throbber
(12) United States Patent
`Han
`
`(10) Patent N0.2
`(45) Date of Patent:
`
`US 8,024,567 B2
`Sep. 20, 2011
`
`US008024567B2
`
`(54) INSTANT LOG-IN METHOD FOR
`AUTHENTIFICATING A USER AND
`SETTLING BILLS BY USING TWO
`DIFFERENT COMMUNICATION CHANNELS
`AND A SYSTEM THEREOF
`
`(75)
`
`Inventor:
`
`Min-Gyu Han, Seoul (KR)
`
`(73) Assignee: Momocash Inc., Seoul (KR)
`
`(58) Field of Classi?cation Search ...................... .. None
`See application ?le for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`5,986,565 A 11/1999 Isaka
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`2001-266036
`9/2001
`(Continued)
`
`OTHER PUBLICATIONS
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 124 days.
`
`JP
`
`(21) Appl. No.:
`
`10/508,705
`
`(22) PCT Filed:
`
`Mar. 31, 2003
`
`(86) PCT No.:
`§ 371 (0X1)’
`(2), (4) Date:
`
`PCT/KR03/00629
`
`Sep. 30, 2004
`
`(87) PCT Pub. No.: WO03/084127
`
`PCT Pub. Date: Oct. 9, 2003
`
`(65)
`
`(30)
`
`Prior Publication Data
`
`US 2006/0179304 A1
`
`Aug. 10, 2006
`
`Foreign Application Priority Data
`
`Mar. 30, 2002
`Nov. 18, 2002
`
`(KR) ...................... .. 10-2002-0017577
`(KR) ...................... .. 10-2002 -007 1 762
`
`(51)
`
`(52)
`
`Int. Cl.
`(2006.01)
`H04L 9/32
`(2006.01)
`H04L 9/30
`Us. or. ...... .. 713/168; 713/155; 713/169; 713/170;
`713/171; 713/172; 380/229; 380/247; 705/64;
`705/67; 705/72; 705/74; 705/75; 705/79;
`455/466; 455/410; 455/39; 455/411; 455/407
`
`Of?cial Action in corresponding European Patent Application EP
`037130556, dated Dec. 16, 2009.
`
`Primary Examiner * Syed A. Zia
`(74) Attorney, Agent, or Firm * LoWe Hauptman Ham &
`Bemer LLP
`
`ABSTRACT
`(57)
`A method for authenticating a user of certain service provided
`by a system through a ?rst communication channel, in one
`aspect including receiving an access request from a ?rst ter
`minal of the user through the ?rst communication channel;
`receiving an address or number of a second terminal of the
`user through the ?rst communication channel; transferring
`data including an identi?cation code, to the second terminal
`of the user through a second communication channel; receiv
`ing a user con?rmation response, including the user identi?
`cation code, from the second terminal of the user through the
`second communication channel; determining Whether the
`identi?cation code transferred to the second terminal is iden
`tical to the user identi?cation code received from the second
`terminal; generating an authentication code if it is determined
`that both the user identi?cation codes are identical to each
`other; transferring the user authentication code to the ?rst
`terminal of the user through the ?rst communication channel.
`
`4 Claims, 12 Drawing Sheets
`
`200
`
`Servlce user
`
`unlcatien
`First comm
`nsi
`chan
`
`Service provider
`
`Transfer service
`access screen
`
`u nuner 01‘ serum
`communication channel
`
`Display conflr
`on seven
`lea
`
`230
`
`235
`
`240
`
`Transfer confirmation
`response including user
`identiiicatwn cede
`
`‘I
`i
`l.
`
`Generate user
`identiiicetlon code
`for tra Bi V to second
`commun- ca n channel
`
`identylcat'lgrlscode
`T
`fe
`r
`
`‘} Second communication
`I
`channel
`
`245
`
`Confirm user
`ldennflcallon code
`
`Generate user
`authentication code
`
`265
`
`Fl I'St OOl'lIllUnlCaI lo"
`Me]
`
`Use service through
`use‘ auugggélcatlm m authentication code
`Use ser lee through user
`v
`authent icet inn code
`
`Tr arisisr user
`
`270
`
`TWILIO, INC. EX. 1015
`Page 1
`
`

`
`US 8,024,567 B2
`Page 2
`
`US. PATENT DOCUMENTS
`6898 421 132*
`5/2005 Morietal
`
`455ml
`
`2007/0158414 A1* 7/2007 Sasakura etal. ............ .. 235/380
`2011/0014870 A1* 1/2011 Koraichi et a1. ........... .. 455/412
`
`. 455/411
`6,993,323 B2* 1/2006 Kamma .... ..
`. 709/229
`7,337,229 132*
`2/2008 Dutta etal. .
`455/412
`7,756,476 B2* 7/2010 Suzuki ...... ..
`705/39
`7,769,687 B2* 8/2010 Gebb et a1. ..
`726/2
`7,865,937 B1* 1/2011 White et a1.
`705/26
`2002/0029169 A1* 3/2002 Okietal. .
`. 380/247
`2002/0031225 A1* 3/2002 Hines
`. 713/189
`2002/0095589 A1* 7/2002 Keech ..
`705/18
`2002/0143634 A1* 10/2002 Kumar etal. .... ..
`. 713/201
`2002/0169988 A1* 11/2002 Vandergeestetal.
`. 370/352
`2002/0186688 A1* 12/2002 Inoue et a1. ...... ..
`.... .. 709/225
`2003/0028639 A1* 2/2003 Yamamoto et a1.
`2003/0061503 A1* 3/2003 Katz etal. ................... .. 713/200
`2006/0179304 A1* 8/2006 Han ............................ .. 713/168
`
`FOREIGN PATENT DOCUMENTS
`
`1/2002
`2002-007345
`JP
`8/ 1999
`2001-0028964
`KR
`3/2001
`2001-0016153 A
`KR
`4/2001
`2001-0022354
`KR
`4/2001
`2001-0028964 A
`KR
`7/2001
`2001/0068124 A
`KR
`7/2001
`2001-0068124 A
`KR
`7/2003
`100392792
`KR
`3/2001
`WO 01/15381 A1
`W0
`7/2001
`WO 01/54438 A1
`W0
`Wool/92999 A2 12/2001
`W0
`* cited by examiner
`
`TWILIO, INC. EX. 1015
`Page 2
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 1 0f 12
`
`US 8,024,567 B2
`
`FIGJA
`
`<Convent ional user informat ion registrat ion process>
`
`Service user
`
`Internet
`
`Service provider
`
`Access service
`
`Display access
`(login') screen
`
`i
`
`_Seiect.use_r
`registrat ion item
`
`I
`I
`I
`
`III
`‘III.
`
`Display user
`registrat Ion screen
`
`_Input _us.er_
`registrat lOl'i item
`(Sele t UlD/Passwor'd)
`
`Display registration
`compiet ion screen
`
`Transfer service
`access screen
`
`Transfer user
`registrat ion screen
`
`registrat ion user
`
`ii
`Transfer registration
`complet ion screen
`
`i
`
`i 1
`
`i
`I
`i
`I
`\
`
`llll'lr
`
`#11
`
`I'll
`III I
`
`I
`I
`
`TWILIO, INC. EX. 1015
`Page 3
`
`

`
`U.S. Patent
`
`Sep. 20, 2011
`
`Sheet 2 of 12
`
`US 8,024,567 B2
`
`FIG.1B
`
`<ConventionaI
`
`user authentication process>
`
`Service user
`
`Internet
`
`Service provider
`
`Access service
`
`Transfer service
`HCCGSS screen
`
`Display access
`(login) screen
`
`ID and
`Input user
`password
`
`ID and
`Confirm user
`password
`
`Use service through
`user authentication
`code
`
`\
`\
`I
`\
`
`I
`I
`I
`
`Gene[ate_user
`authentication code
`
`Transfer_user
`authentication code
`
`Provide service
`through user
`authentication code
`
`TWILIO, INC. EX. 1015
`Page 4
`
`TWILIO, INC. EX. 1015
`Page 4
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 3 of 12
`
`US 8,024,567 B2
`
`FIGJC
`
`Select pay contents
`i
`Select mobi le sett Iement
`i
`Move to mobi ie sett iement page
`i
`Input settlement information
`_
`(telephone number ,
`resident regstrat ion number , etc. )
`i
`Receive mobi ie phone SMS
`i
`Input authent icat ion code web page
`i
`Confirm authentication code
`i
`Use pay contents
`
`TWILIO, INC. EX. 1015
`Page 5
`
`

`
`U.S. Patent
`
`Sep. 20, 2011
`
`Sheet 4 of 12
`
`US 8,024,567 B2
`
`FIG.2
`
`200
`
`Service user
`
`First communication
`channel
`
`Service provider
`
`T2%i%t%i:aai°e
`
`220
`
`205
`
`
`
`_ Generate_user
`identification code
`for
`transfer to second
`communication channel
`
`
`
`
`
`
`\\
`
`\lI
`
`lIII i
`
`l
`l
`I
`’
`
`,_‘
`
`/
`
`‘i
`
`\
`\
`
`_ Transfer_user
`identification code
`
`i
`.
`.
`‘i
`i Second communication
`:
`channel
`l
`,
`I
`
`225
`
`245
`
`\-/
`
`'
`
`250
`
`Display access
`(login) screen
`
`
`
`Input number of second
`communication channel
`terminal
`for
`authentication
`
`
`
`
`
`Display confirmation
`on second
`communication
`channel
`terminal
`
`
`
`Confirmation
`response of user
`
`Transfer confirmation
`
`iesnonse .incmdina user
`
`identification code
`
`i’
`:'
`l
`i
`i
`i\
`I
`
`I,’
`i’
`t
`i
`i
`l
`i
`I
`
`‘
`
`210
`
`215
`
`230
`
`23
`
`5
`
`240
`
`265
`
`t
`
`iaeniiiiééiififieéode
`
`Generate_user
`authentication Code
`
`Transfer user
`authentication code
`
`h
`th
`.
`U
`39 Se’V'°° -
`’°Ug
`User a”tgg3;'°at'°"
`
`First communication
`channel
`260
`
`/””‘\\
`
`
`
`Use service through user
`authentication code
`
`‘\
`
`,/
`
`270
`
`TWILIO, INC. EX. 1015
`Page6
`
`TWILIO, INC. EX. 1015
`Page 6
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 5 0f 12
`
`US 8,024,567 B2
`
`3OO‘\-/”’”\\
`
`Start service access through first
`communication channel
`
`305\\_d,//’"‘\
`
`Display access (iogin) screen
`
`310‘\—~””§\
`
`input user mobile communication
`terminal number
`
`3i5\\_,,/"“\- Generate user identification code
`
`1
`Transfer SMS message with the number
`32O\--//-_\input by user through wireless network
`
`Receive SMS message and display SMS
`message on mobile‘communication terminal
`325‘\—"//F\\ For example, ‘Push the.send button
`for access to site"
`
`330‘\—/”’?~\
`
`if
`Confirmation response of user
`(push the send button)
`
`335~\_d,//'“‘\
`
`Compare user identification code
`i
`340\\_,,/”‘\ Generate user authentication code
`i
`Transfer user authentication code
`'
`345‘\—"”—\\ through first communication channel
`i
`Use service through user
`.authentication code
`
`35O‘\-”’—_\
`
`TWILIO, INC. EX. 1015
`Page 7
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 6 0f 12
`
`US 8,024,567 B2
`
`FIGAA
`
`400w Sta" animate: tartar "'St
`
`405\/\ Display access ( login) screen
`
`410 \/\ input us’eér
`
`Ii engggréniin i cat ion
`
`415\/\ ‘Generate user ident i f icat ion code
`
`420 \_/'\ nuTmrbaenrsfianrplrgfpbyllauusge 3193183359? iirfil'lreflheess
`network
`
`i
`
`Receive WAP PUSH message and display
`the message ont mob} ieI communrcat iOi'i
`ernrna
`
`i
`Cont i rmat ion response of user
`(push the send button)
`
`V
`Transfer ident i if icat ion code to
`URL included in the message
`
`7
`
`Compare user iden't ificat ionw code
`
`445w Generate user authentication code
`
`1
`
`Transfer _user authent icat ion code
`through irrst communrcat ion channel
`
`V
`Use service through user
`authent rcat IOI'I code
`
`TWILIO, INC. EX. 1015
`Page 8
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 7 0f 12
`
`US 8,024,567 B2
`
`FIGAB
`
`Access to site
`
`W
`
`Telephone number input
`
`—1
`
`nun ci'mauu
`@D
`
`IAI
`
`TWILIO, INC. EX. 1015
`Page 9
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 8 of 12
`
`US 8,024,567 B2
`
`FIG.5
`
`Start service access through first
`500 \/\ communication channel
`l
`505 \/\ Display access ( iogin) screen
`i
`510 \_/'\ Input user wired telephone number
`i
`Generate user identification code and
`515' \/\ store it in user identif icat ion code
`management database
`
`_AHSftelephone connect ion wi th number
`il'lDU’t by user (display conf l rmat ion on
`wired telephone) .
`For example,
`520
`w "Push the confirmation number displayed
`on screen for access to site"
`i
`Confirmat ion response of user
`(iniyt the confirmation number)
`
`525
`
`i
`530 “3 Compare user ident if icat-ion code
`i
`535 \_/’\ Generate user authent icat ion code
`I
`Transfer user authentication code
`540 \/\ through first communicat ion channel
`
`l
`Use service through user
`545 w authentication code
`
`TWILIO, INC. EX. 1015
`Page 10
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 9 0f 12
`
`US 8,024,567 B2
`
`FIGJSA
`
`Select pay contents
`l
`Select settlement confirmation
`l
`Receive SMS at second communication
`channel
`l
`Confirmation response at second
`communication channel
`l
`input settlement password
`
`Confirm settlement
`l
`Use pay contents
`
`6iO~\~d,//"‘~
`
`620~\~d,//’"‘~
`
`630
`
`640‘\-~”’_\\
`
`650~\_,,/”"‘
`
`660~\__,/”_‘*
`
`670~\\_,/”"‘
`
`TWILIO, INC. EX. 1015
`Page 11
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 10 0f 12
`
`US 8,024,567 B2
`
`FIG.6B
`
`1. Selection of pay contents
`
`2. SMS reception at mobile phone I
`
`..
`
`a‘
`[#3
`[9
`@
`Q
`
`g
`El
`E1
`‘Eé‘
`El
`E] @ 5E
`
`5123
`
`17:1
`151%!
`
`
`
`15:! 1m
`
`E11
`
`
`
`E] (3
`
`F IG.6C
`
`TWILIO, INC. EX. 1015
`Page 12
`
`

`
`U.S. Patent
`
`Sep. 20, 2011
`
`Sheet 11 0f 12
`
`US 8,024,567 B2
`
`FIG.6D
`
`5. Settlement con?rmation
`
`>
`
`6. Use of pay content
`
`squat-5.49;‘
`
`.
`
`s
`
`.
`v
`2“
`
`
`
`122:." I ‘m u » m | “HUB? (53%)
`
`ammo/1:02.24 42
`
`TWILIO, INC. EX. 1015
`Page 13
`
`

`
`US. Patent
`
`Sep. 20, 2011
`
`Sheet 12 0f 12
`
`US 8,024,567 B2
`
`F IG.7
`
`v
`
`
`
`2255 @5232
`
`BE 2 E95: $60 A
`
`8:81:52 6w:
`
`2265
`
`v Ememumcma 260
`:2 “8:352 5% 1
`
`0E.
`
`own
`
`8:82.552 5%
`382% g8
`
`-
`
`............... A IvSZSEEES 656%
`
`88% H2:
`
`3::20
`
`
`:2 $0 E2258 m ||||||| ‘I
`
`
`9:235 mBEow
`2:85
`
`lililllillll Ill!
`
`LL
`
`0;
`
`$8 52%: SE3
`6%
`2:85 “3 .85
`
`=2 283555 .3:
`258E
`82mg 26> 2.8
`
`MT
`
`\
`I
`l
`l
`l
`l
`\
`I
`
`l i
`
`okf)
`
`
`e326 6255 9:23
`
`\IL
`own omK
`
`
`96522 $22;
`ESE 8% 336m.
`r\)
`
`0mm
`
`55$ 6% 212mm
`
`TWILIO, INC. EX. 1015
`Page 14
`
`

`
`US 8,024,567 B2
`
`1
`INSTANT LOG-IN METHOD FOR
`AUTHENTIFICATING A USER AND
`SETTLING BILLS BY USING TWO
`DIFFERENT COMMUNICATION CHANNELS
`AND A SYSTEM THEREOF
`
`TECHNICAL FIELD
`
`The present invention relates to a method and system for
`authenticating a user who wants to use a certain service and
`settling bills for use of the service at a web site on the Internet,
`and more particularly to a method and system for authenti
`cating a user who wants to use a certain service and settling
`bills for use of the service at a web site accessed through the
`Internet wherein only minimal basic information on the user
`is received by a ?rst communication channel, such as an
`Internet, with a relatively weak security and a process of user
`identi?cation and bill settlement is performed by a second
`communication channel, such as a wired or wireless tele
`phone network, with a relatively strong security, such that
`only an authenticated user can use the certain service.
`
`BACKGROUND ART
`
`As well known to those skilled in the art, user authentica
`tion is an essential procedure for use in a certain information
`service or a certain on-line service. Such user authentication
`is typically performed through a user information registration
`step and a user identi?cation step, and thus, only an authen
`ticated user can use a certain service provided by a service
`provider. In such a conventional user authentication process,
`it is essentially required to input a user ID and a userpassword
`for access to a web site along with personal information on the
`user who wants to use the certain service.
`FIG. 1 shows a ?owchart for explaining a user authentica
`tion process using such a user ID and password and a bill
`settlement process for use of a certain service in the prior art.
`The user goes through a user information registration process
`when accessing a desired web site, and then, the user goes
`through a user authentication step whenever he/ she uses a
`certain service. Referring to FIG. 1, the conventional user
`authentication process is mainly classi?ed into two steps: i.e.,
`a user information input step of inputting basic information
`on the user (information required by a service provider,
`including name, address, social security number, contact
`number, kinds of user’s favorite contents, etc.), as shown in
`FIG. 1A; and a user authentication step of authenticating the
`user by checking a user ID and a user password, which are
`assigned by the user, as shown in FIG. 1B.
`However, there is a problem in that the conventional user
`authentication process shown in FIGS. 1A and 1B has no step
`for identifying a user. That is, in a case where a person under
`age performs the user information registration step by using
`an illegal social security number generation application, it
`cannot be checked in real time. Moreover, it is di?icult to
`monitor the illegal registration of the person under age even
`after the fact, if a great number of members are initiated.
`In addition, in order to obtain access to desired information
`at a great number of web sites from which a variety of services
`are provided, there exists inconvenience in that a user has to
`input the same personal information (name, address, social
`security number, contact number, etc.) every web site. Fur
`ther, there exists a problem in that a number of users often
`abandon the registration of personal information related to a
`bill settlement process due to a possibility of out?ow of the
`personal information when they input the information into a
`web site from which information is provided at a predeter
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`mined cost. Furthermore, even in a case where there is no
`reliable relationship between a user and a web site, the user is
`reluctant to input the personal information into the web site.
`In addition, there is a problem in that users with user
`accounts in a plurality of web sites frequently confuses or
`forgets their own IDs and passwords registered on the plural
`ity of web sites.
`In order to solve one of the problems in the prior art in that
`there is no user identi?cation step, several web sites receives
`a photocopy of user identi?cation card via facsimile from a
`user who has completed the user registration step to identify
`the relevant user. However, it also raises another problem in
`that an advantage of the Internet, that is, a quick access to
`information, cannot be suf?ciently used.
`In addition, in order to solve a weak security corresponding
`to another problem in the prior art, there has been proposed a
`user authentication method using a mobile communication
`network. Korean Patent Laid-Open Publication No. 2000
`72433 discloses a user authentication method in which, when
`a user who wants to access a security-required system
`requests user authentication to an authentication system, the
`authentication system transmits a one-time password to a
`mobile communication terminal of the user, and the user
`con?rms this password through a screen of the mobile com
`munication terminal and manually inputs the con?rmed pass
`word through a computer for access to the desired system.
`However, although this method is a technique that is
`improved in view of security over other conventional user
`authentication methods, there still exists inconvenience in
`that the user must directly con?rm the transmitted one-time
`password through the screen of the mobile communication
`terminal and then manually input the password again.
`In addition, in order to solve the problem of the prior art in
`that the user registration step has to be performed every web
`site to use a variety of services provided by a number of web
`sites, there has been proposed a method in which a user can be
`commonly authenticated from a plurality of web sites through
`one user ID and one password by sharing user information
`among the plurality of web sites. However, this method can
`not be used widely due to con?ict of interest between web site
`administrators and high risk of out?ow of personal informa
`tion against user’s will.
`In addition, the prior art has a further problem in that, when
`a bill settlement is required for certain pay contents, a user
`must move to a settlement page for each individual service
`and then input certain settlement information (name, social
`security number, password, etc.) again.
`FIG. 1C shows a conventional bill settlement method for a
`used service. If a user selects pay contents and wants to settle
`a bill for reading of the contents by means of a mobile phone,
`he/ she moves a new web page for inputting information (tele
`phone number, social security number, etc.) required for
`settlement. Then, a certain SMS message including an
`authentication code is received and con?rmed by the mobile
`phone identi?ed by an input telephone number. Then, the
`con?rmed authentication code is input into the web page for
`completing the settlement. As mentioned above, such mobile
`phone settlement method shown in FIG. 1C has a complicated
`settlement process in that the user must move a corresponding
`settlement web page every use of pay contents, input settle
`ment information for each settlement, and further input an
`authentication code con?rmed on a screen of the mobile
`phone into the settlement web page.
`Korean Utility Model Registration No. 20-0193499 dis
`closes a system for settling a certain amount of money by
`using a mobile phone or a wired telephone. A settlement
`process performed in the settlement system is as follows. A
`
`TWILIO, INC. EX. 1015
`Page 15
`
`

`
`US 8,024,567 B2
`
`3
`user who wants to receive a service accesses a carrier server
`through a communication network by using a ?rst his/her own
`terminal. An access management and authentication con?r
`mation apparatus of the carrier server requests the user to
`input a telephone number and a pas sword of a second terminal
`through which he/ she can be called. The user inputs the tele
`phone number of the second terminal through which he/ she
`receives a call and the password by which he/she can be
`identi?ed as a right user, upon a request of the carrier server.
`The access management and authentication con?rmation
`apparatus that has received the telephone number and the
`password stores the password in a database and instructs a
`telephone call apparatus to call the second terminal. The
`telephone call apparatus calls the second terminal having the
`telephone number received by the instruction of the access
`management and authentication con?rmation apparatus. The
`access management and authentication con?rmation appara
`tus sends a message requesting to input the password to the
`user when the apparatus is connected to the user. The user
`called through the second terminal having the known tele
`phone number again inputs the password input at the initial
`access by using the called second terminal. The access man
`agement and authentication con?rmation apparatus again
`received the password compares the again received password
`with the already input password for user identi?cation, grants
`the user an authority to use the service when both passwords
`are identical to each other and causes a service providing
`apparatus to provide the service, and ?nally imposes a fee for
`service use on the telephone number owned by the user when
`the service use is ended.
`However, the disclosure of the Korean Utility model does
`not suggest a solution for the problem of the conventional
`settlement method that the settlement information has to be
`again input every settlement and the already input password
`has to be again input through the mobile phone.
`
`DISCLOSURE OF THE INVENTION
`
`Accordingly, the present invention has been made keeping
`in mind the above problems occurring in the prior art, and an
`object of the present invention is to provide a user authenti
`cation method and system which is capable of removing a
`need of a user registration step by using one user ID, which is
`an address or an number (wired telephone, mobile commu
`nication terminal number, etc.) of a user terminal of a second
`communication channel such as a wired telephone network or
`a wireless network in a variety of web sites, for user authen
`tication.
`Another object of the present invention is to provide a user
`authentication method and system which is capable of remov
`ing a risk of losing a user ID or password by using a user
`terminal address or number of a second communication chan
`nel.
`Still another object of the present invention is to provide a
`user authentication method and system that is capable of
`performing a user identi?cation and authentication without
`requiring a separate step when the user requests an authenti
`cation.
`Still another object of the present invention is to provide a
`user authentication method and system with a stronger secu
`rity compared to a conventional user authentication.
`Still another object of the present invention is to provide a
`settlement method and system that is capable of maximizing
`a user convenience upon settling bills by removing a re-input
`of settlement information when the user uses pay contents.
`In order to achieve the objects and solve the problems in the
`prior art, a method for authenticating a user according to a
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`embodiment of the present invention comprising the steps of
`receiving an access request from a ?rst terminal of the user
`through the ?rst communication channel; receiving an
`address or number of a second terminal of the user through the
`?rst communication channel; transferring data for user iden
`ti?cation, including a user identi?cation code, to the second
`terminal of the user through a second communication chan
`nel; receiving a user con?rmation response, including the
`user identi?cation code, from the second terminal of the user
`through the second communication channel; determining
`whether the user identi?cation code transferred to the second
`terminal is identical to the user identi?cation code received
`from the second terminal; generating a user authentication
`code if it is determined that both the user identi?cation codes
`are identical to each other; and transferring the user authen
`tication code to the ?rst terminal of the user through the ?rst
`communication channel.
`Further, in order to achieve the objects and solve the prob
`lems in the prior art, a method for authenticating a user
`according to another embodiment of the present invention
`comprising the steps of receiving an access request from a
`?rst terminal of the user through the ?rst communication
`channel; receiving an address or number of a second terminal
`of the user through the ?rst communication channel; gener
`ating a user identi?cation code; transferring the generated
`user identi?cation code to the ?rst terminal of the user
`through the ?rst communication channel; receiving the user
`identi?cation code transferred to the ?rst terminal of the user
`from the second terminal of the user through a second com
`munication channel; determining whether the user identi?ca
`tion code transferred to the ?rst terminal is identical to the
`received user identi?cation code; generating a user authenti
`cation code if it is determined that both the user identi?cation
`codes are identical to each other; and transferring the user
`authentication code to the ?rst terminal of the user through the
`?rst communication channel.
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`FIG. 1 is a ?owchart showing a conventional user informa
`tion registration process using a user ID and password, a user
`authentication process and a bill settlement process for a used
`service.
`FIG. 2 is a ?owchart showing an embodiment of an instant
`login user authentication by using the two different commu
`nication channels according to the present invention.
`FIG. 3 is a ?owchart showing an embodiment in a case that
`the second communication channel is a wireless network in
`the instant login user authentication by using the two different
`communication channels according to the present invention.
`FIG. 4 is a ?owchart showing another embodiment in a
`case that the second communication channel is a wireless
`network in the instant login user authentication by using the
`two different communication channels according to the
`present invention and a drawing showing a example of service
`performing the ?owchart.
`FIG. 5 is a ?owchart showing an embodiment in a case that
`the second communication channel is a wired telephone net
`work in the instant login user authentication by using the two
`different communication channels according to the present
`invention.
`FIG. 6 is a ?owchart showing a embodiment of a instant
`lo gin method for settling bills authentication by using the two
`different communication channels and a drawing showing a
`example of service performing the ?owchart.
`
`TWILIO, INC. EX. 1015
`Page 16
`
`

`
`US 8,024,567 B2
`
`5
`FIG. 7 is a block diagram showing a embodiment of a user
`and settlement system authentication by using the two differ
`ent communication channels according to the present inven
`tion.
`
`BEST MODE FOR CARRYING OUT THE
`INVENTION
`
`Hereinafter, the present invention will be in detail
`described by ways of preferred embodiments with reference
`to the accompany drawings.
`FIG. 2 is a ?owchart for explaining a user authentication
`process by means of two different communication channels
`according to the present invention. The user authentication
`process is performed between a user and a service provider.
`The user accesses a system of the service provider through a
`?rst communication channel such as an Internet (step 200).
`The service provider transfers a service access screen to a user
`computer upon a request of access from the user (URL input
`of a user system, a request of information requiring a user
`authentication, etc.) (step 205), and then displays the access
`(login) screen at a web browser of the user (step 210). The
`user inputs a terminal number (a wired telephone number or
`a mobile communication terminal telephone number) of a
`second communication channel such as a wired telephone
`network or a wireless network for user authentication into a
`corresponding section of the login screen for transferring the
`terminal number to the service provider (step 215). Then, the
`service provider generates a user identi?cation code for the
`user (step 220). The service provider transfers the generated
`user identi?cation code to the second terminal of the user such
`as the wired telephone or the portable telephone through the
`second communication channel such as the wires or wireless
`networks (step 225) for display of a certain message (for
`example, “Push the con?rmation button if you want to log
`in”) on a screen of the second terminal occupied by the user
`(step 230). The user who has received the user identi?cation
`code transfers a user con?rmation response including the user
`identi?cation code to the service provider for the identi?ca
`tion request of the service provider (steps 235 and 240). The
`service provider con?rms the user identi?cation code
`included in the user con?rmation response (step 245), com
`pares the user identi?cation code transferred from the user
`with the user identi?cation code transferred from the service
`provider to the user, determines the user as a lawful user when
`both user identi?cation codes are identical to each other and
`accordingly generates a user authentication code (step 250).
`The generated user authentication code is transferred to the
`?rst terminal of the user through the ?rst communication
`channel such as the Internet (step 260) and the user can use the
`service while giving/taking the user authentication code
`to/from the service provider (steps 265 and 270).
`FIG. 3 is a ?owchart for explaining an embodiment if the
`second communication channel is a wireless network in the
`user authentication method described in FIG. 2. The user
`accesses a system of the service provider through a ?rst
`communication channel such as an Internet (step 300). The
`service provider transfers a service access screen to a ?rst
`terminal of the user such as a computer upon a request of
`access from the user and then displays the access (login)
`screen at a web browser worked in the ?rst terminal of the user
`(step 305). The user inputs his/her mobile communication
`terminal number for user authentication into a corresponding
`section of the lo gin screen for transferring the terminal num
`ber to the service provider (step 310). Then, the service pro
`vider generates a user identi?cation code for the user (step
`315).
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`The service provider transfers the generated user identi?
`cation code to the mobile communication terminal of the user
`(step 320). In this step, the service provider can transfer a
`message and the user identi?cation code, which are to be
`displayed at the mobile communication terminal of the user,
`along with a predetermined callback number by using a short
`message service (SMS) system. In this case, in order to set a
`call as the mobile communication terminal number of the user
`input in the ?rst communication channel, the service provider
`can use a CTI (Computer Telephone Integration) system that
`is a system for setting a call with the mobile communication
`terminal of the user through the wireless communication
`network by using the mobile communication terminal num
`ber of the user input in a computer (step 325). The user issues
`a user con?rmation response, which can be performed by
`only pushing a send button, in compliance with the message
`(for example, “Push the send button if you want to access this
`site”) displayed at his/her mobile communication terminal.
`The user identi?cation code transferred to the mobile com
`munication terminal of the user along with the user con?r
`mation response is transferred to the service provider through
`the callback number (step 330).
`According to another preferred embodiment of the present
`invention, a URL callback system can be used when the
`service provider transfers the user identi?cation code to the
`mobile communication terminal, as shown in FIG. 4.
`As well known to those skilled in the art, the URL callback
`transfers a uniform resource locator (URL) of a mobile home
`page (“phone page”) and the user identi?cation code inserted
`as a parameter for user identi?cation into the mobile homep
`age, instead of the callback number in the aforementioned
`SMS, to the mobile communication terminal of the user (steps
`420 and 425). When the user receives the URL and the user
`identi?cation code and pushes a con?rmation button on his/
`her mobile communication terminal, the mobile communica
`tion terminal

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket