throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US008781975B2
`
`c12) United States Patent
`Bennett et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,781,975 B2
`Jul. 15, 2014
`
`(54) SYSTEM AND METHOD OF FRAUD
`REDUCTION
`
`(75)
`
`Inventors: Naftali Bennett, New York, NY (US);
`Lior Golan, Tel Aviv (IL); Nira Rivner,
`Ramat Gan (IL)
`
`(73) Assignee: EMC Corporation, Hopkinton, MA
`(US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 1436 days.
`
`5,819,226 A
`5,903,721 A
`6,049,787 A
`6,064,972 A
`6,105,010 A
`6,233,565 B1
`6,330,546 B1
`6,496,936 B1
`6,668,323 B1
`6,853,988 B1
`6,880,088 B1
`7,051,003 B1
`7,107,295 B2
`7,249,112 B2
`
`10/1998 Gopinathan et a!.
`511999 Sixtus
`4/2000 Takahashi et al.
`5/2000 Jankowitz eta!.
`8/2000 Musgrave
`5/2001 Lewis et a!.
`12/2001 Gopinathan eta!.
`12/2002 French eta!.
`12/2003 Challener eta!.
`2/2005 Dickinson eta!.
`4/2005 Gazier eta!.
`5/2006 Kobata eta!.
`9/2006 Shimizu eta!.
`7/2007 Berardi eta!.
`(Continued)
`
`(21) Appl. No.: 11/134,479
`
`(22) Filed:
`
`May23, 2005
`
`(65)
`
`Prior Publication Data
`
`US 2005/0273442 AI
`
`Dec. 8, 2005
`
`Related U.S. Application Data
`
`(60) Provisional application No. 60/572,776, filed on May
`21,2004.
`
`(51)
`
`(2012.01)
`
`Int. Cl.
`G06Q 20100
`(52) U.S. Cl.
`USPC . ... ... ... .. ... ... ... ... ... .. ... ... ... ... ... .. ... ... ... ... .. 705/67
`(58) Field of Classification Search
`USPC .............. 705/67, 16, 21, 59, 71; 380/44, 262,
`380/278, 279
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,858,117 A
`5,708,422 A
`
`8/1989 DiChiara et al.
`111998 Blonder et a!.
`
`FOREIGN PATENT DOCUMENTS
`
`EP
`EP
`
`3/1993
`0 534 673
`1/2002
`1 176 489
`(Continued)
`
`OTHER PUBLICATIONS
`
`International Search Report for International Application No. PCT/
`US04/29690 mailed Mar. 9, 2007.
`
`(Continued)
`
`Primary Examiner- Calvin L Hewitt, II
`(74) Attorney, Agent, or Firm- BainwoodHuang
`
`(57)
`
`ABSTRACT
`
`A system and method may allow for extending authentication
`to a two factor, out of band form, requiring an additional data
`element or code via a channel different from the channel used
`for the primary transaction, where the different channel has
`the attribute that it is difficult or costly to achieve many access
`points to it, and it is possible to limit the number of users
`associated with a particular access point to it.
`
`19 Claims, 4 Drawing Sheets
`
`18
`
`/ 12
`
`13
`
`ONLINE SYSTEM
`
`I AUTHENTICATION
`
`LOCAL MODULE
`(PLUG IN)
`
`~17
`
`/11
`
`HOSTED SYSTEM
`
`14
`
`END
`USER
`
`15
`
`(
`
`10
`
`TWILIO INC. Ex. 1005 Page 1
`
`

`
`US 8, 781,975 B2
`Page 2
`
`(56)
`
`References Cited
`
`FOREIGN PATENT DOCUMENTS
`
`U.S. PATENT DOCUMENTS
`
`7,631,193 B1
`12/2009 Hoffman
`2003/0101348 A1 * 5/2003 Russo eta!. .................. 713/185
`2003/0163739 A1 * 8/2003 Armington et al . ........... 713/202
`2003/0172272 A1 * 9/2003 Ehlers et al . .................. 713/170
`2003/0174823 A1 * 9/2003 Justice et a!.
`................. 379/145
`2003/0177246 A1
`9/2003 Goodman et a!.
`2004/0044621 A1
`3/2004 Huang eta!.
`2004/0199462 A1 * 10/2004 Starrs .............................. 705/39
`2004/0215574 A1 * 10/2004 Michelsen et a!. .............. 705/64
`2004/0230527 A1 * 1112004 Hansen eta!. .................. 705/40
`2004/0243832 A1 * 12/2004 Wilfetal. ..................... 713/200
`2004/0260651 A1 * 12/2004 Chan eta!. ...................... 705/50
`2005/0097320 A1 * 5/2005 Golan eta!. .................. 713/166
`2005/0144279 A1 * 6/2005 Wexelblat ..................... 709/225
`2009/0089869 A1 * 4/2009 Varghese .......................... 726/7
`2012/0109824 A1 * 5/2012 Takatori et a!. ................. 705/44
`
`EP
`JP
`JP
`JP
`JP
`JP
`JP
`wo
`wo
`wo
`
`8/2003
`8/1999
`10/2002
`112003
`3/2003
`3/2003
`7/2003
`1111999
`3/2001
`1112001
`
`1 339 199
`11-212922
`2002-304522
`2003-006161
`2003-091509
`2003-091650
`2003-196566
`wo 99/60482
`wo 01122651
`wo 01190861
`OTHER PUBLICATIONS
`Supplementary European Search Report for Application No. EP 04
`80 9730 dated Dec. 11, 2008.
`International Search Report for International Application No. PCT/
`US05/18102 mailed May 23, 2007.
`* cited by examiner
`
`TWILIO INC. Ex. 1005 Page 2
`
`

`
`U.S. Patent
`
`Jul. 15, 2014
`
`Sheet 1 of 4
`
`US 8,781,975 B2
`
`/14
`
`END
`USER
`
`~
`
`15
`
`( 18
`
`/12
`
`ONLINE SYSTEM
`
`AUTHENTICATION
`LOCAL MODULE ~13
`(PLUG IN)
`
`-
`
`·17
`
`(11
`
`HOSTED SYSTEM
`
`/ 10
`
`FIG.l
`
`TWILIO INC. Ex. 1005 Page 3
`
`

`
`U.S. Patent
`
`Jul. 15, 2014
`
`Sheet 2 of 4
`
`US 8,781,975 B2
`
`12
`(
`
`\3
`AUTHENTICATION
`LOCAL MODULE
`1 ?1
`
`HS
`VALIDATION
`
`1?2
`
`PROXY
`MAPPING
`
`ONLINE SYSTEM
`1(2
`
`1 ?3
`ADMIN.
`APP.
`
`f - -
`
`-
`
`115
`
`\
`
`11
`(
`
`1?4
`
`CONF.
`RULES
`DB
`1?7
`
`1?5
`
`USER
`DEVICE
`MAPPING
`
`1?6
`
`RISK
`ASS.
`
`1 1 ?s
`
`ALERT
`LEVEL
`MONITOR
`
`~
`
`L-
`
`-
`
`I
`
`DECISION ENGINE
`
`DECISION MAKING
`
`1 ~ 0
`
`CHANNEL
`- USER MAPPING
`DB
`
`HSM
`
`1 ~ 2
`
`1l3
`
`EXTERNAL
`COMMUNICATION
`ENGINES
`
`1?9
`
`HISTORY
`DB
`
`1 ( 1
`
`--
`
`-
`
`AUTHENTI-
`CATION
`APPLICATION
`
`11~
`
`END USER
`
`FIG.2
`
`AUTHENTICATION
`
`HOSTED SYSTEM
`
`1(4
`
`\
`
`10
`
`TWILIO INC. Ex. 1005 Page 4
`
`

`
`U.S. Patent
`
`Jul. 15, 2014
`
`Sheet 3 of 4
`
`US 8,781,975 B2
`
`REGULAR
`AUTHENTICATION
`
`EVALUATE
`AUTHENTICATION
`
`·200
`
`·200
`
`200
`
`PROCEED TO
`ONLINE APP.
`
`USER PROVIDES
`ADDITIONAL CHANNEL
`
`200
`
`200
`
`END
`SESSION
`
`SEND A COMPLETION CODE
`VIA ADDITIONAL CHANNEL
`
`200
`
`200
`
`USER ENTERS
`COMPLETION CODE
`
`-200
`
`200
`
`NO
`
`FIG.3
`
`TWILIO INC. Ex. 1005 Page 5
`
`

`
`U.S. Patent
`
`Jul. 15, 2014
`
`Sheet 4 of 4
`
`US 8,781,975 B2
`
`LOW LEVEL
`
`__,- 300
`
`ALERT
`
`~330
`lr
`
`RELEASE
`
`~360
`
`MEDIUM LEVEL
`
`__,- 310
`
`ALERT
`
`~340
`lr
`
`RELEASE
`
`~350
`
`HIGH LEVEL
`
`_____.-- 320
`
`FIG.4
`
`TWILIO INC. Ex. 1005 Page 6
`
`

`
`US 8,781,975 B2
`
`1
`SYSTEM AND METHOD OF FRAUD
`REDUCTION
`
`RELATED APPLICATION DATA
`
`The present application claims benefit from prior provi(cid:173)
`sional application Ser. No. 60/572,776 entitled "System and
`Method of Fraud Reduction", filed on May 21,2004, incor(cid:173)
`porated by reference herein in its entirety.
`
`FIELD OF THE INVENTION
`
`The present invention relates to authentication; more spe(cid:173)
`cifically the present invention may be used, for example, in
`authenticating parties in a transaction.
`
`BACKGROUND
`
`10
`
`2
`When faced with a major theft of user credentials, the
`service provider may execute one or more of the following
`options:
`Provider may operate its business at a much higher risk
`level, for example, may check and analyze transactions to
`make sure no fraudulent activity takes place.
`Provider may perform a costly operation of changing the
`user credentials or deploying a new authentication mecha(cid:173)
`msm.
`Provider may shut down parts of the business in case the
`other two options may not be acceptable.
`Provider may perform other sets of actions.
`The service provider may not have any external alert as to
`the occurrence of a massive credential theft. For example, it
`15 may not know when a large set of credentials is stolen by an
`insider job, or from a third party service provider. In addition,
`even when a large theft may be known, like in the case of a
`large phishing attempt, the service provider may not know
`when the stolen credentials will actually be used.
`Service providers may be therefore looking for alternative
`authentication options. Some of the alternative solutions
`offered today are:
`1. Provider may ask for shared secret information that
`changes over time and may be therefore more difficult to
`25 obtain or that may lose its value after some time, as it becomes
`irrelevant, for example, details about recent transactions, or
`invoicing.
`2. Provider may ask for random parts of shared secret
`information, for example, random digits of the password, or
`random data elements out of a set of known data elements
`3. Mobile or telephone authentication, for example, mobile
`telephone may be pre-registered to the service and may be
`used to authenticate the user
`4. Token based authentication
`The current solutions may not be satisfactory, since none of
`them may strike a good balance between security and usabil(cid:173)
`ity. Either they may not be secure enough, for example, asking
`for random pieces of a shared secret, information which may
`easily be obtained during the initial user credentials theft,
`may not be usable enough or may be too expensive to actually
`deploy, for example, token authentication which may be
`expensive to implement, may require customer education,
`and deployment ahead of time to all users.
`
`In parallel to the growth in use of online channels for
`accessing a variety of services, and performing a variety of 20
`transactions, identity theft has reached epidemic levels, and
`online account takeover and transaction fraud is growing at an
`enormous rate. Parties committing fraud ("fraudsters") have
`new technologies at their disposal: for example "Trojan
`horses" and key loggers may be installed in unsuspecting
`customers' computers, transmitting personal information
`back to the fraudster; and phishing attacks may trick consum-
`ers into giving up personal and financial information (for
`example without limitation: social security number ("SSN"),
`account numbers, banking information, user names and pass- 30
`words for various services, personal identification numbers
`("PINs"), credit card numbers, which may be referred to as
`for example "user Credentials" or "Credentials").
`Recent scams show a sophisticated, determined, innova(cid:173)
`tive and well organized online crime wave. Fraudsters are 35
`more adaptive than ever, modifying their modus operandi and
`techniques quickly to exploit new vulnerabilities. While the
`fraudsters do not limit themselves to a specific sector, their
`main focus is on the banking and financial accounts sectors
`(other sectors prone to fraud are government services, ISPs, 40
`telecom companies and healthcare and many others).
`One issue is authentication-how does a service or trans(cid:173)
`action provider know whether a certain user accessing a ser(cid:173)
`vice and performing actions at a certain site is who he or she
`claims to be. Using the combination of a login and password 45
`alone (which still are the most prevalent method of authenti(cid:173)
`cation) may not be satisfactory.
`Many solutions have been proposed for the problem of
`authentication, however many of them encounter an imbal(cid:173)
`ance between usability vs. security: they are either not secure 50
`enough, or, when security is enhanced to satisfactory levels,
`they are cumbersome and expensive to deploy and operate.
`Various service providers may use Credentials in order to
`authenticate users in remote applications. Authentication
`may be required whenever a sensitive operation takes place, 55
`for example, viewing personal information, performing
`financial transactions, updating the user's profile and more.
`During authentication the user may usually be required to
`supply a pre-established password and optionally an addi(cid:173)
`tional shared secret between the user and the service provider. 60
`Users' credentials may enable access to sensitive information
`as well as funds, and therefore getting hold of them has
`become a popular criminal activity Stealing users' credentials
`may be done in various ways. For example, theft of a file
`containing credentials from the bank or a third party (includ- 65
`ing an "inside job"), a large and successful "Phishing" attack,
`keyboard sniffing and more.
`
`SUMMARY
`
`Embodiments of the present invention may relate to a
`method and system for addressing massive theft (or suspected
`theft) of identification information used in order to access
`services that contain, for example, confidential information
`of the users of those services, services where the user can
`perform sensitive operations or other services. Such identifY(cid:173)
`ing information may include but is not limited to, for
`example, user-names, codes, passwords of any form, or any
`other personal identifYing data that can be used in order to
`access services that contain confidential information (re(cid:173)
`ferred herein as "Credentials" or "User Credentials").
`Embodiments of the present invention may relate to a
`method and/or system for authenticating a user participating
`in a transaction, for example, a financial transaction, opening
`an account, etc. A user may communicate with an institution
`via a first communication channel such as for example the
`Internet and a web site. The system may transmit a data
`element, for example a code, to the user via a second com(cid:173)
`munication channel, (the identification of which may be pro(cid:173)
`vided by the user, or may be generated in another manner), for
`example, a telephone connection, e-mail connection etc. The
`
`TWILIO INC. Ex. 1005 Page 7
`
`

`
`US 8,781,975 B2
`
`4
`embodiment may conduct transactions with a number of
`users, ensuring that for each one of the communication chan(cid:173)
`nels, only a certain number of users can use each access point
`to such communication channel. One of the communication
`channels may be the communication channel by which the
`transaction is conducted; but in alternate embodiments need
`not be. In some embodiments the code may be transmitted
`only on the suspicion as to the existence of a certain risk level.
`The risk level may be related to the transaction in some
`10 embodiments; but in alternate embodiments the risk level
`may be related to an event outside of the transaction. In some
`embodiments it may be possible to limit the number of users
`who may use an access point to one of the communication
`channels, for example, no more than N users may be permit-
`15 ted to use an access point to one of the communication chan(cid:173)
`nels. In some embodiments the access point to one of the
`communication channels may be invalid if, for example, it has
`existed for fewer than N days. The identity of the access point
`to one of the communication channels may be collected
`20 before a transaction or during a transaction.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`3
`authentication system may receive the data element from the
`user via the first communication channel and may determine,
`based on the data element, if the user is allowed to perform a
`transaction. In some embodiments, the transmitting of the
`data element to a user and receiving the data element from the
`user may be done only if an alert level is not sufficient, or is a
`certain level. The authentication system may allow the user to
`proceed with the transaction only if the data element received
`via the second communication channel is supplied correctly
`via a first communication channel, for example, the received
`code matches the sent code. In some embodiments the first
`communication channel may be a telephone connection while
`the second communication channel may be the Internet; other
`suitable channels may be used. The second communication
`channel may or may not be the communication channel by
`which the transaction is conducted.
`A system and method according to one embodiment may,
`during a transaction with a user, transmit to the user, via a first
`communication channel, a code; and receive from the user,
`via a second communication channel, the code. The transac(cid:173)
`tion may proceed, or the user may be authenticated, if the
`code matches. A system and method according to one
`embodiment may conduct transactions with a number of
`users, ensuring that for each of a set of first communications
`channels, only a certain number of users can use a particular 25
`access point to that first communication channel. The second
`communication channel may be the communication channel
`by which the transaction is conducted; but in alternate
`embodiments need not be.
`Some embodiments of the present invention may relate to
`a method and/or system for authenticating a user participating
`in a transaction, for example, a financial transaction, opening
`an account, a password recovery, etc. A user may communi(cid:173)
`cate with an institution via a communication channel such as
`for example the Internet and a web site. The system may 35
`transmit a data element, for example a code, to the user via a
`different communication channel (the identification of which
`may be provided by e.g. the user, or may be generated in
`another manner), for example, a telephone connection, e-mail
`connection etc.
`The authentication system may receive the data element
`from the user via a communication channel and may deter(cid:173)
`mine, based on the data element, if the user is allowed to
`perform a transaction. In some embodiments one of the com(cid:173)
`munication channels may have characteristics that it may be 45
`difficult and/or expensive to obtain many access points to it.
`In some embodiments, the transmitting of the data element to
`a user and receiving the data element from the user may be
`done when there is a greater probability of transaction risk.
`The authentication system may allow the user to proceed with 50
`the transaction only if the data element received via one
`communication channel is supplied correctly via a different
`communication channel, for example, the received code
`matches the sent code. In some embodiments one communi(cid:173)
`cation channel may be a telephone connection while the other 55
`communication channel may be the Internet; other suitable
`channels may be used The other communication channel may
`or may not be the communication channel by which the
`transaction is conducted. Some embodiment of the present
`invention may include initiating contacting with a user via 60
`one of the communication channels.
`A system and method according to one embodiment may,
`during a transaction with a user, transmit to the user, via one
`communication channel, a code; and receive from the user,
`via a different communication channel, the code. The trans- 65
`action may proceed, or the user may be authenticated, if the
`code matches. A system and method according to one
`
`The subject matter regarded as the invention is particularly
`pointed out and distinctly claimed in the concluding portion
`of the specification. The invention, however, both as to orga(cid:173)
`nization and method of operation, together with objects, fea(cid:173)
`tures and advantages thereof, may best be understood by
`reference to the following detailed description when read
`30 with the accompanied drawings in which:
`FIG. 1 depicts an authentication system according to one
`embodiment of the present invention;
`FIG. 2 depicts an authentication system according to one
`embodiment of the present invention;
`FIG. 3 is a flowchart depicting a process according to an
`embodiment of the present invention; and
`FIG. 4 is a flowchart depicting a process for moving
`between alert levels according to an embodiment of the
`present invention.
`Reference numerals may be repeated among the figures to
`indicate corresponding or analogous elements.
`
`40
`
`DETAILED DESCRIPTION
`
`In the following detailed description, numerous specific
`details are set forth in order to provide a thorough understand(cid:173)
`ing of the invention. However it will be understood by those
`of ordinary skill in the art that the present invention may be
`practiced without these specific details. In other instances,
`well-known methods, procedures, components and circuits
`have not been described in detail so as not to obscure the
`present invention. Various modifications to the described
`embodiments will be apparent to those with skill in the art,
`and the general principles defined herein may be applied to
`other embodiments. The present invention is not intended to
`be limited to the particular embodiments shown and
`described.
`Unless specifically stated otherwise, as apparent from the
`following discussions, it is appreciated that throughout the
`specification, discussions utilizing terms such as "process(cid:173)
`ing," "computing," "calculating," "determining," or the like,
`may refer in whole or in part to the action and/or processes of
`a processor, computer or computing system, or similar elec(cid:173)
`tronic computing device, that manipulate and/or transform
`data represented as physical, such as electronic, quantities
`within the system's registers and/or memories into other data
`similarly represented as physical quantities within the sys-
`
`TWILIO INC. Ex. 1005 Page 8
`
`

`
`US 8,781,975 B2
`
`5
`tern's memories, registers or other such information storage,
`transmission or display devices.
`The processes presented herein are not inherently related to
`any particular computer, processing device, article or other
`apparatus. An example of a structure for a variety of these
`systems will appear from the description below. In addition,
`embodiments of the present invention are not described with
`reference to any particular processor, prograrmning language,
`machine code, etc. It will be appreciated that a variety of
`programming languages, machine codes, etc. may be used to
`implement the teachings of the invention as described herein.
`Embodiments of the invention may be used so Service
`Providers that may provide services containing confidential
`information, will be able to continue providing access to such
`services to their users, for example, in the face of massive
`theft, or suspected theft of credentials of the users of their
`services. It will be appreciated, however that the present
`invention may not be limited to usage by service providers,
`but rather may also be used by the government, and any other
`authority or entity that offers access to information of confi(cid:173)
`dential or private nature.
`A system and method may allow for extending authentica(cid:173)
`tion to a two factor, out ofband form, requiring for example an
`additional data element or code via a channel different from
`the channel used for the primary transaction. The system may
`contact a user who may wish to conduct a transaction via a
`communication channel, which may be the communication
`channel of conducting the transaction or an additional com(cid:173)
`munication channel, and provide the user with a secret, for
`example, a code or a data element. The user may provide the
`system with the secret via a communication channel which is
`different from the channel the secret may be received by. For
`example, a user may log in to a web via the Internet and the
`system may contact the user by sending a SMS with a code to
`the user's mobile telephone. The user may enter the code 35
`received via the second channel ( e g., the mobile phone) via
`the first channel (e.g., the Internet) in order to access the
`system. In another embodiment the user may receive the code
`via the first channel (e.g., the Internet) and the system may
`contact the user via the second channel, for example a land- 40
`line telephone and may request the user to supply the code via
`the second channel. In other embodiments the user may con(cid:173)
`tact the system via a second channel and may supply the
`secret via a first or a second channel.
`An embodiment of the invention and system may be used, 45
`for example, by financial institutions (Fis), or non-financial
`institutions to address massive credentials theft or suspected
`theft of their users and members. The present invention may
`be relevant to anyone that operates a service requiring remote
`customer access using some form of credentials and that may 50
`be subjected to any kind of credential exposure. An FI that
`may be using an embodiment of the invention may not be
`required to distribute any hardware ahead of time, nor may it
`be required to educate its users. The FI may deploy a method
`according to one embodiment exactly when needed and 55
`where needed. An embodiment of the invention may therefore
`provide a high level of protection against any kind of theft of
`credentials, at low cost.
`Some embodiments of the present invention may include a
`system and/or method which may provide flexible transaction 60
`processing based on for example the risk assessment or risk
`level of a transaction and/or a user or party to a transaction.
`For example, based on a risk level, a level of authentication or
`other aspects of a transaction may be set or altered.
`It will be appreciated by persons skilled in the art that this 65
`system and method may not be limited to use by financial
`institutions, but rather by any Service provider, that users may
`
`6
`be required to authenticate themselves in order to gain access
`to the services. Moreover, in some embodiments reference
`may be made to a telephone and a telephone number, as the
`second factor for the authentication. While a telephone line
`and number may correspond to the requirements defined
`herein for the second communication channel, it should be
`appreciated by persons skilled in the art that other communi(cid:173)
`cation channels may be used as well, and the telephone may
`be used in order to provide a simple illustration of a certain
`10 embodiments of this invention.
`It will also be appreciated by persons skilled in the art that
`the "Users" referred to herein, could be individuals as well as
`corporations and other legal entities. The alert levels or levels
`15 of fraud alert referred to in the following sections may be
`intended as an illustration and there may be many other con(cid:173)
`figurations intended to distinguish between various levels of
`fraud attack or suspected attack.
`The system and method described herein may be imple-
`20 mented whenever massive Credentials' theft may occur, as
`well as when it is suspected to have occurred, or anytime.
`One of the advantages of an embodiment of the invention is
`that it may be deployed immediately when needed and where
`needed, and may have very low operational and deployment
`25 costs, moreover, it may not require prior access such as, for
`example, pre-enrolment, or pre-distribution of hardware to
`users, who may be potential victims of such theft.
`An embodiment of the invention may extend authentica(cid:173)
`tion to a two-factor out-of-band form, requiring an additional
`30 data element, in addition to the credentials, to be transmitted
`to the user via a different channel. In one embodiment such
`second channel may be, but is not limited to a mobile tele(cid:173)
`phone or a landline telephone, or a pager, or any channel that
`has the characteristic that it is difficult either logistically,
`money-wise, or time-wise, to obtain access to many access
`points to it, for example, it may be difficult and/or expensive
`to own numerous telephone lines, or mobile numbers or
`beeper numbers, and in a preferable embodiment of this
`invention, it may be widely available and easy to access by
`users (on an individual basis). Channels not having such
`characteristics may be used for out-of-band communication.
`It should be noted that unlike typical two-factor authenti(cid:173)
`cation methods, the additional authentication channel (e.g., a
`channel used outside a normal process or channel for authen(cid:173)
`tication or identification) may not be previously uniquely
`linked to a user, and therefore there may not be a need for prior
`access to the users, for example, in the form of registration,
`distribution of hardware or education of users, prior to
`deploying a method according to one embodiment.
`In one embodiment, the system may ensure that for each of
`an out-of-band or secondary communication channel, only
`one or a certain number of users or accounts can use this
`channel for authentication. Security may be achieved by for
`example limiting the number of different user service
`accounts that may use the same authentication channel. For
`example, if the service is a bank account, such limitation may
`be achieved by limiting the number of bank accounts that may
`be linked to a certain telephone number, or by limiting the
`number of users who may link their accounts to that telephone
`number, based on for example name/SSN/whether they are
`members of the same family, and by deploying as part of a
`method according to one embodiment only those channels
`that may have the characteristic that it may be difficult (e.g.,
`logistically, money-wise, or time-wise) to obtain access to
`many access points to it. For example, it may be both expen(cid:173)
`sive and logistically difficult to obtain access to a significant
`number ofland-line telephone numbers.
`
`TWILIO INC. Ex. 1005 Page 9
`
`

`
`US 8,781,975 B2
`
`7
`The deployment of an embodiment of the invention may be
`governed and set according to criteria intended to specifY the
`level of the threat offraud. It may also be applied selectively
`to users according to various criteria intended to assess the
`probability of fraud, for example, at various levels of fraud
`users logging into a service from their typical IP location may
`be exempt from a method according to one embodiment, or
`users who may perform a successful out of band authentica(cid:173)
`tion, for example from a certain location (such as computer or
`ATM machine) may be exempt from extra authentication in
`their next attempt to access the service from the same loca(cid:173)
`tion).
`Embodiments of the invention may pertain to a two factor
`authentications using a communication channel that meets
`certain criteria. Users may be authenticated using a combina- 15
`tion of their regular Credentials and proof that the user may
`have access to a communication channel that meets the cri(cid:173)
`teria of this method, for example, without limitation, such
`proof could be delivered by the user presenting a dynamic
`piece of data that may be delivered to it via a communication 20
`channel that meets the criteria of this method, by the user
`showing it knows the content of this dynamic data, or by the
`user initiating a call from a telephone or a channel to a certain
`telephone number. The criteria that the additional communi(cid:173)
`cation channel may need to meet under this method, may be 25
`that it would be difficult and/ or cumbersome and/ or expensive
`to obtain a significant number of it, for example, without
`limitation, it is expensive and cumbersome to obtain numer(cid:173)
`ous telephone or mobile telephone numbers including access
`to them. Security may be achieved not only by selecting such 30
`a type of communication channel for delivery of the dynamic
`password, but also by restricting the number of, for example,
`users or user accounts, or any other number of distinct values
`of a property of the users or accounts, such as owner name,
`SSN, billing address, that may be linked to a particular chan- 35
`nel. This method may be used either with respect to users may
`have pre-registered the details of their secondary authentica(cid:173)
`tion channel, as well as with respect to users who may not
`pre-registered With respect to the latter, such details may be
`collected during the authentication session.
`Other secondary communication channels having other
`characteristics, for example that may not be difficult to obtain,
`maybe used.
`This method may more generally be seen as a method for
`achieving a sufficient level of security in authentication not by 45
`actually validating user's identity but rather by (i) requiring
`users to provide details of "something" that may be either
`expensive, complicated or hard to achieve in large numbers
`(e.g., it may be something that meets the above criteria, but
`that may be readily available, such as for example, a tele- 50
`phone line); and (ii) by limiting the number of different user
`service accounts or users who may use the same "something"
`for authentication.
`FIG. 1 depicts an authentication system 10 according to
`one embodiment of the present invention. Referring to FIG.1, 55
`an end user 14 may use a terminal such as a personal com(cid:173)
`puter, automated teller machine, PDA, telephone, cellular
`device, or other computing device may wish to conduct a
`transaction (e.g., login to a service, make a purchase, opening
`a financial account, etc.) with an institution 18. Institution 18 60
`may be, for example, a provider that may provide services
`containing confidential or private information, for example, a
`financial institution ("FI") system, government agencies,
`health institution, communication service provider or any
`other institution, authority or entity. End user 14 and institu- 65
`tion 18 may communicate, for example, via one or more
`communications network(s) 15 such as, for example, the
`
`8
`Internet, a cellular system, intranets, data lines, a combination
`of

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket