throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2004/0203595 A1
`Singhal
`(43) Pub. Date:
`Oct. 14, 2004
`
`US 20040203595A1
`
`(54)
`
`(76)
`
`(21)
`(22)
`
`METHOD AND APPARATUS FOR USER
`AUTHENTICATION USING A CELLULAR
`TELEPHONE AND A TRANSIENT PASS
`CODE
`
`Inventor: Tara Chand Singhal, Torrance, CA
`US
`(
`)
`Correspondence Address;
`Tara Chand Singha]
`P_()_ BOX 5075
`Torrance, CA 90510 (Us)
`
`Appl, N()_j
`
`10/217,287
`
`Filed:
`
`Aug. 12, 2002
`
`Publication Classi?cation
`
`(51) Int. Cl? .................................................... ..H04M 1/66
`(52) US. Cl. ....................................... ..455/411;455/414.1
`
`(57)
`
`ABSTRACT
`
`Authentication system 10 is used to store a user’s existing
`passwords; alternatively, the authentication system creates
`on demand a transient random pass code that is good for a
`limited duration. When the user has forgotten the password
`in a traditional system, alternatively, without the need to
`create or remember passwords, user can use transient pass
`codes. The user retrieves the password or the pass code via
`a cell telephone 800 call to the authentication system, before
`logging on to the system.
`
`Telephone
`
`‘
`
`‘ Authentlcatlon System 10
`
`Network 16
`
`Verify caller and create
`time-limited pass code,
`or retrieve existing password
`
`K04
`I;
`
`User
`05
`
`D u D
`
`
`
`System interface 02
`
`Bank
`System 20A
`
`@
`
`Business
`System 208
`
`Consumer
`System 200
`
`Facility
`Access
`System 20D
`
`TWILIO, INC. EX. 1008
`Page 1
`
`

`
`Patent Application Publication Oct. 14, 2004 Sheet 1 of 6
`
`US 2004/0203595 A1
`
`
`
`
`
`Eoawmmqmc_..m_xmm>mEm_5
`
`
`
`®“_.m®._Uvcm.m__mo>u__._®>
`
`
`
`.300mmmau9_E__-mEm
`
`
`
`orE3m>m_._o_umo=:o£:<
`
`m:o:am_m.r
`
`9vzoémz
`
`momEeam
`
`a___o$
`
`mwm8<
`
`oomswim
`
`_mE:m:oo
`
`<_.2:9“.
`
`<8522m
`
`xcmm
`
`mwm_.__w:m®
`
`momE296
`
`+\\\\\\\\\\\\\®mo8mtmE_
`
`TWILIO, INC. EX. 1008
`Page 2
`
`TWILIO, INC. EX. 1008
`Page 2
`
`
`
`
`
`
`

`
`Patent Application Publication Oct. 14, 2004 Sheet 2 0f 6
`
`US 2004/0203595 A1
`
`9 {0362
`
`96522.
`
`
`
`
`
`vm cosoczm 6:50 mwm8<
`
`Q-< 8 E226
`
`No
`
`m? MMDUE
`
`l
`L_____________’_______________..________.._
`
`UDIJ
`IIIIJCI
`[IUD
`
`6%
`
`mo
`
`TWILIO, INC. EX. 1008
`Page 3
`
`

`
`Patent Application Publication Oct. 14, 2004 Sheet 3 0f 6
`
`US 2004/0203595 A1
`
`
`
`
`
`3 5:82 6:50 mwm8<
`
`Q-< 8 522w
`
`@
`
`@ ww :wBEE 4 .............. -
`
`
`
`8 5296 5.38552
`
`
`
`>wxmmma uwtE=¢Ez
`
`
`
`Bmwb Em 6:8 >uEw>
`
`UP MMDQE
`
`8 text: #281
`
`
`850m
`
`cozmczwma
`
`mm >oxwwmn_ Q “96mm
`
`
`
`mm BmQ Hwxomm
`
`mHmQ
`
`@
`@
`
`No 886E
`
`E996
`
`DEIIII
`IJDIII
`HUD
`
`6m:
`
`mo
`
`TWILIO, INC. EX. 1008
`Page 4
`
`

`
`Patent Application Publication Oct. 14, 2004 Sheet 4 of 6
`
`US 2004/0203595 A1
`
`
`
`mun.wEo3mmma.mnEmEm__._omummzo3tom:oz
`
`
`
`
`
`
`
`ommmamamamaam>>Eao._
`
`NF2._mw3
`
`
`
`
`
`3NmuoommmaEmficmfi
`
`
`
`ormmamamamanm>>Eao._
`
`Eozwmma
`
`U_._mmD
`
`9.93__8:5»E888mam8m;:8
`
`
`
`.®UOOwmmaEm_mcm:NEmfioOH
`
`
`
`muoowmmaEm_m:m._._.mm:
`
`
`
`.Eo>>wmmam£c_mEo925%.__850>9%:83Nam83__mo
`
`
`
`ownEoiwmma._=o>E98:o>=
`
`
`
`
`
`mv..m.Tmmmvmmfionamxmmma
`
`92
`
`H.
`
`EDDU
`
`_H_D_H_
`
`DUE
`
`D_H:H_
`
`
`
`ommmamamamanm>>Eao._
`
`z_n__mEmuc<Emu50>mu__mEmw:_
`
`
`
`
`
`<.,mv_mwmam£:_mEo9mcoca__mo30>ac_m:mcoxcmmoomé__mo
`
`Nm._:
`9".
`
`
`
`
`
`a:_w:8%NNN83__mO.Z_n_.5_m=£.—mm:
`
`
`
`
`
`.2_aEm_m:m:m:_mEo9mcoca__mo50>
`
`TWILIO, INC. EX. 1008
`Page 5
`
`
`
`Sm_mc_E._m._.wwmoo<>:__omu_\mOnS>F<
`
`
`
`
`
`TWILIO, INC. EX. 1008
`Page 5
`
`
`

`
`Patent Application Publication Oct. 14, 2004 Sheet 5 of 6
`
`US 2004/0203595 A1
`
`mmm9<E926
`
`mommEm2<E396
`
`
`
`mom£.mn_mmm8<
`
`ovmmmmnfimoE996
`
`
`
`<2co:o_._:u_:o_=mo_Em£:<
`
`
`
`momEw..m>w9:980
`
`8m6._m__m395592.0
`
`Nam9&2
`
`
`
`vmmmmmfivm__mE-m_
`
`ommza
`
`mmmn__<Eeflm
`
`8m.9.33
`
`momme:am
`
`WmmEo>>wwmn_
`
`
`
`wmmmwmnflmo_®mD
`
`
`
`ommmocflmzwmcozomwcmc.
`
`NRwEE2mo
`
`ownn:5m:
`
`wmmn:E2m>w
`
`vnm_u_._w__mO
`
`mumwasEm
`
`
`
`NWOmmmnfimoco_8mm:m._._.
`
`
`
`ownmmo_>mn_mmfioflw
`
`
`
`omm.ommmoo._n_E235co:mo_Em£:<
`
`:o:mu_Em£:<
`
`orE3m>m
`
`m..:=m_"_
`
`TWILIO, INC. EX. 1008
`Page 6
`
`TWILIO, INC. EX. 1008
`Page 6
`
`
`

`
`Patent Application Publication Oct. 14, 2004 Sheet 6 of 6
`
`US 2004/0203595 A1
`
`
`
`vanu._o>>mwmn_mumoEmzEmam>m._wnE::_ml_.__mo
`
`
`
`
`
`
`
`39900mcaaocm11‘__mE-m_
`8oNN_mm$c_w:m2E
`
`
`
`
`oN_o9<xcmm.mEmz
`
`
`
`
`
`o3m.mn_n_m>>93Emum02.09385m88<E8oE88<
`
`
`
`om...m.mn.n®>>co_6m_mmEmflwm
`
`
`
`
`
`
`
`
`
`omvmE_._.vcm95w:Em_.m>m_mEm.Em_.m>w.om_mw
`
`
`
`
`
`
`
`
`
`dmmomomE_v_EEw<3...oeo/lcmm_x
`
`Nun92:.Sn9am:8”252EBm>wN?:o_.8_ommm»9E236
`
`dmmomoovyoomE.in>55
`
`zmv_‘mmmw._O<03%v_m_>>z8%
`
`mNmE<qocw
`
`v2:9".
`
`Om<mmmsmsm
`
`z__>_o<wm
`
`TWILIO, INC. EX. 1008
`Page 7
`
`TWILIO, INC. EX. 1008
`Page 7
`
`

`
`US 2004/0203595 A1
`
`Oct. 14, 2004
`
`METHOD AND APPARATUS FOR USER
`AUTHENTICATION USING A CELLULAR
`TELEPHONE AND A TRANSIENT PASS CODE
`
`FIELD OF THE INVENTION
`
`[0001] The present invention is directed to a method and
`apparatus for user authentication to a computer system using
`a cellular telephone and transient pass codes.
`
`BACKGROUND
`
`[0002] Access to a computer system is controlled by a
`combination of a user ID to identify a user and a passWord
`to verify the user. The passWord is initially created by the
`system and then can be changed by the user. It is only knoWn
`to the user and is kept secure by an access control function
`Within the computer system.
`
`[0003] The combination of a user ID and passWord are the
`prevalent technology for access control to computer systems
`and are used in:
`government agencies such as defense
`systems by defense employees to control access to classi?ed
`data, (ii) business systems by employees of the business to
`control access to sensitive data, (iii) consumer systems by
`consumers to control access to consumer services and
`resources provided by a business, and (iv) banking systems
`to control access to online account data and so on.
`
`[0004] The use of a passWord to control access suffers
`from some de?ciencies, such as, too many passWords, easy
`to forget and unfamiliar dif?cult to remember long string
`passWords, and risk of compromise.
`
`[0005] There have been many solutions to address one or
`more of these de?ciencies. Some of them have been: 1)
`having longer passWords of at least 6 to 8 characters, Where
`the passWord must have a combination of numerals and
`alphabets, 2) having passWord that have a combination of
`loWer and upper case letters as Well as a punctuation
`character, also referred to a pass phrase 3) having tWo layers
`of passWords common in defense systems 4) having the
`passWord changed periodically such as once a month or
`every three months, Which is common in defense and
`sensitive business systems, 5) supplying additional personal
`data such as mother’s name, place of birth or other data to
`the computer system When a passWord is forgotten, so that
`such data may be used to verify the user in lieu of a forgotten
`passWord.
`[0006] NeW innovative solutions to address these de?cien
`cies in passWord technology are also being researched. One
`example is a recent neWs report on Microsoft, Which
`describes a research effort on creating and using a passWord
`that depends upon a user selecting points on a picture. The
`pixel location sequence is to be used as a passWord, as it is
`believed that points on a picture are easy to remember and
`also create a complex passWord.
`
`[0007] Other solutions have been biometrics, such as the
`use of one’s ?ngerprint, handprint, or retina-scan, to control
`access to a facility controlled by a computer system. Based
`on published stories, use of biometrics, have problems such
`as, having ?nger print can be easily fooled by an imposter
`gluing on some-one else’s ?nger print on his ?ngers, and
`that people are hesitant to make biometric data available to
`computer systems for privacy reasons.
`
`[0008] Smart cards are also being used in some cases to
`control access to a computer system. Use of smart cards or
`tokens require a smart card reader and a smart card being
`given to a person in advance. For these and other reasons
`they have not gained Wide spread popularity.
`[0009] In light of the above, it is an objective of the present
`invention to have a user authentication system that elimi
`nates the problems of:
`the users in having to create and
`remember passWords, in having to create different pass
`Words for access to different systems, and passWords being
`stolen from the users by their carelessness or negligence;
`and (ii) the businesses in having to maintain computer
`systems that have a risk of compromise of passWord by
`carelessness of their employees or external hacker attacks.
`
`SUMMARY
`
`[0010] The present invention is directed to a method and
`apparatus for a user authentication system that uses a
`cellular telephone. In one embodiment, an authentication
`system is used to store a user’s existing passWords. When the
`user has forgotten the passWord, the user can retrieve it via
`an 800 number call to the authentication system using
`his/her cell telephone, before logging on to the system. The
`current caller ID technology provided by the telephone
`companies uniquely identi?es a cell phone oWner and is
`used to verify the caller to the authentication system.
`
`[0011] In another embodiment, the authentication system
`does not store existing passwords, but creates, on demand,
`a temporary or transient random pass code that is good for
`a limited time. Such transient pass codes are randomly
`created only at the instance of use. They do not exist earlier
`anyWhere. They can be very simple, for example a 3-digit
`numeral, and are believed to be far more secure in their
`operation and use than the current use of passWords.
`
`[0012] The user has only a set time to gain access to the
`computer system using the user ID and the transient pass
`code. The set time may be selected based on user’s prefer
`ence and the security needs of the system.
`
`[0013] This invention may be practiced in different ver
`sions, as the systems have different security needs and the
`users have different habits. These are described in the
`description section.
`[0014] The authentication system of this invention serves
`(i) the users, by the users not having to create and or
`remember passWords, and (ii) the businesses by eliminating
`the risk of having passWords compromised by carelessness
`or negligence of users or employees and of being a target for
`hackers.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0015] The novel features of this invention, as Well as the
`invention itself, both as to its structure and its operation, Will
`be best understood from the accompanying draWings, taken
`in conjunction With the accompanying description, in Which
`similar reference characters refer to similar parts, and in
`Which:
`
`[0016] FIG. 1A is a block diagram that illustrates a
`version of the current invention;
`
`[0017] FIG. 1B is a block diagram that illustrates another
`version of the current invention;
`
`TWILIO, INC. EX. 1008
`Page 8
`
`

`
`US 2004/0203595 A1
`
`Oct. 14, 2004
`
`[0018] FIG. 1C is a block diagram that illustrates yet
`another version of the current invention;
`[0019]
`[0020] FIG. 3 is a block diagram that illustrates a version
`of the authentication system; and
`
`FIG. 2 illustrates system interfaces;
`
`[0021] FIG. 4 is a version of Web pages that illustrates
`user access to the authentication system.
`
`DESCRIPTION
`
`[0022] Introduction
`[0023] In this speci?cation, the terminology pass code and
`passWord is used interchangeably. HoWever, Where it is
`necessary to distinguish, the term passWord is used for an
`eXisting passWord and pass code is used for those passWords
`that are created on demand for an instance of use according
`to this invention.
`
`[0024] With initial reference to FIG. 1A, authentication
`system 10, interfaces With a user 06 via a cellular telephone
`04 and telephone netWork 16. The user has access to the
`system 20A-D via a system interface 02. The system 20A-D
`may be a bank system 20A, a business system 20B, a
`consumer system 20C or a facility access system 20D.
`
`[0025] As illustrated in FIG. 2, the system interface 02
`may be a log in Web page 210, 220, 230 or it may be an
`ATM/POS/Facility Access terminal 250.
`
`[0026] As illustrated in FIG. 1A, the authentication sys
`tem 10 may be deployed as a stand-alone system, Where it
`may store and alloW the user to retrieve passWords of
`multiple number of systems 20A-D Where user maintains
`accounts.
`
`[0027] Alternatively, the authentication system 10 func
`tions may be embedded in the system 20A-D itself, such that
`the user is able to retrieve the passWord for that particular
`system. With reference to FIG. 1B, authentication system 10
`functions may be embedded in the system 20 itself as
`authentication function 10A, as part of the system 20A-D’s
`eXisting access control function 34, Which maintains user ID
`12 and passWord 28.
`
`[0028] In a ?rst embodiment With stored passWords, the
`invention enables storing user’s passWords of system 20A-D
`in an authentication system 10, from Where they can be
`retrieved by the user 06, When forgotten, through use of a
`cell phone 04.
`
`[0029] In a second embodiment With transient pass codes,
`the authentication system 10, on request of a user 06 via a
`cell phone 04, creates in real time a random transient pass
`code for use for a limited time. The authentication system 10
`communicates the transient pass code to the user 06 via
`voice response on the cell phone 04. The authentication
`system 10 also communicates the transient pass code to the
`speci?c system 20 to Which the user 06 Wishes to gain
`access.
`
`a user as the caller ID is provided by the telephone company
`computer systems, further more the caller ID cannot be
`blocked When calling an 800 number (iv) due to it’s con
`venience and affordable pricing are used by almost every
`body, and (v) have a minimal risk of theft as the location of
`a cell phone can be traced by the telephone company.
`HoWever, ?Xed telephones as in a home may also be used.
`
`[0031] These embodiments are described herein. The
`headings are provided for the convenience of the reader.
`
`[0032] Embodiment With Stored PassWords
`
`[0033] The user 06 makes a secure Internet connection to
`the authentication system 10 (not shoWn), Which provides a
`Web page 400 as illustrated in FIG. 4. The Web page 400
`alloWs the user 06 to create or access the user’s account in
`the authentication system 10. The data required on Web page
`400 is cell tel number 350, name 352, e-mail 354 and PIN
`356.
`
`[0034] The Web page 410, displayed in response to com
`pleting Web page 400 data entries, alloWs the user 06 to enter
`the system 20 names 366 and corresponding passWords 364.
`The user can enter multiple system names and passWords.
`The data so entered is saved in the authentication system 10,
`described later With respect to FIG. 3.
`
`[0035] Subsequently, With reference to FIG. 2, if the user
`06 When logging on a system 20A-D With a login Web page
`210, Which requires a user ID 12 and a passWord 28, has
`forgotten the passWord, the legend 216 advises the user to
`call an 800 number to retrieve the passWord.
`
`[0036] When the user 06 calls the authentication system
`10 using his/her cell phone 04, the authentication system 10
`veri?es the caller ID as telephone number 350 and prompts
`for the PIN 356 and the name of the system 366, asking the
`user to enter PIN 356 and select the system 20, if the user
`has stored a passWord for more than one system. The
`authentication system 10 then voice responds With the
`passWord 364 of the selected system. The voice response
`technology such as being able to annunciate alphanumeric
`digits is prior art that is in common use in telephone and
`banking systems.
`
`[0037] Embodiment With Transient Pass Code
`
`[0038] The user 06 makes a secure Internet connection to
`the authentication system 10 (not shoWn), Which provides a
`Web page 400 as illustrated in FIG. 4, The Web page 400
`alloWs the user 06 to create or access the user account in the
`authentication system 10. The data required on Web page
`400 is cell tel number 350, name 352, e-mail 354 and PIN
`356.
`
`[0039] The Web page 420, displayed in response to com
`pleting the data in Web page 400, provides a list of systems
`20A-D With Which the authentication system 10 has a prior
`established interface. The page 420 displays a list of such
`systems by system ID 358 and system name 366.
`
`[0030] A cell telephone 04 to call the authentication sys
`tem 10 is used because a cell telephone:
`is a personal item
`in the personal physical control of the oWner, (ii) uniquely
`identi?es the oWner, an entity independent of the oWner, the
`telephone company has veri?ed the oWner identity, (iii)
`provides caller ID Which cannot be tampered or altered by
`
`[0040] The Web page 420, alloWs the user 06 to select the
`systems Where he/she has an account 422 and for each such
`system to enter the corresponding user ID 360 and set time
`362 for the transient pass code. As an illustration, the user 06
`has selected three systems Bank Acme 414A, DMV 414B
`and Shop NWRK 414C. These selections are identi?ed as 1,
`
`TWILIO, INC. EX. 1008
`Page 9
`
`

`
`US 2004/0203595 A1
`
`Oct. 14, 2004
`
`2 and 3 as system ID 422. The data so entered in page 420
`is saved in the authentication system 10, described later With
`respect to FIG. 3.
`
`[0041] User 06 opens the authentication system 10
`account via a secure Internet connection. To eliminate the
`possibility of fraud Where some one else may open the user
`account With access to user data, the authentication system
`10 veri?es the user identity. This veri?cation of user identity
`may include one or more steps such as, calling the user on
`the cell phone number to verify the user has the cell phone
`number and contacting the telephone company and verifying
`that the cell phone oWner name matches that provided by the
`user.
`
`[0042] The steps required to use the authentication system
`10, as highlighted in FIG. 1A by encircled numerals are:
`
`[0043] (1) A user 06 calls, on his/her cell phone 04,
`the authentication system 10. The authentication
`system has pre-stored system identi?cation and cor
`responding user identi?cation. The user enters a PIN
`and identi?es the system as 1, 2 or 3.
`[0044] (2) The authentication system veri?es the
`caller by caller ID and the PIN and creates a time
`limited passWord.
`[0045] (3) The authentication system communicates
`the time-limited passWord to the cell phone via voice
`response.
`[0046] (4) The authentication system communicates
`the time-limited passWord to the system 20 using the
`system identi?cation and the user identi?cation.
`
`[0047] (5) User accesses the system 20, via a system
`interface 02, by providing the user identi?cation and
`the time-limited passWord. The system then grants
`access after verifying the user identi?cation and the
`time-limited passWord.
`
`[0048] (6) The system 20 deletes the time-limited
`passWord on occurrence of ?rst access or eXpiration
`of a time limit.
`
`[0049] Authentication System 10
`[0050] Referring to FIG. 3, the authentication system 10
`includes
`a storage device 326, (ii) an operating system
`302 stored in the storage device 326, (iii) an authentication
`function program 10A stored in the storage device 326, (iv)
`and a processor 330 connected to the storage device 326.
`
`[0051] The processor 330 can include one or more con
`ventional CPU’s. The processor 330 can be capable of high
`volume processing and database searches.
`
`[0052] The authentication system storage device 326 can,
`for eXample, include one or more magnetic disk drives,
`magnetic tape drives, optical storage units, CD-ROM drives
`and/or ?ash memory. The storage device 326 also contains
`a plurality of databases used in the processing of transac
`tions pursuant to the present invention. For eXample, as
`illustrated in FIG. 3, the storage device 326 can include a
`system database 340, a customer database 338 and a trans
`action database 342.
`
`[0053] The authentication system 10 includes a system
`netWork interface (not shoWn) that alloWs the authentication
`system 10 to communicate With the user 06. Conventional
`
`internal or eXternal modems may serve as the system net
`Work interface. In one embodiment, the system netWork
`interface is connected to the user interface 02 on a global
`netWork 18.
`
`[0054] The authentication system 10 also includes a sys
`tem netWork interface (not shoWn) that alloWs the authen
`tication system 10 to communicate With the telephone
`netWork 16 to receive and respond to telephone calls from
`the user 06.
`
`[0055] The authentication system 10 also includes a sys
`tem netWork interface (not shoWn) that alloWs the computer
`10 to communicate With systems 20A-D. Conventional
`internal or eXternal modems may serve as the system net
`Work interface. In one embodiment, the system netWork
`interface is connected to the system 20A-D on a global
`netWork 18.
`
`[0056] The processor 330 is operative With the authenti
`cation function 10A to perform a customer interface func
`tion, a passWord function, and a system interface function.
`These are described later in the speci?cation.
`[0057] Databases 338-342
`[0058] With reference to FIG. 3, the databases in the
`authentication system 10 are described.
`
`[0059] The customer database 338 Within the authentica
`tion system 10 contains data speci?cally related to the user
`06 that is transferred to the system 10 from the user. The
`private data related to the user 06 is caller ID 350, name 352,
`e-mail address 354, PIN 356, system A ID 358 and corre
`sponding user ID 360, and set time 362 or the passWord 364.
`
`[0060] The system database 340 identi?es the information
`on the system 20, Which needs to be accessed by the
`authentication system 10 to send the transient passWords.
`The Information may include system ID 358, system name
`366, and system access path 368.
`[0061] This transaction database 342 logs all passWord
`request transactions by a transaction reference 370, date/
`time 372, caller ID 374, and system ID 358. In addition user
`ID 360 and set time 376 are also maintained for the
`embodiment that enables sending a transient pass code to
`system 20.
`[0062] Authentication System Function 10A
`[0063] As described earlier, the authentication function
`10A is operative With the processor 330 to provide the
`functions of
`customer interface function, (ii) passWord
`function, and (iii) system interface function.
`[0064] The customer interface function performs the tasks
`of
`opening an account via Web page 400, (ii) receiving
`user id, system id, and set time via Web page 420 or
`receiving system name and passWord via Web page 410, (iii)
`receiving an 800 call, verifying caller id, and (iv) delivering
`a voice/text response transient passWord or a stored pass
`Word.
`
`[0065] In addition to caller id, a PIN 356 may be utiliZed
`to verify the caller to the authentication system 10. Use of
`a PIN is the prevalent technology, for eXample in gaining
`access to banking services and voice mail messages.
`
`
`
`[0066] The passWord function performs the tasks of creating a random transient passWord, (ii) alerting the sys
`
`TWILIO, INC. EX. 1008
`Page 10
`
`

`
`US 2004/0203595 A1
`
`Oct. 14, 2004
`
`tem interface function to send user ID and the transient
`password, (iii) set a timer for set time, and (iv) at the
`expiration of the timer alerting the system interface function
`to send user ID and a null password.
`
`[0067] The transient passWords are randomly created by
`the passWord function using a prior art random number
`generator. The transient passWords may be very simple. For
`example, they may be a tWo to four digit numerals, making
`them easy to receive and use by the user.
`[0068] Transient passWords do not permanently reside
`anyWhere, including the authentication system 10 or even
`the computer system 20 beyond their transient life. The
`transient life may be selected by the user based on his/her
`personal habits in hoW long does it take them to log on to the
`system after they have requested a transient passWord. User
`speci?es the set time at the time of pre-storing the user ID
`in the authentication system 10 via Web page 420. The set
`time may be speci?ed from a group of 15 seconds, 30
`seconds, 45 seconds, 60 seconds, one hour, one day, one
`month, and three month. The set time is based on user habits
`and the security needs of the system 20.
`[0069] The system interface function performs the tasks of
`(i) interfacing With the system 20, and (ii) sending user ID
`and the transient passWord to the system 20. The system
`interface function may use a special connect path to obtain
`access to the access control function 34 of the system 20.
`
`[0070] The system interface function enables a privileged
`and secure connection to the system 20 that alloWs the
`access control function 34 in the system 20 to receive from
`the authentication system 10, the user ID 12 and transient
`passWord 14. The system interface connection may be via
`the Internet or it may be a dedicated telephone line connec
`tion.
`
`[0071] The system interface function sends to the system
`20, a user’s pre-stored user ID and the random pass code
`created on user demand. The access control function in the
`system 20 updates the existing passWord by the pass code.
`Subsequently, after Waiting a set time, the system interface
`function sends the same pre-stored user ID and a null pass
`code to the system 20. The system 20 updates the passWord
`by the null pass code, ending the life of the pass code.
`[0072] Alternate Versions
`[0073] This invention may be practiced in different ver
`sions, as the systems have different security needs and the
`users have different habits. The access control function 34 of
`system 20 may have different versions alloWing ?exibility in
`hoW the passWords and pass codes are used.
`
`[0074] In one version, the authentication system 10 sends
`the user ID, the transient pass code and the set time all at the
`same time, avoiding a second or subsequent data interface to
`system 20. In this version the access control function 34 of
`the system 20, Would run its oWn timer and after expiry of
`set time Would disable the transient pass code. The access
`control function 34 may disable the transient pass code
`either upon ?rst access or after set time expires.
`
`[0075] In other versions the access control function 34
`may be able to use either an existing passWord or a transient
`pass code. Three different versions are described here.
`
`[0076] In the ?rst version a system may require only the
`transient pass code for gaining access to system 20. In the
`
`second version either the traditional passWord OR the tran
`sient pass code may be used by the user to gain access to the
`system 20. The access control function 34 is adapted to
`recogniZe, either the traditional passWord or the transient
`pass code as valid user veri?cation, enabling those users
`Who do not see a need to adopt the transient pass code, to
`continue to use the traditional passWord and those users Who
`Want to use the transient pass code, to also do so. In the third
`version both the traditional passWord AND the transient pass
`code may be required to gain access, as may be used in very
`high security systems.
`[0077] With reference to FIG. 2, log on Web pages for
`some of the different versions are illustrated. Log in page
`210 requires the use of an existing passWord 14. User
`instructions 216 describe hoW the passWord is obtained by
`calling an 800 number using the user’s cell phone. Log in
`page 220 requires the use of a transient pass code, as
`instructions 226 describes this feature of the log on proce
`dure.
`
`[0078] In yet another version, the passWord is in the form
`of a passkey. The passkey has embedded user identi?cation
`and a random pass code. The passkey is suf?cient both to
`identify the user and to verify the user to the system.
`
`[0079] As an illustration, take a banking application,
`Where the bank computer system already has ability to
`respond to telephone calls by their customers, as Well as to
`provide Web-based online banking services, Where a user ID
`and passWord is required, the user ID being in many cases
`a social security number.
`
`[0080] According to this invention, a user before logging
`on to the online bank system Would call an 800 number of
`the bank. The bank Would verify the caller ID With either the
`user home number or the cell telephone number, and request
`the PIN code, the same PIN code for an ATM card. On
`customer identi?cation and veri?cation, the authentication
`function 10A in the bank computer system 20 Would gen
`erate a random number and append it to the user telephone
`number making it a passkey, send it to the user on the
`telephone, and send it to the access control function 34 of the
`system 20.
`
`[0081] In this version, there is no need for the user to open
`an account as With other versions described earlier because
`the banking system already has the data on the user of
`telephone number, name, e-mail address and the PIN.
`
`[0082] As illustrated in FIG. 2, log-in-page 230, the user
`Would log on With a passkey 29 as one string, eliminating the
`user ID and passWord data entry ?elds. The access control
`function 34 Would both identify the user 06 and verify the
`user With the passkey 29.
`
`[0083] As further illustration of this version, a user has a
`cell telephone number of 1-707 399 4333 and calls 1-800
`Bank One. The bank system asks for a PIN and the user
`enters a PIN of 1249, the same PIN used for an ATM or the
`last four digits of social security number. The authentication
`function 10A in the bank computer system identi?es and
`veri?es the user and creates a passkey of 7073994333-4345,
`Where the ?rst number is the cell telephone number and the
`last four digits are a random number created for this user for
`this transaction. The authentication function 10A commu
`nicates the passkey of 7073994333-4345 to the access
`control function 34. The authentication function 10A also
`
`TWILIO, INC. EX. 1008
`Page 11
`
`

`
`US 2004/0203595 A1
`
`Oct. 14, 2004
`
`communicates the passkey to the user 06. Since the user
`already knows the telephone number, there is no need to
`communicate that part of the passkey. Therefore the voice
`response may be “plus 3445. A time limit for Which this
`passkey is useable may also be voice annunciated such as
`“plus3445 three minutes”.
`
`obtaining the objective and providing the advantages herein
`before stated, it is to be understood that it is merely
`illustrative of the presently preferred embodiments of the
`invention and that no limitations are intended to the details
`of construction or design herein shoWn other than as
`described in the appended claims.
`
`[0084] The user, on login page 230, enters passkey 29 as
`7073994333-4345. Legend 236 describes to the user hoW to
`obtain the passkey 29. The bank identi?es the user 06 by the
`telephone number 707 399 4333 and veri?es the user 06 by
`the random code of 4345, and grants access for one time or
`for a time limit of three minutes.
`
`[0085] This, it is believed, is far more secure and conve
`nient for the bank customer and the bank. It enables the bank
`customer:
`to not have to have a passWord to remember
`and safeguard, (ii) to not have to use a social security
`number as user ID to access the account, (iii) to not need
`additional resources as the user already has a cell phone or
`home phone With unique phone numbers and (iv) to not have
`to learn neW procedure as the user is already familiar With
`the procedure of using an 800 number call to bank and a
`voice response.
`not having to implement
`[0086] To the bank it provides:
`a neW system other than the authentication function softWare
`10A in their eXisting bank computer system 20, (2) security
`for the bank, as a transaction log is created for each request
`for a passkey and a random number is embedded in each
`passkey, and (3) additional security as the use of a passkey
`may be limited for a single transaction and/or for a set time,
`and the user may be so advised When the passkey is voice
`response delivered.
`[0087] Another version of this invention is illustrated With
`reference to FIG. 1C. The system 20 has a ?reWall 24,
`Which screens all data packets 22 of information coming in
`from system interface 02 over the Internet. A packet 22 has
`a packet header 30 and packet data 32.
`[0088] The system interface 02 is adapted to embed the
`passkey 29 as part of each packet header 30. The passkey 29
`may be included in the source ?eld of the packet header 30,
`Without the need to create a neW ?eld for the passkey 29. The
`access control function 34 of the system 20 copies the
`passkey to the ?reWall 24. The ?reWall 24 stores this passkey
`and uses it to compare With the passkey of the data packets
`as

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket