throbber
Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 1 of 12
`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 1 of 12
`
`EXHIBIT 9
`EXHIBIT 9
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 2 of 12
`US 20030101348A1
`
`(19)United States
`(12)Patent Application Pnblication
`Russo et al.
`
`(54) METHOD AND SYSTEM EOR
`DETERMINING CONFIDENCE IN A
`DIGITAL TRANSACTION
`
`(76) Inventors: Anthony P. Russo, New York, NY
`(US); Peter A. McCoy, Santa Crnz, CA
`(US); Mark J. How이 1, Tucson, AZ
`(US)
`
`Correspondence Address:
`DORSEY & WHITNEY LLP
`Suite 3400
`Four Embarcadero Center
`San Francisco, CA 94III-4I87 (US)
`
`(21) Appl. No.:
`
`10/194,959
`
`(22) Filed:
`
`Jui. 12, 2002
`
`R이ated U.S. Appiication Data
`
`(63) Continuation-in-part of application No. 10/099,554,
`filed on Mar. 13, 2002. Continnation-in-part of appli­
`cation No. 10/099,558, filed on Mar. 13, 2002.
`
`(60) Provisional application No. 60/305,120, filed on Jnl.
`12, 2001.
`
`US 20030101348Al
`
`(10)Pub. No.: US 2003/0101348 Al
`May 29, 2003
`(43)Pub. Date:
`
`Publication Ciassification
`
`Int. C1.7 .............................H04K 1/00; H04L 9/00
`(51)
`(52) U.S. Ci............................................................... 713/185
`
`(57)
`
`ABSTRACT
`
`The present invention provides systems and methods utiliz­
`ing tokens to assign or mitigate risk. A software token is
`provided that associates a secret一such as a private key or
`password一with risk factors involved in protecting that
`secret from illicit access. The token may include an indica­
`tion or c시culation of the “overall risk of compromise^^
`(OROC), generally represented as an overall trust metric,
`associated with the secret. This token can then be used to
`inform system operators or third parties of the confidence of
`a given system transaction that depends on the secret. A third
`party can then take whatever actions it deems appropriate
`according to the estimated risk. For example, in one embodi­
`ment of the present invention, the risk factor is used to deny
`a transaction if the risk is deemed to great——is if the risk
`factor is greater than a predetermined (or sufficient) value.
`
`Server requests
`authentication wilh
`atlendarit IransarHirin
`し。nhdence Token
`
`blien or sep/cr
`initiates a
`iransaclioti
`
`긴0。
`
`Requester
`
`/し L2。
`
`Requester releases private
`encryption key using
`aulhen||cation method
`(passphrase, .
`fingerpnnl.PIN)
`
`七T
`
`Requester generates
`Iransaclior conlents
`
`J. zqo
`
`Requester adds inlormalion
`about confidence in lhe
`security of the transaction
`
`もて>
`
`Requester signs
`Transaclion Confidence
`
`23
`
`じ
`
`Server receives transaction
`and Transaction
`boniidence Tcken
`
`Server adjusts confidence
`in ihc Iransadion based or
`pnvale kev 11110 ana
`=mploys any necessary
`consequences
`
`신2
`
`Transscbon
`completes
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 3 of 12
`
`Patent Application Pnblication May 29,2003 Sheet 1 of 3
`
`US 2003/0101348 Al
`
`Envelope
`
`3
`
`Transactionエ 서衬m사
`
`Enrollment Trust Metric
`
`storage Trust Metric
`
`Transmission Trust Metric
`
`Authentication T「니st Metric
`
`Overalt Trust Metric
`
`Timestamp
`
`170
`
`1%〉
`
`Seal
`
`ヽ\め
`
`F王&」
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 4 of 12
`
`Patent Application Publication May 29, 2003 Sheet 2 of 3
`
`US 2003/0101348 Al
`
`Requesler generates
`nls ■厂i
`transaction contents
`
`1 zqo
`
`I、ゲ
`
`Requester adds inFormation
`about confidence in the
`secunty of the transaction
`
`2.<〇
`
`Requester signs
`Transaclion Confidence
`Token
`
`2&Q
`
`Server receives transaction
`and Transaction
`Confidence Token
`
`Server adjusts confidence
`in the transaclion based on
`pnvate key info and
`employs any necessary
`consequences
`
`L
`
`Transaction
`completes
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 5 of 12
`
`Patent Application Publication May 29, 2003 Sheet 3 of 3
`
`US 2003/0101348 Al
`
`Server receives transaction
`and Transaction
`Confidence Token
`
`ら夕
`
`3し。
`
`No
`
`Server transmits new
`Transaction Confidence
`Token to other Server
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 6 of 12
`
`US 2003/0101348 Al
`
`1
`
`May 29, 2003
`
`METHOD AND SYSTEM EOR DETERMINING
`CONFIDENCE IN A DIGITAL TRANSACTION
`
`RELATED APPEICATIONS
`[0001] This application further relates to the following
`co-pending applications:
`[0002] U.S. application Ser. No.
`, filed
`,
`entitled “BIOMETRICAEEY ENHANCED DIGITAL CËR-
`TIEICATES AND SYSTEM AND METHOD FOR MAK­
`ING AND USING^^ (Attorney Docket No. A-70596/RMA/
`JML);
`[0003] U.S. application Ser. No.
`, filed
`,
`entitled “SECURE NETWORK AND NETWORKED
`DEVICES USING BIOMETRICS^^ (Attorney Docket No.
`A70595/RMA/JML); and
`[0004] U.S. application Ser. No.
`, filed
`,
`entitled “METHOD AND SYSTEM FOR BIOMETRIC
`IMAGE ASSEMBEY EROM MULTIPLE PARTIAL BIO­
`METRIC FRAME SCANS^^ (Attorney Docket No.
`A-70591/RMA/JML); all of which are hereby incorporated
`by reference.
`[0005] This application claims the benefit nnder 35 U.S.C.
`§ff9 and/or 35 U.S.C. §120 of the filing date of: U.S.
`Provisional Application Serial No. 60/305,f20, filed Jul. 12,
`2001, which is hereby incorporated by reference, and
`entitled SYSTEM, METHOD, DEVICE AND COMPUTER
`PROGRAM FOR NON-REPUDIATED WIREEESS
`TRANSACTIONS; U.S. patent application Ser. No. f0/099,
`554 filed Mar. 13, 2002 and entitled SYSTEM, METHOD,
`AND OPERATING MODEL EOR MOBILE WIRELESS
`NETWORK-BASED TRANSACTION AUTHENTICA­
`TION AND NON-REPUDIATION; and U.S. patent appli­
`cation Ser. No. 10/099,558 filed Mar. 13, 2002 and entitled
`FINGERPRINT BIOMETRIC CAPTURE DEVICE AND
`METHOD WITH INTEGRATED ON-CHIP DATA BUFF­
`ERING; each of which applications are incorporated by
`reference herein.
`
`FIELD OE THE INVENTION
`[0006] The present invention relates generally to the field
`of methods, computer programs and computer program
`products, devices, and systems for encryption systems,
`especi시ly public key infrastructure (PKT) systems, and also
`to the field of biometrics, especially but not limited to
`biometrics such as human fingerprints and human voice­
`prints.
`
`BACKGROUND OF THE INVENTION
`[0007] The security and integrity of information systems
`depends in part on authentication of mdividu시 users一
`accurately and reliably determining the identity of a user
`attempting to use the system. Once a user is authenticated,
`a system is then able to authorize the user to retrieve certain
`information or perform certain actions appropriate to the
`system^s understanding of the user^s identity. Examples of
`such actions include downloading a document, completing a
`financial transaction, or digitally signing a purchase.
`[0008] Numerous methods have been developed for
`authenticating users. Generally, as will be understood by
`those skilled in the art, authentication methods are grouped
`
`into three categories, also called authentication factors: (f)
`something you know一a secret such as a password or a PIN
`or other information; (2) something you have一such as a
`smartcard, the key to a mechanical lock, an ID badge, or
`other physical object; and (3) something you are一a measure
`of a person such as a fingerprint or voiceprint. Each method
`has advantages and disadvantages including those relating to
`ways that a system may be fooled into accepting a normally
`unauthorized user in cases where, for example, a password
`has been guessed or a key has been stolen.
`[0009] The third category above一referred to herein as
`'something you are^ authentication methods一are the sub­
`ject of the biometrics field. Biometric identification is used
`to verify the identity of a person by measuring selected
`features of some physical characteristic and comparing those
`measurements with those filed for the person in a reference
`database or stored in a token (such as a smartcard) carried by
`the person. Physical characteristics that are used today
`include fingerprints, voiceprints, hand geometry, the pattern
`of blood vessels on the wrist or on the retina of the eye, the
`topography of the iris of the eye, facial patterns, and the
`dynamics of writing a signature or typing on a keyboard.
`Biometric identification methods are widely used today for
`securing physical access to buildings and securing data
`networks and personal computers.
`[0010] A secure system is based upon either a mutually-
`shared secret or a private key of a public-private key pair.
`During the enrollment process, the secret is first selected or
`created, then agreed upon and stored for later use. There are
`generally four major sources of risk associated with the
`secret being compromised: (f) the secret can be guessed by
`an unauthorized user; (2) the secret was observed by an
`unauthorized user during creation or subsequent transmis­
`sion; (3) the stored secret can be retrieved and employed by
`an unauthorized user after creation; and/or (4) the stored
`secret was issued to the wrong party.
`[0011] Each of the above broad categories has its own
`specific risk factors depending on the type of secret, where
`and how it is stored and how it is created. For example, the
`risk of guessing is dependent on a variety of factors includ­
`ing, but not limited to, the type of secret (for example, a
`password, a private PKI key, a symmetric key, or the like),
`the length of the secret (for example, number of characters
`in the password or number of bits in the private key), and the
`randomness of the secret (for example, an entropy calcula­
`tion plus, in the case of a password, whether the password
`matches a dictionary word). The risk of observation during
`transmission is dependent on factors including, but not
`limited to: whether it was transmitted at all (generally, there
`is no transmission of the secret in PKT); what type of
`encryption was used, if any, during transmission; and the
`network used for the transmission (for example, whether it
`was transmitted using a telephone, an internet, a private
`network, or other network or communication link or chan­
`nel).
`[0012] The risk of a stored secret being illicitly retrieved
`is dependent on factors including, but not limited to: the
`number of devices where instances of the secret are stored
`(for example, a secret may be stored on a user^s PC as well
`as in a system database); the storage medium used for each
`stored instance (hard disk, paper notes, smart card, portable
`memory device such as a flash memory card, PKCS-ff
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 7 of 12
`
`US 2003/0101348 Al
`
`2
`
`May 29, 2003
`
`token (as discussed further in "PKCS #11 v2.11: Cryptro-
`graphic Token Interface Standard^^ published Jnne 2001 by
`RSA Laboratories, hereby incorporated by reference), or the
`like); whether the secret is stored in plain text or encrypted;
`if stored encrypted, the risk associated with the encryption
`key nsed; what kind of biometrics used, if any, to restrict
`access to the storage medium; the security of passphrase
`used, if any, to retrieve secret; the security of biometric
`system(s) used, if any, to retrieve secret; and the security of
`physical token used, if any, to retrieve secret——example
`if a token is used, the security of that token is dependent
`upon whether someone else has had access to it, or if it has
`been lost or stolen; what combinations of passphrase, bio­
`metric, and token are required, if any; and the security of the
`enrolled biometric template.
`[0013] The risk associated with the secret being issued to
`the wrong person is dependent on factors including, but not
`limited to: the specific method or methods used to verify the
`user^s identity prior to issuing the secret; the degree of
`human interaction, if any, involved in the verification pro­
`cess (i.e. is it supervised and verified by a trained human
`being); what specific biometric system or systems, if any, is
`used to aid verification; which government agencies (such as
`for example the FBI, Secret Service, or other agency), if any,
`aid in the verification process; and which trusted documents,
`if any, were required for verification (for example bank
`statement, social security number, passport, or the like).
`[0014] Systems used for e-commerce, online banking and
`other financially related areas rely on security to prevent
`unauthorized users from accessing services for monetary
`gain. For example, well-designed systems try to prevent
`would-be buyers from purchasing goods and services with
`someone else^s credit card by requiring a PIN or a password.
`[0015] More generally, the security and integrity of infor­
`mation systems depends primarily on keeping data confi­
`dential so that only authorized users may see or act against
`the data, and assuring the integrity of data so that the data
`can not be changed or tampered with undetected. The field
`of cryptography provides well-known tools for assuring
`confidentiality and integrity using encryption techniques
`such as ciphers and hash algorithms.
`[0016] One widely known and implemented body of these
`tools, and procedures and practices for their use, is called
`Public Key Infrastructure (PKI). PKI gets its name from its
`use of a class of cryptographic algorithm called a public key
`algorithm. As is widely known to those versed in the
`cryptographic field, a public key algorithm is a crypto­
`graphic algorithm that operates using two different but
`mathematic시ly-related keys, a public key that may be
`shared with any party and a private key which must be kept
`secret, such that (for must such algorithms) data encrypted
`with the public key may only be decrypted with the private
`key, and vice-versa. PKI standards are well known, X.509
`for example, described in Housley, R., ''Internet X.509
`Public Key Infrastructure Certificate and CRL Profile,^^ RFC
`2459, January 1999, and ITU-T Recommendation X.509
`(1997 E): Information Technology——Systems Inter­
`connection一The Directory: Authentication Framework,
`June 1997, both of which are hereby incorporated by refer­
`ence.
`[0017] These standards provide powerful mechanisms for
`safe and private storage and transmission of confidential
`
`data so that it remains hidden from unauthorized parties. The
`standards provide for digit시 signatures, which provide the
`receiving party of some data with an assurance of the
`identity of the transmitting party. PKI standards further
`provide for digital certificates, which provide a tamper­
`resistant, portable record of the association of a public key
`with a person^s or organization^s name, attested to and
`signed by a trusted party, thus presenting a form of unique,
`irrefutable digit시 identity or credential for that person or
`organization. PKI standards also provide other useful and
`powerful mechanisms that can contribute to the security and
`integrity of information systems.
`[0018] PKI is widely nsed in commercial and non-com-
`mercial systems, both over the Internet and in more closed
`or local applications. Most web browsers, for example, use
`PKI and PKI-based standards to interoperate with web
`servers when high security is desired, as when a user
`specifies a credit card number for payment while placing an
`online order. The proliferation of electronic commerce has
`led many jurisdictions around the world to begin to develop
`leg시 standards with the intended result that a correctly
`constituted digital signature would be every bit as legally
`binding as a handwritten signature is today.
`[0019] PKI provides powerful mechanisms, but it has
`weaknesses. One way for digital identities to be compro­
`mised is for an impostor to somehow get a copy of the
`private key that is associated with the public key embedded
`in a certificate, thus invalidating an assumption that only the
`person or organization to which the certificate is issued has
`access to the (secret) private key. Anyone with both the
`certificate (which is meant to be public information, freely
`exchanged with anyone) and the associated private key
`(which is meant to be secret) can impersonate someone else
`and compromise the security and integrity of an information
`system dependent on the valid use of a certificate and
`associated private key.
`[0020] Most systems, therefore, secure the private key
`such that the user must authenticate before the private key
`can be used for any task. Many such systems require a
`password ("something you know^^) or a smartcard ("some­
`thing you have^^), or both. Some systems provide additional
`security by putting the private key on a smartcard that is
`resistant to tampering or copying. Other systems may also
`employ biometrics ("something you are^^) to ensure that the
`person using the private key is in fact the true owner of the
`certificate.
`[0021] However, smart cards may be lost, damaged, or
`stolen. Passwords may be forgotten or guessed. Biometrics
`systems can be fooled. These concerns are part of what is
`called in the field "the last-meter problem^^, the problem of
`making sure that an otherwise secure system isn^t compro­
`mised by a failure to correctly authenticate the person using
`(and usually physically adjacent to) some part of the system.
`The last-meter problem can present opportunities for impos­
`tors in PKI systems. Mathematically, the theoretical prob­
`ability of a PKI system being fooled or otherwise compro­
`mised is extremely low (much less than f in a billion, for
`instance). However, once the "last meter problem^^ is taken
`into account, the security of such a system is greatly
`reduced, as the "last meter problem^^ becomes the weakest
`link in an otherwise very secure chain.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 8 of 12
`
`US 2003/0101348 Al
`
`3
`
`May 29, 2003
`
`[0022] Today^s PKI systems do not take into account the
`risk associated with the “last meter problem^^ when assessing
`the tmst level to associate with users of such systems.
`[0023] Accordingly, it is an object of the present invention
`to provide an indication of the security of a given transac­
`tion.
`
`SUMMARY
`[0024] In a first embodiment, the invention provides a
`transaction confidence token for use in a secure communi­
`cation system, comprising an envelope and a seal. The
`envelope comprises transaction information and a trust
`metric. The seal contains a digital signature of the envelope.
`In preferred embodiments, the envelope further includes a
`timestamp. In some embodiments, the transaction informa­
`tion contained in the envelope includes a web site address,
`a web session identifier, a monetary or exchange value, an
`order number, an SKU number, a credit card number, or any
`combinations thereof.
`[0025] In one embodiment, the trust metric within the
`envelope is an overall trust metric indicating a combined
`confidence level for enrollment, storage, transmission, and
`authentication processes employed for authentication of a
`transaction.
`[0026] In another embodiment, the trust metric comprises
`a storage tmst metric indicating a confidence level for a
`storage process associated with authentication of a transac­
`tion. In yet another embodiment, the trust metric comprises
`a transmission tmst metric indicating a confidence level for
`a transmission process associated with authentication of a
`transaction. In still another embodiment, the trust metric
`comprises an authentication trust metric indicating a confi­
`dence level for an authentication process associated with
`authentication of a transaction. In a further embodiment, the
`trust metric comprises an enrollment tmst metric indicating
`a confidence level for an enrollment process associated with
`authentication of a transaction. In other embodiments, a
`plurality of tmst metrics are provided in the envelope. In one
`embodiment, a first tmst metric comprises an overall trust
`metric and at least a second trust metric is provided chosen
`from the group consisting of an enrollment trust metric, a
`storage trust metric, a transmission tmst metric, an authen­
`tication trust metric, and combinations thereof.
`[0027] In some embodiments, the digital signature con­
`tained in the seal is signed with a private key.
`[0028] The present invention further provides methods for
`assuring a secure transaction. In one embodiment, a method
`for assuring a secure transaction comprises receiving a
`transaction confidence token comprising a trust metric asso­
`ciated with the transaction, determining if the tmst metric
`indicates a sufficient trust level; and processing the transac­
`tion if the tmst metric indicates or exceeds said sufficient
`trust level.
`[0029] In some embodiments, a method further comprises
`requiring a mitigating factor if said tmst metric indicates less
`than said sufficient tmst level. The mitigating factor may be
`chosen based on the trust metric. The mitigating factor may
`be chosen from the group consisting of a fee, a waiting
`period, an authentication procedure, and combinations
`thereof.
`
`[0030] In yet other embodiments, the method further com­
`prises processing the transaction after receiving a mitigating
`factor.
`[0031] In other embodiments, the method further com­
`prises constructing a transaction confidence token compris­
`ing a tmst metric, and transmitting said transaction confi­
`dence token to a server.
`[0032] In other embodiments, a method for assuring a
`secure transaction comprises receiving a transaction confi­
`dence token comprising a tmst metric associated with said
`transaction, determining if said trust metric indicates an
`acceptable risk level; and processing said transaction if said
`trust metric indicates or is less than said acceptable risk
`level.
`[0033] In some embodiments, the method further com­
`prises requiring a mitigating factor if said trust metric
`indicates greater than said acceptable risk level. In still other
`embodiments, the method further includes processing said
`transaction after receiving said mitigating factor.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`[0034] The present invention may be better understood,
`and its features and advantages made apparent to those
`skilled in the art by referencing the accompanying drawings.
`[0035] FIG. 1 is a schematic representation of one
`embodiment of a transaction confidence token according to
`an embodiment of the present invention.
`[0036] FIG. 2 is a schematic flowchart showing a method
`of processing a transaction according to an embodiment of
`the present invention.
`[0037] FIG. 3 is a schematic flowchart outlining a process
`for using a transaction confidence token according to an
`embodiment of the present invention.
`
`DETAILED DESCRIPTION OF THE
`EMBODIMENTS
`[0038] Many systems today, especially those that use PKI,
`involve transactions that depend on keeping a secret pro­
`tected from use by third parties. If there is any risk that the
`secret is compromised, then that risk is propagated to the
`provider of the transaction itself. For example, if an internet­
`based system 시lows a user to purchase an item by entering
`any valid credit card number, then the risk to the credit card
`company or merchant related to an unauthorized purchase is
`dependent on how well that credit card number can be kept
`secret, for example, how well authenticated are the parties to
`whom the secret is made available.
`[0039] This invention introduces the concept of a software
`token that associates a secretーーsuch as a private key or
`password一with risk factors involved in protecting that
`secret from illicit access. Furthermore, in preferred embodi­
`ments of the present invention, the token includes an indi­
`cation or calculation of the “overall risk of compromise^^
`(OROC), generally represented as an overall tmst metric,
`associated with the secret. In some embodiments of the
`present invention, the token also includes a calculation of
`mdividu시 risk factor probabilities used to determine the
`OROC, or overall trust metric. This token can then be used
`to inform system operators or third parties of the confidence
`of a given system transaction that depends on the secret. A
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 9 of 12
`
`US 2003/0101348 Al
`
`4
`
`May 29, 2003
`
`third party can then take whatever actions it deems appro­
`priate according to the estimated risk. For example, in one
`embodiment of the present invention, the risk factor is used
`to deny a transaction if the risk is deemed to great——is
`if the risk factor is greater than a predetermined (or suffi­
`cient) value. In another embodiment, the risk factor is used
`to charge the user a fee in an effort to mitigate the risk, or
`where some fee may already be charged to the user for the
`transaction to charge different fees according to the assessed
`risk or trust level. Fhe fee may be a flat fee charged to all
`transactions having less than a sufficient trust level or the fee
`may vary according to the trust level indicated by the token.
`[0040] Most authentication systems are geared to answer
`the question of whether the party trying to use the system is
`the party it claims to be with either a yes or no, even though
`the authentication method or methods employed are imper­
`fect. The present invention provides a mechanism for a
`system to add an estimate of risk or confidence on that yes
`or no answer, and for other systems to use that confidence
`information to their advantage. In one embodiment, it also
`provides a mechanism for documenting the party^s identity
`so as to provide a non-repudiation mechanism for the
`transaction.
`[0041] That is, the present invention provides systems
`utilizing tokens to assign or mitigate risk.
`[0042] FIG. 1 depicts a schematic representation of trans­
`action confidence token 100 according to one embodiment
`of the present invention.
`[0043] A token, such as token 100, is created using avail­
`able information regarding risk factors, examples of which
`are discussed above. Token 100 can be in the form of a
`separate packet of stored data associated with the secret,
`integrated either with the secret itself or, in the case of PKI,
`with the associated digital certificate.
`[0044] The present invention provides transaction confi­
`dence tokens comprising at least one trust metric. As used
`herein, ' trust metric^ generally refers to a measure of a risk
`factor. Examples of typical risk factors are discussed above.
`In one embodiment, token 100 comprises information on at
`least one risk factor discussed above. In another embodi­
`ment, token 100 comprises an overall risk-of-compromise
`(OROC) value, or overall trust metric 110, which may take
`one or more risk factors into consideration. In a preferred
`embodiment, token 100 is created and stored in a database
`during both enrollment and subsequent transactions,
`includes all the fields shown in FIG. 1. In other embodi­
`ments, only a subset of fields shown in FIG. 1 are present.
`[0045] In one embodiment of the present invention, trust
`metrics, such as overall trust metric no, are given by an
`absolute probability ranging from 0.0 to f.O, calculated
`using a weighted Bayesian equation. Other ranges and
`equations for c시culating trust metrics may also or alterna­
`tively be employed. In preferred embodiments of the present
`invention, trust metrics are given by an arbitrary mapping of
`risk information to three categories——medium, and
`high. Any number of categories may alternatively be used,
`with each category represented by a unique indicator. The
`risk information may alternatively be provided by a con­
`tinuous range of values rather than in discrete categories.
`Overall trust metric 110 represents a weighted combination
`of individual risk probabilities of a plurality of risk factors.
`
`In a preferred embodiment, a system uses token 100 to deny
`or accept a transaction. In other embodiments, a system
`charges a fee, or imposes another mitigation factor一such as
`a waiting period or another required authentication—based
`on risk information contained in token 100.
`
`[0046] Accordingly, transaction confidence token 100
`(FIG. 1) is composed of two data structures: envelope 120
`and seal 13〇. Envelope 120 comprises transaction contents,
`or transaction information 140 and at least one trust metric,
`although a plur시ity of trust metrics are shown in FIG. 1.
`Further, envelope 120 comprises timestamp 15〇. In a pre­
`ferred embodiment, transaction information 140 represents a
`complete record of a transaction——as appropriate,
`account numbers, web session identifiers, monetary or
`exchange values, item quantities, an SKU number, an order
`number, a credit card number, a web URL or address, or
`other data describing the user^s authenticated request. In
`other embodiments, transaction information 140 comprises
`only some of the above information associated with a
`transaction. In a preferred embodiment, transaction infor­
`mation 140 comprises only a transaction identifier or refer­
`ence string such as a web session identifier as is often used
`in web applications. In an alternative embodiment, transac­
`tion information 140 field comprises a complete transaction
`confidence token, which may in turn (i.e., recursively)
`contain another transaction confidence token in its transac­
`tion contents field, without particular limit. This embodi­
`ment allows for multiple parties to attest to a transaction and
`attach their own confidence to the transaction as it is
`processed by each of a number of systems in series. The
`innermost transaction confidence token corresponds to the
`original transaction when it is first authenticated and signed
`by the originating party. Timestamp 150 generally comprises
`a string indicating a date and time at which the authentica­
`tion event which is the subject of the transaction confidence
`token took place. Generally, any time indicator is appropri­
`ate for timestamp 15〇. In a preferred embodiment, times­
`tamp 150 is expressed in Universal Coordinated Time
`(UTC). Overall trust metric 110 indicates a degree of overall
`confidence in a transaction. In one embodiment, overall trust
`metric 110 provides a degree of confidence in enrollment,
`storage, transmission, and authentication processes
`employed for authentication of a transaction. Overall trust
`metric 110 can be defined according to the specifics of the
`application contemplated, but in a preferred embodiment,
`there are three possible values corresponding to low,
`medium, and high confidence. In a preferred embodiment,
`low security refers to a password authentication against a
`4-digit numeric PIN stored in non-secure storage. Medium
`security refers to a fingerprint authentication or strong
`password (alphanumeric, mixed case, greater than 8 char­
`acters) against a secret in non-secure storage, and high
`security is attributed to a fingerprint authentication or strong
`password against a secret in secure storage such as a smart
`card. Generally, any number of trust categories can be
`assigned among any authentication processes.
`[0047] Envelope 120 may comprise metrics related to
`measures of individual aspects of an authentication process.
`That is, envelope 120 may comprise some or all of the
`following optional fields: (f) Enrollment Trust Metric 160,
`(2) Storage Trust Metric 170, (3) Transmission Trust Metric
`180, and (4) Authentication Trust Metric 19〇.
`
`

`

`Case 6:21-cv-01101-ADA Document 31-9 Filed 05/19/22 Page 10 of 12
`
`US 2003/0101348 Al
`
`5
`
`May 29, 2003
`
`[0048] Enrollment Tmst Metric 160 indicates a degree of
`confidence in secnrity of an enrollment or personalization
`process under which a secret was issued to an authenticating
`party. Enrollment trust metric 160 can be defined according
`to specifics of the application employed. In a preferred
`embodiment, there are three possible values corresponding
`to low, medium, and high confidence. In one embodiment, a
`low confidence enrollment tmst metric is assigned to self­
`enrollment where little or no manual verification of user
`identity is carried out; a medium confidence enrollment trust
`metric is assigned to online verification using a “weak
`secret^^ such as a credit card number, which may be inde­
`pendently verified to match the enrollee^s name by the credit
`card issuer; and a high confidence enrollment trust metric is
`assigned in an enrollment situation where the user^s identity
`is verified——trusted documents such as a passport,
`driver^s license, or the like—by a human being who works
`for the enrollment agency or represents another predeter­
`mined organization.
`[0049] Storage Tmst Metric 170 indicates a degree of
`confidence in the security of a method of storage used to
`store a secret. Storage Tmst Metric 170 can be defined
`according to the specifics of the application employed. In a
`preferred embodiment, there are three possible values cor­
`responding to low, medium, and high confidence. Here, in
`one embodiment, a storage t

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket