throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2005/0273442 A1
`(43) Pub. Date:
`Dec. 8, 2005
`Bennett et al.
`
`US 20050273442A1
`
`(54) SYSTEM AND METHOD OF FRAUD
`REDUCTION
`
`(76) Inventors: Naftali Bennett, New York, NY (US);
`Lior Golan, Tel Aviv (IL); Nira
`Rivner, Ramat Gan (IL)
`
`Correspondence Address:
`PEARL COHEN ZEDEK, LLP
`10 ROCKEFELLER PLAZA
`SUITE 1001
`NEW YORK, NY 10020 (US)
`
`(21) Appl. No.:
`
`11/134,479
`
`(22) Filed:
`
`May 23, 2005
`
`Related US. Application Data
`
`(60) Provisional application No. 60/572,776, ?led on May
`21, 2004.
`
`Publication Classi?cation
`
`(51) Int. Cl? ..................................................... ..H04K 1/00
`(52) Us. 01. .............................................................. .. 705/67
`
`ABSTRACT
`(57)
`A system and method may alloW for extending authentica
`tion to a tWo factor, out of band form, requiring an additional
`data element or code via a channel different from the channel
`used for the primary transaction, Where the different channel
`has the attribute that it is dif?cult or costly to achieve many
`access points to it, and it is possible to limit the number of
`users associated With a particular access point to it.
`
`/-‘1-4
`
`END
`USER
`
`1 5
`
`K18
`
`K12
`
`ON Ll NE SYSTEM
`
`AUTHENTICATION
`LOCAL MODULE
`(PLUG IN)
`
`J1 3
`
`K11
`
`HOSTED SYSTEM
`
`TWILIO, INC. EX. 1031
`Page 1
`
`

`
`Patent Application Publication Dec. 8,2005 Sheet 1 of4
`
`US 2005/0273442 A1
`
`K14
`
`I
`
`ONLINE SYSTEM
`
`‘
`
`12
`
`/
`
`UE§EDR
`
`'
`
`g
`
`15
`
`}
`AUTHENTICATION
`LOCAL MODULE $13
`(PLUG IN)
`
`\-/—-17
`
`K11
`
`HOSTED SYSTEM
`
`FIG]
`
`TWILIO, INC. EX. 1031
`Page 2
`
`

`
`Patent Application Publication Dec. 8, 2005 Sheet 2 0f 4
`
`US 2005/0273442 A1
`
`12
`(
`
`1(3
`AUTHENTICATION
`LOOAL MODULE
`TOT
`
`HS
`
`vALIDATION ‘
`
`‘13
`N
`
`11
`(
`
`1(04
`193
`ADI/"NI _ QSFEE
`APP"
`—'
`DB
`L
`TOT
`
`195
`‘ USER
`DEVICE
`MAPPING
`TOG
`
`ALERT ‘
`LEVEL
`MONITOR
`
`RISK
`ASS
`"
`
`198
`
`DEOISION ENGINE
`
`DECIS|ON MAK|NG
`
`102
`I
`
`PROXY
`MAPPING
`
`ONLINE SYSTEM
`‘
`12
`
`I
`
`I09
`(
`HISTORY
`DB
`
`111
`I
`
`—
`
`V
`AUTHENTI
`’ GATION
`APPLIOATION
`
`I10
`I
`
`CHANNEL
`USER MAPPING
`DB
`
`I12
`
`(
`
`HSM
`
`113
`(
`
`EXTERNAL
`COMMUNICATION
`ENGINES
`
`V
`
`H6 ‘
`
`AUTHENTICATION
`
`HOSTED SYSTEM
`1I4
`
`i
`
`END USER
`
`\
`
`TWILIO, INC. EX. 1031
`Page 3
`
`

`
`Patent Application Publication Dec. 8, 2005 Sheet 3 0f 4
`
`US 2005/0273442 A1
`
`_ REGULAR I
`
`AUTHENTICATION
`
`I
`
`EVALUATE
`AUTH ENTICATION
`
`"\JZOO
`
`N200
`
`[200
`PROCEED TO
`'ONLINE APPv
`A
`
`ZOO
`
`NO
`
`FURTHER
`CHECKS REQUIRED
`
`200
`
`? .
`
`YES
`
`200
`
`USER PROVIDES
`ADDITIONAL CHANNEL
`
`"\200
`
`ADDITIONAL
`
`r200
`END
`SESSION
`A
`
`V200 '
`
`SEND A COMPLETION CODE
`vIA ADDITIONAL CHANNEL N200
`I
`
`USER ENTERS
`COMPLETION CODE
`
`‘M200
`
`V200
`
`NO
`
`YES
`
`FIGS
`
`TWILIO, INC. EX. 1031
`Page 4
`
`

`
`Patent Application Publication Dec. 8, 2005 Sheet 4 0f 4
`
`US 2005/0273442 A1
`
`LOW LEvEL
`
`f' 300
`
`ALERT
`330
`
`RELEASE
`360
`
`MEDIUM LEvEL
`
`L/~510
`
`ALERT
`
`RELEASE
`
`340
`
`'
`
`350
`
`HIGH LEvEL f 320
`
`FIG. 4
`
`TWILIO, INC. EX. 1031
`Page 5
`
`

`
`US 2005/0273442 A1
`
`Dec. 8, 2005
`
`SYSTEM AND METHOD OF FRAUD REDUCTION
`
`RELATED APPLICATION DATA
`
`[0001] The present application claims bene?t from prior
`provisional application Ser. No. 60/572,776 entitled “Sys
`tem and Method of Fraud Reduction”, ?led on May 21,
`2004, incorporated by reference herein in its entirety.
`
`FIELD OF THE INVENTION
`
`[0002] The present invention relates to authentication;
`more speci?cally the present invention may be used, for
`example, in authenticating parties in a transaction.
`
`BACKGROUND
`
`[0003] In parallel to the groWth in use of online channels
`for accessing a variety of services, and performing a variety
`of transactions, identity theft has reached epidemic levels,
`and online account takeover and transaction fraud is groW
`ing at an enormous rate. Parties committing fraud (“fraud
`sters”) have neW technologies at their disposal: for example
`“Trojan horses” and key loggers may be installed in unsus
`pecting customers’ computers, transmitting personal infor
`mation back to the fraudster; and phishing attacks may trick
`consumers into giving up personal and ?nancial information
`(for example Without limitation: social security number
`(“SSN”), account numbers, banking information, user
`names and passWords for various services, personal identi
`?cation numbers (“PINs”), credit card numbers, Which may
`be referred to as for example “user Credentials” or “Cre
`dentials”).
`[0004] Recent scams shoW a sophisticated, determined,
`innovative and Well organiZed online crime Wave. Fraud
`sters are more adaptive than ever, modifying their modus
`operandi and techniques quickly to exploit neW vulnerabili
`ties. While the fraudsters do not limit themselves to a
`speci?c sector, their main focus is on the banking and
`?nancial accounts sectors (other sectors prone to fraud are
`government services, ISPs, telecom companies and health
`care and many others).
`
`[0005] One issue is authentication—hoW does a service or
`transaction provider knoW Whether a certain user accessing
`a service and performing actions at a certain site is Who he
`or she claims to be. Using the combination of a login and
`passWord alone (Which still are the most prevalent method of
`authentication) may not be satisfactory.
`[0006] Many solutions have been proposed for the prob
`lem of authentication, hoWever many of them encounter an
`imbalance betWeen usability vs. security: they are either not
`secure enough, or, When security is enhanced to satisfactory
`levels, they are cumbersome and expensive to deploy and
`operate.
`[0007] Various service providers may use Credentials in
`order to authenticate users in remote applications. Authen
`tication may be required Whenever a sensitive operation
`takes place, for example, vieWing personal information,
`performing ?nancial transactions, updating the user’s pro?le
`and more.
`
`provider. Users’ credentials may enable access to sensitive
`information as Well as funds, and therefore getting hold of
`them has become a popular criminal activity Stealing users’
`credentials may be done in various Ways. For example, theft
`of a ?le containing credentials from the bank or a third party
`(including an “inside job”), a large and successful “Phish
`ing” attack, keyboard sniffing and more.
`
`[0009] When faced With a major theft of user credentials,
`the service provider may execute one or more of the fol
`loWing options:
`[0010] Provider may operate its business at a much higher
`risk level, for example, may check and analyZe transactions
`to make sure no fraudulent activity takes place.
`[0011] Provider may perform a costly operation of chang
`ing the user credentials or deploying a neW authentication
`mechanism.
`
`[0012] Provider may shut doWn parts of the business in
`case the other tWo options may not be acceptable.
`
`[0013] Provider may perform other sets of actions.
`
`[0014] The service provider may not have any external
`alert as to the occurrence of a massive credential theft. For
`example, it may not knoW When a large set of credentials is
`stolen by an insider job, or from a third party service
`provider. In addition, even When a large theft may be knoWn,
`like in the case of a large phishing attempt, the service
`provider may not knoW When the stolen credentials Will
`actually be used.
`[0015] Service providers may be therefore looking for
`alternative authentication options. Some of the alternative
`solutions offered today are:
`
`[0016] 1. Provider may ask for shared secret information
`that changes over time and may be therefore more difficult
`to obtain or that may lose its value after some time, as it
`becomes irrelevant, for example, details about recent trans
`actions, or invoicing.
`
`[0017] 2. Provider may ask for random parts of shared
`secret information, for example, random digits of the pass
`Word, or random data elements out of a set of knoWn data
`elements
`
`[0018] 3. Mobile or telephone authentication, for example,
`mobile telephone may be pre-registered to the service and
`may be used to authenticate the user
`
`[0019] 4. Token based authentication
`
`[0020] The current solutions may not be satisfactory, since
`none of them may strike a good balance betWeen security
`and usability. Either they may not be secure enough, for
`example, asking for random pieces of a shared secret,
`information Which may easily be obtained during the initial
`user credentials theft, may not be usable enough or may be
`too expensive to actually deploy, for example, token authen
`tication Which may be expensive to implement, may require
`customer education, and deployment ahead of time to all
`users.
`
`SUMMARY
`
`[0008] During authentication the user may usually be
`required to supply a pre-established passWord and optionally
`an additional shared secret betWeen the user and the service
`
`[0021] Embodiments of the present invention may relate
`to a method and system for addressing massive theft (or
`suspected theft) of identi?cation information used in order to
`
`TWILIO, INC. EX. 1031
`Page 6
`
`

`
`US 2005/0273442 A1
`
`Dec. 8, 2005
`
`access services that contain, for example, con?dential infor
`mation of the users of those services, services Where the user
`can perform sensitive operations or other services. Such
`identifying information may include but is not limited to, for
`example, user-names, codes, passWords of any form, or any
`other personal identifying data that can be used in order to
`access services that contain con?dential information
`(referred herein as “Credentials” or “User Credentials”).
`
`[0022] Embodiments of the present invention may relate
`to a method and/or system for authenticating a user partici
`pating in a transaction, for example, a ?nancial transaction,
`opening an account, etc. A user may communicate With an
`institution via a ?rst communication channel such as for
`example the Internet and a Web site. The system may
`transmit a data element, for example a code, to the user via
`a second communication channel, (the identi?cation of
`Which may be provided by the user, or may be generated in
`another manner), for example, a telephone connection,
`e-mail connection etc. The authentication system may
`receive the data element from the user via the ?rst commu
`nication channel and may determine, based on the data
`element, if the user is alloWed to perform a transaction. In
`some embodiments, the transmitting of the data element to
`a user and receiving the data element from the user may be
`done only if an alert level is not suf?cient, or is a certain
`level. The authentication system may alloW the user to
`proceed With the transaction only if the data element
`received via the second communication channel is supplied
`correctly via a ?rst communication channel, for example, the
`received code matches the sent code. In some embodiments
`the ?rst communication channel may be a telephone con
`nection While the second communication channel may be the
`Internet; other suitable channels may be used. The second
`communication channel may or may not be the communi
`cation channel by Which the transaction is conducted.
`
`[0023] A system and method according to one embodi
`ment may, during a transaction With a user, transmit to the
`user, via a ?rst communication channel, a code; and receive
`from the user, via a second communication channel, the
`code. The transaction may proceed, or the user may be
`authenticated, if the code matches. A system and method
`according to one embodiment may conduct transactions With
`a number of users, ensuring that for each of a set of ?rst
`communications channels, only a certain number of users
`can use a particular access point to that ?rst communication
`channel. The second communication channel may be the
`communication channel by Which the transaction is con
`ducted; but in alternate embodiments need not be.
`
`[0024] Some embodiments of the present invention may
`relate to a method and/or system for authenticating a user
`participating in a transaction, for example, a ?nancial trans
`action, opening an account, a passWord recovery, etc. Auser
`may communicate With an institution via a communication
`channel such as for example the Internet and a Web site. The
`system may transmit a data element, for example a code, to
`the user via a different communication channel (the identi
`?cation of Which may be provided by eg the user, or may
`be generated in another manner), for example, a telephone
`connection, e-mail connection etc.
`
`[0025] The authentication system may receive the data
`element from the user via a communication channel and may
`determine, based on the data element, if the user is alloWed
`
`to perform a transaction. In some embodiments one of the
`communication channels may have characteristics that it
`may be dif?cult and/or expensive to obtain many access
`points to it. In some embodiments, the transmitting of the
`data element to a user and receiving the data element from
`the user may be done When there is a greater probability of
`transaction risk. The authentication system may alloW the
`user to proceed With the transaction only if the data element
`received via one communication channel is supplied cor
`rectly via a different communication channel, for example,
`the received code matches the sent code. In some embodi
`ments one communication channel may be a telephone
`connection While the other communication channel may be
`the Internet; other suitable channels may be used The other
`communication channel may or may not be the communi
`cation channel by Which the transaction is conducted. Some
`embodiment of the present invention may include initiating
`contacting With a user via one of the communication chan
`nels.
`
`[0026] A system and method according to one embodi
`ment may, during a transaction With a user, transmit to the
`user, via one communication channel, a code; and receive
`from the user, via a different communication channel, the
`code. The transaction may proceed, or the user may be
`authenticated, if the code matches. A system and method
`according to one embodiment may conduct transactions With
`a number of users, ensuring that for each one of the
`communication channels, only a certain number of users can
`use each access point to such communication channel. One
`of the communication channels may be the communication
`channel by Which the transaction is conducted; but in
`alternate embodiments need not be. In some embodiments
`the code may be transmitted only on the suspicion as to the
`existence of a certain risk level. The risk level may be related
`to the transaction in some embodiments; but in alternate
`embodiments the risk level may be related to an event
`outside of the transaction. In some embodiments it may be
`possible to limit the number of users Who may use an access
`point to one of the communication channels, for example, no
`more than N users may be permitted to use an access point
`to one of the communication channels. In some embodi
`ments the access point to one of the communication chan
`nels may be invalid if, for example, it has existed for feWer
`than N days. The identity of the access point to one of the
`communication channels may be collected before a trans
`action or during a transaction.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0027] The subject matter regarded as the invention is
`particularly pointed out and distinctly claimed in the con
`cluding portion of the speci?cation. The invention, hoWever,
`both as to organiZation and method of operation, together
`With objects, features and advantages thereof, may best be
`understood by reference to the folloWing detailed descrip
`tion When read With the accompanied draWings in Which:
`
`[0028] FIG. 1 depicts an authentication system according
`to one embodiment of the present invention;
`
`[0029] FIG. 2 depicts an authentication system according
`to one embodiment of the present invention;
`
`[0030] FIG. 3 is a ?oWchart depicting a process according
`to an embodiment of the present invention; and
`
`TWILIO, INC. EX. 1031
`Page 7
`
`

`
`US 2005/0273442 A1
`
`Dec. 8, 2005
`
`[0031] FIG. 4 is a ?owchart depicting a process for
`moving between alert levels according to an embodiment of
`the present invention.
`
`[0032] Reference numerals may be repeated among the
`?gures to indicate corresponding or analogous elements.
`
`DETAILED DESCRIPTION
`
`[0033] In the folloWing detailed description, numerous
`speci?c details are set forth in order to provide a thorough
`understanding of the invention. HoWever it Will be under
`stood by those of ordinary skill in the art that the present
`invention may be practiced Without these speci?c details. In
`other instances, Well-knoWn methods, procedures, compo
`nents and circuits have not been described in detail so as not
`to obscure the present invention. Various modi?cations to
`the described embodiments Will be apparent to those With
`skill in the art, and the general principles de?ned herein may
`be applied to other embodiments. The present invention is
`not intended to be limited to the particular embodiments
`shoWn and described.
`
`[0034] Unless speci?cally stated otherWise, as apparent
`from the folloWing discussions, it is appreciated that
`throughout the speci?cation, discussions utiliZing terms
`such as "processing,”“computing, ”“calculating,”“determin
`ing,” or the like, may refer in Whole or in part to the action
`and/or processes of a processor, computer or computing
`system, or similar electronic computing device, that manipu
`late and/or transform data represented as physical, such as
`electronic, quantities Within the system’s registers and/or
`memories into other data similarly represented as physical
`quantities Within the system’s memories, registers or other
`such information storage, transmission or display devices.
`
`[0035] The processes presented herein are not inherently
`related to any particular computer, processing device, article
`or other apparatus. An example of a structure for a variety
`of these systems Will appear from the description beloW. In
`addition, embodiments of the present invention are not
`described With reference to any particular processor, pro
`gramming language, machine code, etc. It Will be appreci
`ated that a variety of programming languages, machine
`codes, etc. may be used to implement the teachings of the
`invention as described herein.
`
`[0036] Embodiments of the invention may be used so
`Service Providers that may provide services containing
`con?dential information, Will be able to continue providing
`access to such services to their users, for example, in the face
`of massive theft, or suspected theft of credentials of the users
`of their services. It Will be appreciated, hoWever that the
`present invention may not be limited to usage by service
`providers, but rather may also be used by the government,
`and any other authority or entity that offers access to
`information of con?dential or private nature.
`
`[0037] A system and method may alloW for extending
`authentication to a tWo factor, out of band form, requiring for
`example an additional data element or code via a channel
`different from the channel used for the primary transaction.
`The system may contact a user Who may Wish to conduct a
`transaction via a communication channel, Which may be the
`communication channel of conducting the transaction or an
`additional communication channel, and provide the user
`With a secret, for example, a code or a data element. The user
`
`may provide the system With the secret via a communication
`channel Which is different from the channel the secret may
`be received by. For example, a user may log in to a Web via
`the Internet and the system may contact the user by sending
`a SMS With a code to the user’s mobile telephone. The user
`may enter the code received via the second channel (e g., the
`mobile phone) via the ?rst channel (e.g., the Internet) in
`order to access the system. In another embodiment the user
`may receive the code via the ?rst channel (e.g., the Internet)
`and the system may contact the user via the second channel,
`for example a landline telephone and may request the user
`to supply the code via the second channel. In other embodi
`ments the user may contact the system via a second channel
`and may supply the secret via a ?rst or a second channel.
`
`[0038] An embodiment of the invention and system may
`be used, for example, by ?nancial institutions (FIs), or
`non-?nancial institutions to address massive credentials
`theft or suspected theft of their users and members. The
`present invention may be relevant to anyone that operates a
`service requiring remote customer access using some form
`of credentials and that may be subjected to any kind of
`credential exposure. An FI that may be using an embodiment
`of the invention may not be required to distribute any
`hardWare ahead of time, nor may it be required to educate its
`users. The El may deploy a method according to one
`embodiment exactly When needed and Where needed. An
`embodiment of the invention may therefore provide a high
`level of protection against any kind of theft of credentials, at
`loW cost.
`
`[0039] Some embodiments of the present invention may
`include a system and/or method Which may provide ?exible
`transaction processing based on for example the risk assess
`ment or risk level of a transaction and/or a user or party to
`a transaction. For example, based on a risk level, a level of
`authentication or other aspects of a transaction may be set or
`altered.
`[0040] It Will be appreciated by persons skilled in the art
`that this system and method may not be limited to use by
`?nancial institutions, but rather by any Service provider, that
`users may be required to authenticate themselves in order to
`gain access to the services. Moreover, in some embodiments
`reference may be made to a telephone and a telephone
`number, as the second factor for the authentication. While a
`telephone line and number may correspond to the require
`ments de?ned herein for the second communication channel,
`it should be appreciated by persons skilled in the art that
`other communication channels may be used as Well, and the
`telephone may be used in order to provide a simple illus
`tration of a certain embodiments of this invention.
`
`[0041] It Will also be appreciated by persons skilled in the
`art that the “Users” referred to herein, could be individuals
`as Well as corporations and other legal entities. The alert
`levels or levels of fraud alert referred to in the folloWing
`sections may be intended as an illustration and there may be
`many other con?gurations intended to distinguish betWeen
`various levels of fraud attack or suspected attack.
`[0042] The system and method described herein may be
`implemented Whenever massive Credentials’ theft may
`occur, as Well as When it is suspected to have occurred, or
`anytime.
`[0043] One of the advantages of an embodiment of the
`invention is that it may be deployed immediately When
`
`TWILIO, INC. EX. 1031
`Page 8
`
`

`
`US 2005/0273442 A1
`
`Dec. 8, 2005
`
`needed and Where needed, and may have very loW opera
`tional and deployment costs, moreover, it may not require
`prior access such as, for example, pre-enrolment, or pre
`distribution of hardWare to users, Who may be potential
`victims of such theft.
`
`[0044] An embodiment of the invention may extend
`authentication to a tWo-factor out-of-band form, requiring an
`additional data element, in addition to the credentials, to be
`transmitted to the user via a different channel. In one
`embodiment such second channel may be, but is not limited
`to a mobile telephone or a landline telephone, or a pager, or
`any channel that has the characteristic that it is dif?cult
`either logistically, money-Wise, or time-Wise, to obtain
`access to many access points to it, for example, it may be
`dif?cult and/or expensive to oWn numerous telephone lines,
`or mobile numbers or beeper numbers, and in a preferable
`embodiment of this invention, it may be Widely available
`and easy to access by users (on an individual basis). Chan
`nels not having such characteristics may be used for out
`of-band communication.
`
`[0045] It should be noted that unlike typical tWo-factor
`authentication methods, the additional authentication chan
`nel (e.g., a channel used outside a normal process or channel
`for authentication or identi?cation) may not be previously
`uniquely linked to a user, and therefore there may not be a
`need for prior access to the users, for example, in the form
`of registration, distribution of hardWare or education of
`users, prior to deploying a method according to one embodi
`ment.
`
`[0046] In one embodiment, the system may ensure that for
`each of an out-of-band or secondary communication chan
`nel, only one or a certain number of users or accounts can
`use this channel for authentication. Security may be
`achieved by for example limiting the number of different
`user service accounts that may use the same authentication
`channel. For example, if the service is a bank account, such
`limitation may be achieved by limiting the number of bank
`accounts that may be linked to a certain telephone number,
`or by limiting the number of users Who may link their
`accounts to that telephone number, based on for example
`name/SSN/Whether they are members of the same family,
`and by deploying as part of a method according to one
`embodiment only those channels that may have the charac
`teristic that it may be dif?cult (e.g., logistically, money-Wise,
`or time-Wise) to obtain access to many access points to it.
`For example, it may be both expensive and logistically
`dif?cult to obtain access to a signi?cant number of land-line
`telephone numbers.
`
`[0047] The deployment of an embodiment of the invention
`may be governed and set according to criteria intended to
`specify the level of the threat of fraud. It may also be applied
`selectively to users according to various criteria intended to
`assess the probability of fraud, for example, at various levels
`of fraud users logging into a service from their typical IP
`location may be exempt from a method according to one
`embodiment, or users Who may perform a successful out of
`band authentication, for example from a certain location
`(such as computer or ATM machine) may be exempt from
`extra authentication in their next attempt to access the
`service from the same location).
`
`[0048] Embodiments of the invention may pertain to a tWo
`factor authentications using a communication channel that
`
`meets certain criteria. Users may be authenticated using a
`combination of their regular Credentials and proof that the
`user may have access to a communication channel that
`meets the criteria of this method, for example, Without
`limitation, such proof could be delivered by the user pre
`senting a dynamic piece of data that may be delivered to it
`via a communication channel that meets the criteria of this
`method, by the user shoWing it knoWs the content of this
`dynamic data, or by the user initiating a call from a tele
`phone or a channel to a certain telephone number. The
`criteria that the additional communication channel may need
`to meet under this method, may be that it Would be difficult
`and/or cumbersome and/or expensive to obtain a signi?cant
`number of it, for example, Without limitation, it is expensive
`and cumbersome to obtain numerous telephone or mobile
`telephone numbers including access to them. Security may
`be achieved not only by selecting such a type of communi
`cation channel for delivery of the dynamic passWord, but
`also by restricting the number of, for example, users or user
`accounts, or any other number of distinct values of a
`property of the users or accounts, such as oWner name, SSN,
`billing address, that may be linked to a particular channel.
`This method may be used either With respect to users may
`have pre-registered the details of their secondary authenti
`cation channel, as Well as With respect to users Who may not
`pre-registered With respect to the latter, such details may be
`collected during the authentication session.
`[0049] Other secondary communication channels having
`other characteristics, for example that may not be dif?cult to
`obtain, may be used.
`
`[0050] This method may more generally be seen as a
`method for achieving a suf?cient level of security in authen
`tication not by actually validating user’s identity but rather
`by
`requiring users to provide details of “something” that
`may be either expensive, complicated or hard to achieve in
`large numbers (e.g., it may be something that meets the
`above criteria, but that may be readily available, such as for
`example, a telephone line); and (ii) by limiting the number
`of different user service accounts or users Who may use the
`same “something” for authentication.
`
`[0051] FIG. 1 depicts an authentication system 10 accord
`ing to one embodiment of the present invention. Referring to
`FIG. 1, an end user 14 may use a terminal such as a personal
`computer, automated teller machine, PDA, telephone, cel
`lular device, or other computing device may Wish to conduct
`a transaction (e.g., login to a service, make a purchase,
`opening a ?nancial account, etc.) With an institution 18.
`Institution 18 may be, for example, a provider that may
`provide services containing con?dential or private informa
`tion, for example, a ?nancial institution (“FI”) system,
`government agencies, health institution, communication ser
`vice provider or any other institution, authority or entity. End
`user 14 and institution 18 may communicate, for example,
`via one or more communications netWork(s) 15 such as, for
`example, the Internet, a cellular system, intranets, data lines,
`a combination of netWorks, etc. In one embodiment, insti
`tution 18 may provide a Web page Which is displayed on the
`user’s computer system; in such case a processor or con
`troller executing a part of a method according to an embodi
`ment of the invention may be located at an end user 14. The
`institution 18 may include a hosted system, Which his not
`necessarily hosted outside of the institution (“HS”) 11 and
`an online system (“OS”) 12 Which may include an authen
`
`TWILIO, INC. EX. 1031
`Page 9
`
`

`
`US 2005/0273442 A1
`
`Dec. 8, 2005
`
`tication local module 13. In some embodiments of the
`present invention, the HS 11 may be located inside the
`institution 18 While in other embodiments the HS 11 may be,
`for example, located outside the institution 18, or may be a
`separate service Which may be operated by the institution 18
`or another service provider. For example, institution 18 may
`include OS 12, for example a system handling online
`transactions, and HS 11 may be a third-party provided
`system, physically and organiZationally separate from insti
`tution 18. In such embodiments the HS 11 may communicate
`With the institution 18 via a plug in 13; plug in capability
`may be used if the HS is included Within the institution 18.
`The OS 12 may be, for example, an online application
`hosted in a data center and may include an authentication
`local module 13 Which may be, for example, a plug in unit
`Which may be installed at a data center or another system in
`Which the OS 12 may be hosted. The OS may belong to, for
`example, a bank or other ?nancial institution, an online or
`other business, or any other institution conducting business.
`
`[0052] The authentication local module 13 may be suitable
`for any system architecture Which may be used by the OS,
`for example, J2EE, Microsoft Net, Microsoft ASP, or any
`other architecture. The authentication local module 13 may
`be substantially contained Within the authentication local
`module 13 (e.g., a self contained softWare module(s)), or
`may be partially or Wholly contained elseWhere For
`example, authentication local module 13 may be a plug-in or
`a shell Which may communicate (e.g., via communications
`network 17, or via other methods) With a different authen
`tication server, for example HS 11. In the event that all
`authentication, including out of channel authentication, is
`done at one institution (e.g., a bank), such local module may
`not be needed. Communication netWork 17 may be, for
`example a hard Wired link, air link or any other communi
`cation channel. Furthermore, the authentication local mod
`ule 13 may communicate With an authentication application
`in the HS 11 including, for example, a cryptographic vali
`dation of the HS 11 response to ensure, for example, that it
`is transacting With HS 11. A local module 13 need not be
`used; for example if all the functionality

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket