Authentication Method
First Claim
1. An authentication method comprising:
- requesting a user of a personal mobile terminal to enter a personal code into a personal mobile terminal in response to receipt of an authentication request transmitted to the personal mobile terminal, the authentication request being related to an action that requires user authentication; and
processing an entered personal code together with challenge data corresponding to the authentication request to determine whether one or more predetermined conditions are met and, if one or more predetermined conditions are met, producing a valid and signed authentication code that the user can provide in order to authenticate the action.
1 Assignment
0 Petitions
Accused Products
Abstract
There is disclosed an authentication method comprising requesting a user of a personal mobile terminal to enter a personal code into a personal mobile terminal in response to receipt of an authentication request transmitted to the personal mobile terminal, the authentication request being related to an action that requires user authentication, and processing an entered personal code together with challenge data corresponding to the authentication request to determine whether one or more predetermined conditions are met and, if one or more predetermined conditions are met, producing a valid and signed authentication code that the user can provide in order to authenticate the action.
-
Citations
30 Claims
-
1. An authentication method comprising:
-
requesting a user of a personal mobile terminal to enter a personal code into a personal mobile terminal in response to receipt of an authentication request transmitted to the personal mobile terminal, the authentication request being related to an action that requires user authentication; and
processing an entered personal code together with challenge data corresponding to the authentication request to determine whether one or more predetermined conditions are met and, if one or more predetermined conditions are met, producing a valid and signed authentication code that the user can provide in order to authenticate the action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program that when executed by a personal mobile terminal enables the personal mobile terminal to:
-
request a user of the mobile terminal to enter a personal code following receipt of an authentication request transmitted to the mobile terminal, the authentication request being related to an action that requires user authentication;
process an entered personal code together with a challenge corresponding to the authentication request; and
produce a valid and signed authentication code that the user can provide in order to authenticate the action if one or more predetermined conditions are met. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A personal mobile terminal configured to:
-
request a user of the mobile terminal to enter a personal code following receipt of an authentication request transmitted to the mobile terminal, the authentication request being related to an action that requires user authentication;
process an entered personal code together with challenge data corresponding to the action data to determine whether one or more predetermined conditions are met; and
produce a valid and signed authentication code that the user can provide in order to authenticate the action if the one or more predetermined conditions are met.
-
-
20. An authentication method comprising:
-
transmitting an authentication request to a personal mobile terminal designated as belonging to a user in response to the initiation of an action that requires authentication by the user;
receiving the authentication request at the personal mobile terminal;
prompting a user to enter a personal code into the personal mobile terminal;
processing the personal code together with challenge data corresponding to the authentication request and if one or more predetermined conditions are met, producing a valid and signed authentication code that the user can provide in order to authenticate the action. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A system for authenticating actions comprising:
-
an action authentication server; and
one or more personal mobile terminals belonging to respective ones of one or more users of the system, the action authentication server being configured to transmit an authentication request to a personal mobile terminal of a user in response to initiation of an action requiring authentication by a user;
each users'"'"' personal mobile terminal being configured to;
request the user of the personal mobile terminal to enter a personal code following receipt of the authentication request;
process an entered personal code together with challenge data corresponding to the authentication request; and
produce a valid and signed authentication code that the user can provide in order to authenticate the action if one or more predetermined conditions are met. - View Dependent Claims (26)
-
-
27. A method of configuring a personal mobile terminal to participate in an authentication system comprising:
-
providing an activation code to a user by a means independent of the user'"'"'s personal mobile terminal placing a security application on a web server for retrieval by the user'"'"'s personal mobile terminal;
providing details of the security application to the user that are sufficient for the user to retrieve the security application;
running the security application on the user'"'"'s personal mobile terminal in order to prompt the user for the activation code and to generate a confirmation code if the activation code is entered into the personal mobile terminal; and
providing the confirmation code to the authentication system; and
activating the user if the confirmation code is valid. - View Dependent Claims (28, 29, 30)
-
Specification