throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111111111111111111
`US 20060020816Al
`
`(19) United States
`(12) Patent Application Publication
`Campbell
`
`(10) Pub. No.: US 2006/0020816 Al
`Jan. 26, 2006
`( 43) Pub. Date:
`
`(54) METHOD AND SYSTEM FOR MANAGING
`AUTHENTICATION ATTEMPTS
`
`(76)
`
`Inventor: John Robertson Campbell, Ottawa
`(CA)
`
`Correspondence Address:
`TORYS LLP
`79 WELLINGTON ST. WEST
`SUITE 3000
`TORONTO, ON M5K 1N2 (CA)
`
`(21)
`
`Appl. No.:
`
`11/172,899
`
`(22)
`
`Filed:
`
`Jul. 5, 2005
`
`Related U.S. Application Data
`
`(60)
`
`Provisional application No. 60/585,845, filed on Jul.
`8, 2004.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`(2006.01)
`H04L 9/00
`(52) U.S. Cl. .............................................................. 713/182
`
`(57)
`
`ABSTRACT
`
`The present invention provides, in certain embodiments,
`identification and management of authentication attempts
`using having a real time communication channel with the
`end user that is separate from the channel being used for
`authentication. An example is where Internet users are a)
`identified by their cell phone numbers and may b) access the
`internet from many different physical locations. Aspects of
`the invention allow for authentication issue detection to be
`extended, utilizing the separate communication channel to
`communicate directly with the user. This can allow the
`authenticating authority to take proactive action on a more
`automatic basis with the ability to distinguish fraud or abuse
`attempts from user problems aided by the separate commu(cid:173)
`nication channel.
`
`60
`
`Cell
`Phone
`
`4 ~
`
`55
`
`Cell
`Network
`
`....
`...
`
`15
`
`Internet
`Device
`
`30
`
`Application
`
`20
`
`.
`
`r
`
`Internet
`
`35
`
`,, 25
`
`Authenticatior
`Server
`
`/
`
`Location
`Database
`
`45
`Event
`Database
`
`, 40
`
`User
`Database
`
`TWILIO INC. Ex. 1019 Page 1
`
`

`
`Patent Application Publication Jan. 26, 2006 Sheet 1 of 3
`
`US 2006/0020816 A1
`
`Figure 1
`
`60
`
`Cell
`Phone
`
`55
`
`Cell
`Network
`
`....
`
`15
`
`Internet
`Device
`
`30
`
`20
`
`Internet
`
`35
`
`25
`
`Application
`
`....
`
`fA,uthenticatior
`Server
`
`45
`
`Event
`Database
`
`40
`
`User
`Database
`
`/
`
`Location
`Database
`
`TWILIO INC. Ex. 1019 Page 2
`
`

`
`Patent Application Publication Jan. 26, 2006 Sheet 2 of 3
`
`US 2006/0020816 Al
`
`Figure 2
`
`105
`
`110
`
`Authentication
`attempt at
`access
`location
`
`Authentica lion
`request sent to
`Server
`
`Authentication
`Reject
`
`N
`
`135
`
`Authentica !ion
`Reject
`
`130
`
`Authentication
`Accept
`
`145
`
`Put User ID on
`block list
`
`150
`
`Send message
`to cellular
`phone
`
`TWILIO INC. Ex. 1019 Page 3
`
`

`
`Patent Application Publication Jan. 26, 2006 Sheet 3 of 3
`
`US 2006/0020816 Al
`
`Figure 3
`
`315
`
`Change PW
`
`Authentication
`Reject
`
`Send current
`PWto
`cellular phone
`
`320
`
`Send message
`to cellular
`phone
`
`TWILIO INC. Ex. 1019 Page 4
`
`

`
`US 2006/0020816 A1
`
`Jan.26,2006
`
`1
`
`METHOD AND SYSTEM FOR MANAGING
`AUTHENTICATION ATTEMPTS
`
`PRIORITY CLAIM
`
`[0001] The present application claims priority from U.S.
`Provisional Patent Application No. 60/585,845, filed Jul. 8,
`2004, the contents of which are incorporated herein by
`reference.
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates generally to computer
`authentication and more particularly relates to a method and
`system for managing authentication attempts.
`
`BACKGROUND OF THE INVENTION
`
`[0003] Authentication of users and the like in computing
`environments is an important aspect of providing secure
`computing environments. Such authentication should be
`rigid enough to provide reasonable assurance that only
`authorized users can access the computing environment, and
`yet should not be so onerous that the user finds it impractical
`to actually gain access to the computing environment.
`
`SUMMARY OF THE INVENTION
`
`[0004] Aspects of the present of this invention take effec(cid:173)
`tive action to manage invalid authentication attempts
`through pattern analysis and the use of a separate commu(cid:173)
`nication channel to communicate with Users in real time.
`Such invalid authentication attempts could include fraudu(cid:173)
`lent or abusive situations as well as a lack of User knowl(cid:173)
`edge.
`
`[0005] The identification and management of authentica(cid:173)
`tion attempts can be improved in a unique way by having a
`real time communication channel with the end user that is
`separate from the channel being used for authentication. An
`example of this is where Internet users are a) identified by
`their cell phone numbers and may b) access the internet from
`many different physical locations. Aspects of the invention
`allow for authentication issue detection to be extended with
`superior action compared to prior art, utilizing the separate
`communication channel to communicate directly with the
`user. This can allow the authenticating authority to take
`more proactive action on a more automatic basis with the
`ability to distinguish fraud or abuse attempts from user
`problems aided by the separate communication channel.
`
`[0006] Aspects of the invention involve managing access
`to the internet, or a network. Another aspects involve
`managing access to an application, such as an internet
`connected web application.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0007] Embodiments of the present invention will now be
`described by way of example only with reference to the
`attached figures herein.
`
`[0008] FIG. 1 is a system block diagram of a system for
`managing attempted illegitimate authentication attempts in
`accordance with another embodiment of the invention;
`
`[0009] FIG. 2 is a flow chart of a method for managing
`attempted illegitimate authentication attempts in accordance
`with another embodiment of the invention; and,
`
`[0010] FIG. 3 is a flow chart of a method for managing
`attempted illegitimate authentication attempts in accordance
`with another embodiment of the invention.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`[0011] Referring to FIG. 1, the system for managing
`authentication attempts is generally located at 35. The
`System 35 includes an authentication application or Authen(cid:173)
`tication Server 25, which, for example, could be imple(cid:173)
`mented with a RADIUS server. The System also includes a
`User Database 40, which could be many different standards
`and products. The System also includes an Event Database
`45 which is used to store information about authentication
`events such as User ID, location of authentication attempt,
`time of attempt, if password matched User ID. The Location
`Database 50 stores information about the geographic coor(cid:173)
`dinates of access locations and the type of access location
`(e.g. airport). The System also contains an Application 30
`which can interface with the databases, the Authentication
`Server and the Cellular Network 55. The System may be
`contained in any kind of computer that has suitable process(cid:173)
`ing power, RAM, Disc capacity and communications ports.
`The computer may run any OS that is compatible with the
`applications 25, 30, 40, 45, 50.
`
`[0012] Users requiring authentication are equipped with
`internet devices such as a computer, a notebook computer, a
`PDA or a WLAN enabled cell phone 15. Such devices
`support internet communication protocols.
`
`[0013] These devices are attempting to access the internet
`from various locations. The access could be via wireless or
`wired network. The internet equipment 20 at the location is
`able to block access to the internet until the device 15 has
`been authenticated. The Internet equipment communicates
`with the Authentication Server 25 to pass information about
`the User to the Authentication Server 25. The Internet
`equipment will not permit the Device to access the network
`until it has been advised to do so by the Authentication
`Server. This often takes the form of an "authentication
`accept" message.
`
`[0014] The Authentication Server interfaces to the User
`Database 40 to compare the User ID and password offered
`by the Internet Device 15 with that stored in the User
`Database 40. The Authentication Server passes information
`about the authentication attempt to the Application and
`receives a message back from the application indicating if
`Authentication can proceed. If the authentication may pro(cid:173)
`ceed, the Authentication Server will communicate with the
`Internet equipment to inform the equipment that access may
`be permitted. This often takes the form of an "authentication
`accept" message.
`
`[0015] The Application 30 receives information about
`authentication attempts, referred hereafter as "events", from
`the Authentication Server 25.
`
`[0016] The Application 30 may:
`
`[0017]
`
`a) Record the event in Even Database ( 45).
`
`information about
`[0018] b) Retrieve and analyse
`events when a new event occurs. The Application
`searches the database and compares the event to crite(cid:173)
`ria. The criteria may include:
`
`TWILIO INC. Ex. 1019 Page 5
`
`

`
`US 2006/0020816 Al
`
`Jan.26,2006
`
`2
`
`[0019]
`!)Authentication attempt when the same User
`ID has been used to successfully authenticate an
`internet access, and said internet access is still active.
`
`[0020] 2) Authentication attempt when an attempt
`using the same User ID occurred from a different
`location, and the time between the attempts would
`not allow a legitimate Internet user to travel from the
`first location to the second. When locations are
`established, the geographic coordinates (such as
`UMT coordinates) must be determined. The geo(cid:173)
`graphic coordinates are stored in the Location data(cid:173)
`base (50). When an authentication attempt occurs,
`the Application will search the Location database to
`determine the geographic location of the current
`attempt and the geographic location of the most
`recent successful attempt. The time of most recent
`successful attempt will be obtained by searching the
`Event database. Other preferred embodiments may
`not include location information and the Location
`database (50).
`
`[0021] 3) Multiple authentication attempts using a
`cellular number (irrespective of location of attempts)
`within a time period, where the number of attempts
`and the duration of the time period indicate atypical
`use.
`
`[0022] 4) Multiple authentication attempts from a
`given location (irrespective of cellular number)
`within a time period, where the number of attempts
`and the duration of the time period indicate atypical
`use.
`
`[0023] The Application 30 may make use of a separate
`communications channel, in this case a cellular network 55,
`to communicate with a legitimate user via a device they
`possess, in this case a cellular phone 60.
`
`[0024] The Application 30 may perform one or more of
`the following actions depending upon criteria that may be
`established in the Application.
`
`[0025] 1) Automatic action to change the password and
`inform the legitimate user of the new password. The Appli(cid:173)
`cation 30 would generate a new password and then a) store
`the new password in the User Database 40 and b) send the
`new password to the cellular phone via the Cellular Network
`55 using SMS or IVR methods, along with a message
`explaining the reason a new password is being sent.
`
`[0026] 2) Automatic action to suspend the account and
`distribution of passwords. The Application 30 would place
`the User ID on a Block List in the User database. The Block
`List would over-ride other Authentication server functions to
`authenticate, create a new account, or create and distribute
`new password to the cellular phone 60.
`
`[0027] 3) In the case of 2) above, or otherwise, automatic
`action to contact the Internet user via their cellular phone
`and request them to take/not take action, including request(cid:173)
`ing them to initiate contact with the service provider. Such
`contact could be via the Cellular Network 55 using SMS or
`IVR methods to the legitimate User's cellular phone 60.
`
`[0028] 4) Notification to personnel so that they may
`initiate manual action to contact the Internet user via a
`phone call or SMS message to their cellular number. If
`contact cannot be made between personnel and the
`
`User, and a suitable explanation given by the User, then
`the account may be suspended or law enforcement
`agency contacted. If there is a suitable explanation,
`assistance may be offered to the legitimate user.
`
`[0029] Some or all of the functions of the Application may
`be distributed and be associated with the Authentication
`Server or other applications such as a web server not
`necessarily part of this system.
`
`[0030] The Event database functions maybe provided in a
`separate database or combined with other databases that may
`be part of a system.
`
`[0031] The Location database functions maybe provided
`in a separate database or combined with other databases that
`may be part of a system.
`
`[0032] The implementation of the invention could have a
`logical flow as depicted in FIG. 2 and FIG. 3. This is an
`example of how a system could function, and others are
`possible, considering other factors and combinations of
`these factors in the decisions.
`
`[0033] The method starts with an attempt to access the
`internet at a location (105). Equipment at the location will
`capture the request and forward it to a centralized Server
`(110) making use of an authentication protocol such as
`RADIUS, referred to hereafter as "the authentication pro(cid:173)
`tocol".
`
`[0034] The Server will verify if the User ID is on a Block
`List (112). If the User ID is on the Block list then the Server
`will proceed with authentication reject using the authenti(cid:173)
`cation protocol.
`
`[0035] The Server will verify if the User ID and password
`constitute a valid authentication attempt (115). If it does, the
`server will then retrieve the geographic coordinates of the
`current authentication attempt and then retrieve the geo(cid:173)
`graphic coordinates and time of the most recent previous
`valid authentication attempt and calculate the physical dis(cid:173)
`tance between the current and most recent previous authen(cid:173)
`tications as well as the time interval between the current and
`most recent previous authentications. The Server will then
`apply rules (120) with determine if the implied velocity is
`reasonable. The rules may include factors such as the
`distance (such as short vs. long) and type of location (such
`as airport).
`
`[0036]
`If the Server determines that the implied velocity is
`acceptable (120) then the Server will proceed with authen(cid:173)
`tication accept (130) using the authentication protocol,
`allowing the User to gain access to the internet.
`
`[0037]
`If the Server determines that the implied velocity is
`unacceptable (120) then the Server will then proceed with
`authentication reject using the authentication protocol pre(cid:173)
`venting internet access associated with this attempt (310).
`The Server will then create and a new random password for
`the User and store this new password in the User database,
`replacing the current password (315).
`
`[0038] The Server will then send a message to the valid
`User (320) by way of an SMS message the User's cellular
`phone. The cellular phone number may be determined either
`by searching the User database or, if the service is so
`designed, the User ID may be the cellular number of the
`User. Thus the User ID would be the required cellular
`
`TWILIO INC. Ex. 1019 Page 6
`
`

`
`US 2006/0020816 Al
`
`Jan.26,2006
`
`3
`
`number. This above approach may be used in any of the
`following instances where the cellular number of the User is
`required.
`[0039] The SMS message sent in step (320) would indi(cid:173)
`cate that the password has been changed and the reason. An
`example message could read "Your password has been
`changed to XXXXXXX due to a risk that your old password
`has been compromised". Thus the valid user is automatically
`equipped with and informed of a change in password.
`[0040] Going back to step (115), if the Server determines
`that the User ID and password do not constitute a valid pair,
`the Server will proceed with authentication reject using the
`authentication protocol preventing internet access associated
`with this attempt (135).
`[0041] The Server will then search a database of recent
`authentication attempts (successful and unsuccessful) and
`determine (140), as an example, if more than 10 attempts
`have been made to authenticate in the past 1 hour. This
`would have the generic form of more than "n" attempts
`within "x" time interval. If the threshold had been exceeded,
`then the system would put the User IDona Block list (145).
`The Server will then send a message to the valid User (150)
`by way of an SMS message the User's cellular phone. The
`SMS message would indicate that the User account has been
`suspended and request the User to contact the authentication
`authority. The authentication authority could be a service
`provider or company that is granting access to, in this case,
`the internet. An example SMS message could read "Your
`account has been suspended due to a risk that your password
`has been compromised. Please contact 800-555-5555 for
`further information". Thus the valid user is informed of the
`issue and can contact the authentication authority.
`[0042] Returning to step 140, if the threshold had not been
`exceeded, then the Server would determine (305), as an
`example, if more than 5 attempts have been made to
`authenticate in the past 1 hour. This would have the generic
`form of more than "n" attempts within "x" time interval, but
`would have a lower threshold than in step 140. If the
`threshold had been exceeded, then the system would pro(cid:173)
`ceed as described above in step 315 and 320.
`[0043]
`If at step 305, the threshold had not been exceeded,
`then the Server would retrieve the current password from the
`User database and send the current password to valid User
`(325) by way of an SMS message the User's cellular phone.
`[0044] The above-described embodiments of the invention
`are intended to be examples of the present invention and
`alterations and modifications may be effected thereto, by
`those of skill in the art, without departing from the scope of
`the invention which is defined solely by the claims appended
`hereto.
`
`1) A computer-based system for managing illegitimate
`authentication attempts comprising:
`
`a first application for receiving an authentication attempt
`from a device connected to said system; said attempt
`having been entered into said device by a user; said user
`being one of a legitimate user and an illegitimate user;
`
`a second application for capturing and recording said
`authentication attempt;
`
`a third application for performing an analysis of said
`authentication attempt and for performing a determi(cid:173)
`nation of whether said authentication attempt is poten(cid:173)
`tially from said illegitimate user;
`
`a fourth application for modifying an authentication sys(cid:173)
`tem database based on results from said third applica(cid:173)
`tion; and
`
`a communication channel to another device associated
`with said legitimate user and operable to send messages
`based on results from said third application to said
`another device for presentation to said legitimate user.
`2) The system according to claim 1 wherein said first
`application is based on RADIUS protocols.
`3) The system according to claim 1 wherein an authen(cid:173)
`tication attempt includes a User ID that is based on a
`non-internet communications system.
`4) The system according to claim 3 where the non-internet
`communications system is a cellular phone, and wherein
`said User ID is a cellular phone number.
`5) The system according to claim 3 where the non-internet
`communications system is a pager and wherein the User ID
`is a pager number.
`6) The system according to claim 3 wherein the User ID
`contains the non-internet communications address for the
`user.
`7) The system according to claim 3 wherein the User ID
`is cross referenced to the non-internet communications
`address for the User.
`8) The system according to claim 1 where said applica(cid:173)
`tions are embedded in one or more centralized servers.
`9) The system according to claim 1 where said applica(cid:173)
`tions are embedded in a self contained authentication device.
`10) The system according to claim 4 where said messages
`are by SMS (Short Message Service).
`11) The system according to claim 4 where said messages
`are by voice.
`12) The system according to claim 10 where the SMS is
`generated by a sixth application.
`13) The system according to claim 10 where the SMS is
`generated by a human.
`14) The system according to claim 11 where said voice is
`generated by an interactive voice response application.
`15) The system according to claim 11 where the voice is
`generated by a human.
`16) The system according to claim 1 where the analysis
`identifies said authentication attempt as having a valid User
`ID and password while a previously authenticated session is
`still active and the determination concludes that said authen(cid:173)
`tication attempt was potentially from an illegitimate user.
`17) The system according to claim 1 where the analysis
`identifies an authentication attempt with valid User ID and
`password while a previously authenticated session is still
`active.
`18) The system according to claim 1 wherein the third
`application includes permitted geographic coordinates for
`the locations where said user may authenticate and wherein
`the analysis identifies actual geographic coordinates of said
`authentication attempt; and wherein said determination con(cid:173)
`cludes that said authentication attempt was potentially from
`an illegitimate user if said actual geographic coordinates are
`outside said permitted geographic coordinates.
`19) The system according to claim 1 where the analysis
`identifies actual geographic coordinates of said authentica-
`
`TWILIO INC. Ex. 1019 Page 7
`
`

`
`US 2006/0020816 Al
`
`Jan.26,2006
`
`4
`
`tion attempt and said third application is operable to deter(cid:173)
`mine a distance travelled and an elapsed time between said
`actual geographic coordinates and a previous set of geo(cid:173)
`graphic coordinates and a previously successful authentica(cid:173)
`tion; and wherein said determination concludes that authen(cid:173)
`tication is potentially from an illegitimate user if at least one
`of said distance and said elapsed time exceed a predefined
`threshold.
`20) The system according to claim 1 where the analysis
`includes determining a number of number of previous
`authentication attempts prior to using a particular User ID
`prior to said authentication attempt within a time period and
`the determination concludes said authentication attempt is
`potentially from an illegitimate user if said time period does
`not fall within a predefined range.
`21) The system according to claim 1 where the analysis
`includes determining the number of authentication attempts
`from a particular location within a time period.
`
`22) The system according to claim 3 further comprising a
`fifth application wherein a password associated with said
`User ID can be modified and said User notified.
`23) The system according to claim 1 wherein any future
`authentication attempts associated with said user are flagged
`as illegitimate in said database if said authentication attempt
`is from a potentially illegitimate user.
`24) The system according to claim 1 where the Authen(cid:173)
`tication server may proceed with authentication if the Appli(cid:173)
`cation has not responded within a defined time and the User
`ID and password are valid.
`25) The system according to claim 1 wherein the authen(cid:173)
`tication system is based on other internet protocols, such as
`DIAMETER.
`
`* * * * *
`
`TWILIO INC. Ex. 1019 Page 8

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket