.
`It is another object of the invention to protect the customer
`from getting bills for goods and services that Were not
`ordered.
`It is another object of the invention to increase customers’
`trust and reduce customers’ fear for e-commerce.
`It is another object to decrease damages to the customers,
`merchants and ?nancial institutions.
`It is an object of the invention to provide improved ele
`ments and arrangements thereof for the purposes described
`Which are inexpensive, dependable and fully effective in
`accomplishing its intended purposes.
`These and other objects of the present invention Will
`become readily apparent upon further revieW of the folloWing
`speci?cation and draWings.
`
`4
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a high-level overvieW of a centraliZed identi?ca
`tion and authentication system and method according to the
`present invention.
`FIG. 2 is a detailed overvieW of a centraliZed identi?cation
`and authentication system and method according to the
`present invention.
`FIG. 3 is a block diagram of the registration of a customer
`utiliZing a centraliZed identi?cation and authentication sys
`tem and method according to the present invention.
`FIG. 4 is a block diagram of the transaction of a customer
`utiliZing a centraliZed identi?cation and authentication sys
`tem and method according to the present invention.
`FIG. 5 is a block diagram of a Central-Entity authorizing a
`user utiliZing a centraliZed identi?cation and authentication
`system and method according to the present invention.
`
`DETAILED DESCRIPTION OF THE PREFERRED
`EMBODIMENTS
`
`20
`
`Detailed descriptions of the preferred embodiment are pro
`vided herein. It is to be understood, hoWever, that the present
`invention may be embodied in various forms. Therefore, spe
`ci?c details disclosed herein are not to be interpreted as lim
`iting, but rather as a basis for the claims and as a representa
`tive basis for teaching one skilled in the art to employ the
`present invention in virtually any appropriately detailed sys
`tem, structure or manner.
`The invention relates to a system 1 and method 2 to identify
`and authenticate the users and their transactions to increase
`security in e-commerce. FIG. 1 illustrates a system to posi
`tively identify the users 10 in e-commerce based on digital
`identity.
`The system 1 comprises a plurality of users 10, a plurality
`of Extemal-Entities 20 With goods and services that are
`desired by the users 10 and a Central-Entity 30 providing a
`unique UserName and PassWord to the users 10 and generat
`ing dynamic, non-predictable and time dependent Secure
`Code for the users 10 per user’s request. There are also com
`munication netWorks 50 for the user 10, the Central-Entity 30
`and the EXtemal-Entity 20 to give and receive information
`betWeen each other.
`It Would be desirable to develop a neW system 1 and
`method 2 to centraliZe user’s personal and ?nancial informa
`tion in a secure environment and to offer digital identity to the
`users 10 in order to provide privacy, increase security and
`reduce fraud in e-commerce. Ideally, a secure identi?cation
`and authentication system 1 Would identify legitimate users
`10 and unauthoriZed users 10. This Would increase the user’ s
`trust, Which leads to more sales and cash ?oW for the mer
`chants/ service providers.
`The present invention relates to a system 1 and method 2 to
`support this ideal identi?cation and authentication system.
`For identi?cation purpose, a digital identity (a unique User
`Name and a dynamic, non-predictable and time dependent
`SecureCode) is used by the user 10 at the time of ordering or
`at the time of accessing a restricted Internet site. A series of
`steps describing the overall method are conducted betWeen
`the users 10, the Central-Entity 30 and the EXtemal-Entity 20
`and are outlined in FIG. 3,4,5.
`There are three distinct phases involved in using the cen
`traliZed identi?cation and authentication system FIG. 2, the
`?rst of Which being the registration phase, Which is depicted
`in FIG. 3. During the registration phase, the user 10 provides
`his personal or ?nancial information to the Central-Entity 30.
`The user 10 registers at the Central-Entity 30, 100, 104 and
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`9
`
`

`
`US 8,266,432 B2
`
`5
`receives his account and login information such as UserName
`and Password 108. User 10 can access his account at any time
`by accessing the Central-Entity’s system using a communi
`cation netWork 50 and logging into the system.
`Next is the transaction phase, Where the user 10 attempts to
`access a restricted Web site or attempts to buy services or
`products 110, as illustrated in FIG. 4, through a standard
`interface provided by the External-Entity 20, similar to What
`exists today and selects digital identity as his identi?cation
`and authorization or payment option. The EXtemal-Entity 20
`displays the access or purchase authorization form requesting
`the user 10 to authenticate himself using his UserName and
`SecureCode as digital identity. The user 10 requests Secure
`Code from the Central-Entity 30 by accessing his account
`over the communication netWork 50, 114. The Central-Entity
`30 generates dynamic, non-predictable and time dependable
`SecureCode 118 for the user 10. The Central-Entity 30 main
`tains a copy of the SecureCode for identi?cation and authen
`tication of the user 10 and issues the SecureCode to the user
`10. When the user 10 receives the SecureCode 120, the user
`10 provides his UserName and SecureCode as digital identity
`to the External-Entity 20, 124, FIG. 4.
`The third phase is identi?cation and authorization phase.
`Once the user 10 provides his digital identity to the Extemal
`Entity 20, the External-Entity 20 forWards user’s digital iden
`tity along With the identi?cation and authentication request to
`the Central-Entity 30, 130, as illustrated in FIG. 5. When the
`Central-Entity 30 receives the request containing the user’s
`digital identity, the Central-Entity 30 locates the user’ s digital
`identity (UserName and SecureCode) in the system 134 and
`compares it to the digital identity received from the Extemal
`Entity 20 to identify and validate the user 10, 138. The Cen
`tral-Entity 30 generates a reply back to the External-Entity 20
`via a communication netWork 50 as a result of the compari
`son. If both digital identities match, the Central-Entity 30 Will
`identify the user 10 and Will send an approval of the identi?
`cation and authorization request to the EXtemal-Entity 20,
`140, otherWise Will send a denial of the identi?cation and
`authorization request to the External-Entity 20, 150. The
`EXtemal-Entity 20 receives the approval or denial response in
`a matter of seconds. The EXtemal-Entity 20 might also dis
`play the identi?cation and authentication response to the user
`10.
`To use the digital identity feature, the Central-Entity 30
`provides the authorized user 10 the capability to obtain a
`dynamic, non-predictable and time dependable SecureCode.
`The user 10 Will provide his UserName and SecureCode as
`digital identity to the External-Entity 20 When this informa
`tion is required by the External-Entity 20 to identify the user
`10.
`The Central-Entity 30 may add other information to the
`SecureCode before sending it to the user 10, by algorithmi
`cally combining SecureCode With user’ s information such as
`UserName. The generated SecureCode Will have all the infor
`mation needed by the Central-Entity 30 to identify the user
`10. In this case the user Will only need to provide his Secure
`Code as digital identity to the External-Entity 20 for identi
`?cation.
`In the preferred embodiment, the user 10 uses the commu
`nication netWork 50 to receive the SecureCode from the Cen
`tral-Entity 30. The user 10 submits the SecureCode in
`response to External-Entity’ s request 124. The SecureCode is
`preferably implemented through the use of an indicator. This
`indicator has tWo states: “on” for valid and “off” for invalid.
`When the user 10 receives the SecureCode, the SecureCode is
`in “on” or “valid” state. The Central-Entity 30 may improve
`the level of security by invalidating the SecureCode after it’s
`
`20
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`use. This may increase the level of dif?culty for unauthorized
`user. TWo events may cause a valid SecureCode to become
`invalid:
`l . Timer event: This event occurs When the prede?ned time
`passes. As mentioned above the SecureCode is time depen
`dent.
`2. Validation event: This event occurs When the Secure
`Code forWarded to the Central-Entity 30 (as part of digital
`identity) corresponds to the user’s SecureCode held in the
`system. When this happens the Central-Entity 30 Will invali
`date the SecureCode to prevent future use and sends an
`approval identi?cation and authorization message to the
`EXtemal-Entity 20,140.
`A valid digital identity corresponds to a valid SecureCode.
`When the SecureCode becomes invalid, the digital identity
`Will also become invalid.
`While the invention has been described in connection With
`a preferred embodiment, it is not intended to limit the scope of
`the invention to the particular form set forth, but on the con
`trary, it is intended to cover such alternatives, modi?cations,
`and equivalents as may be included Within the spirit and scope
`of the invention as de?ned by the appended claims.
`The invention claimed is:
`1. A method for authenticating a user during an electronic
`transaction betWeen the user and an external-entity, the
`method comprising:
`receiving electronically a request for a dynamic code for
`the user by a computer associated With a central-entity
`during the transaction betWeen the user and the external
`entity;
`generating by the central-entity during the transaction a
`dynamic code for the user in response to the request,
`Wherein the dynamic code is valid for a prede?ned time
`and becomes invalid after being used;
`providing by the computer associated With the central
`entity said generated dynamic code to the user during the
`transaction;
`receiving electronically by the central-entity a request for
`authenticating the user from a computer associated With
`the eXtemal-entity based on a user-speci?c information
`and the dynamic code as a digital identity included in the
`request Which said dynamic code Was received by the
`user during the transaction and Was provided to the
`eXtemal-entity by the user during the transaction; and
`authenticating by the central-entity the user and providing
`a result of the authenticating to the eXtemal-entity dur
`ing the transaction if the digital identity is valid.
`2. A method as recited in claim 1, further comprising:
`combining said generated dynamic code With the user
`speci?c information using a predetermined algorithm to
`form a combined dynamic code and user speci?c infor
`mation;
`maintaining the combined dynamic code and user speci?c
`information at the central-entity;
`comparing the combined dynamic code and user speci?c
`information With a received combined dynamic code
`and user speci?c information to validate the user.
`3. The method of claim 1, Wherein the user speci?c infor
`mation comprises one or more of the folloWing: an alphanu
`meric name, an ID, a lo gin name, and an identi?cation phrase.
`4. The method of claim 1, Wherein the transaction corre
`sponds to a ?nancial transaction.
`5. The method of claim 1, Wherein the transaction corre
`sponds to a non-?nancial transaction.
`6. The method of claim 1, Wherein the transaction corre
`sponds to access to restricted Web-site or restricted computer/
`server.
`
`10
`
`

`
`US 8,266,432 B2
`
`7
`7. The method of claim 1, wherein said transaction occurs
`over a communication network, wherein said communication
`network comprises one or more of the following: a public
`network, the Internet, a wireless network, a mobile network,
`a satellite network, and a private network.
`8. The method of claim 1, wherein said transaction occurs
`over a communication network to which is coupled said user,
`said central-entity, and said external-entity.
`9. A method as recited in claim 2, wherein said algorith
`mically combined dynamic code and user speci?c informa
`tion is used to authenticate a user’s identity.
`10. A method as recited in claim 2, wherein said central
`entity is using said algorithmically combined dynamic code
`and user speci?c information to authenticate a user’ s identity.
`11. A method as recited in claim 1, wherein said extemal
`entity and said central-entity are the same entity.
`12. The method as recited in claim 1, wherein said central
`entity invalidates the dynamic code after authenticating the
`user.
`13. The method as recited in claim 1, wherein the central
`entity invalidates the dynamic code after a prede?ned period
`of time passes from when the dynamic code was generated.
`14. The method as recited in claim 1, wherein said central
`entity generates the dynamic code with dependence on the
`user information.
`15. The method as recited in claim 14, wherein said user
`information comprises one or more of the following: an
`alphanumeric name, an ID, a login name, and an identi?ca
`tion phrase.
`16. The method as recited in claim 1, wherein said user
`communicates with said central-entity over a communication
`network.
`17. The method as recited in claim 1, wherein said user
`communicates with said external-entity over a communica
`tion network.
`18. The method as recited in claim 1, wherein said dynamic
`code is generated based on a request submitted by said user
`over a communication network.
`19. The method as recited in claim 18, wherein said request
`is initiated by said user through a standard interface provided
`to said user.
`20. A method as recited in claim 1, wherein said digital
`identity is invalid if the dynamic code is invalid.
`21. A method as recited in claim 1, wherein said digital
`identity is valid if at least the dynamic code is valid.
`22. A method as recited in claim 1, wherein said extemal
`entity authenticates the user upon receiving an a?irmation
`authentication message from the central-entity.
`23. A method as recited in claim 1, wherein said extemal
`entity authenticates the user if said central-entity authenti
`cates the user based on the dynamic code.
`24. The method of claim 1, wherein the user-speci?c infor
`mation includes user-identifying information.
`25. An apparatus for authenticating a user during an elec
`tronic transaction with an external-entity, the apparatus com
`prising:
`a ?rst central-entity computer adapted to:
`generate a dynamic code for the user in response to a
`request during the electronic transaction, wherein the
`dynamic code is valid for a prede?ned time and
`becomes invalid after being used; and
`provide said dynamic code to the user during the elec
`tronic transaction;
`a second central-entity computer adapted to validate a digi
`tal identity in response to an authentication request from
`the eXtemal-entity, which authentication request
`includes a user-speci?c information and the dynamic
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`65
`
`8
`code as the digital identity which dynamic code was
`received by the user during the electronic transaction
`and was provided to the eXtemal-entity by the user dur
`ing the electronic transaction, and to authenticate the
`user if the digital identity is valid and to provide a result
`of the authentication of the user to the external-entity
`during the electronic transaction.
`26. The apparatus as recited in claim 25, wherein said user
`has a pre-existing relationship with the external-entity.
`27. The apparatus as recited in claim 25, wherein said user
`has no pre-existing relationship with the external-entity.
`28. The apparatus as

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket