Method and apparatus for securing communications
First Claim
1. A method of authenticating a communication, comprising:
- (a) providing a first communicating device with a first sequence of transaction specific codes;
(b) providing a second communicating device with a second sequence of transaction specific codes, wherein the first and second sequences are identical;
(c) setting pointers in the first and second sequences at the same transaction specific code;
(d) transmitting a communication from the first communicating device to the second communicating device along with a transaction specific code from the first sequence;
(e) refusing communications having a transaction specific code that is different from the transaction specific code expected by the second communicating device; and
(f) incrementing the pointers in both the first and second communicating devices.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides a method and apparatus for identifying and minimizing the use of cloned communicating devices which communicate with a host device. The method requires that the communicating devices send a transaction specific code and an identification code, along with each communication wherein the transaction specific code changes between each communication. One communicating device, either the authentic device or a fraudulent device might communicate with the host successfully any number of times. However, when a second devices attempts communication whether that device is the authorized device or fraudulent device, the host device will receive a transaction specific code which is inconsistent or out of sequence with that expected by the host. The host device will preferably disallow all further communications involving the particular identification code until the authorized user can be contacted and the transaction specific code reset or even a new set of transaction specific codes are provided. Alternatively, upon detection of the inconsistent transaction specific code, the host computer may prompt the user for information specific to the authorized user that is not stored in the communicating device and would not be readily available to the clone device or the user of the clone device.
-
Citations
25 Claims
-
1. A method of authenticating a communication, comprising:
-
(a) providing a first communicating device with a first sequence of transaction specific codes;
(b) providing a second communicating device with a second sequence of transaction specific codes, wherein the first and second sequences are identical;
(c) setting pointers in the first and second sequences at the same transaction specific code;
(d) transmitting a communication from the first communicating device to the second communicating device along with a transaction specific code from the first sequence;
(e) refusing communications having a transaction specific code that is different from the transaction specific code expected by the second communicating device; and
(f) incrementing the pointers in both the first and second communicating devices. - View Dependent Claims (2, 3, 4, 19, 20, 21, 22, 23, 24, 25)
-
-
5. A method of authenticating a communication, comprising:
-
(a) providing a first communicating device with a first identification code and a first sequence of transaction specific codes;
(b) providing a host communicating device with the first identification code and the first sequence of transaction specific codes;
(c) setting pointers in the first sequence of transaction specific codes of both the first communicating device and the host device at the same transaction specific code;
(d) transmitting a communication from the first communicating device to the host communicating device along with the first identification code and the transaction specific code associated with the pointer in the first sequence of transaction specific codes;
(e) disallowing communications transmitted with the first identification code that have a transaction specific code that is different from the transaction specific code associated with the pointer in the first sequence of transaction specific codes; and
(f) incrementing the pointers in the first communicating device and the host communicating device. - View Dependent Claims (6, 7, 8)
-
-
9. A method of authenticating a communication, comprising:
-
(a) providing each of a plurality of communicating devices with a device identification code and an associated sequence of transaction specific codes;
(b) providing a host communicating device with an identical copy of each of the device identification codes and the associated sequences of transaction specific codes;
(c) setting pointers in the communicating device and the host device at the same transaction specific code in the sequence of transaction specific codes associated with each identification code;
1 (d) transmitting a communication from the a communicating device to the host communicating device along with the device identification code and the transaction specific code associated with the pointer in the sequence of transaction specific codes;
(e) disallowing communications transmitted with the device identification code that have a transaction specific code that is different from the transaction specific code associated with the pointer in the sequence of transaction specific codes; and
(f) incrementing the pointers in the communicating device and the host communicating device. - View Dependent Claims (10, 11, 12, 15, 16)
-
-
13. A method of detecting the existence of two or more communicating devices having the same identification code comprising the steps of:
-
a) transmitting an identification code and a transaction specific code from a first communicating device to a host device;
b) comparing the transaction specific code received by the host device with a next expected transaction specific code for a communicating device having the particular identification code.
-
-
14. A method of communicating between a communicating device and a host device comp sing the step of:
(a) transmitting an identification code and a transaction specific code to the host device wherein the identification code is unique to the communicating device and the transaction specific codes are predetermined and known by the communicating device and the host device for the purpose of allowing the host device to detect the usage of a fraudulent communicating device having the same identification code.
-
17. A method of disallowing communications initiated by fraudulent communicating devices comprising the steps of:
-
a) receiving an identification code and a transaction specific code from a communicating device;
b) searching a list of transaction specific codes in the host device;
c) having a predetermined sequence of transaction specific codes for the next expected transaction specific code from a device having the received identification code.
-
-
18. A method of re-synchronizing the next expected transaction specific code between communicating devices by matching a pattern of transaction specific codes in the communicating device with a pattern of transaction specific codes in the host device.
Specification