Authentication Methods and Systems
First Claim
Patent Images
1. A method of generating an authentication token comprising the steps of:
- i. downloading a cryptographic based application to a mobile telephony device;
ii. running the cryptographic based application on the mobile telephony device; and
iii. displaying a token generated by the cryptographic based application on a display of the mobile telephony device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of generating an authentication token using a cryptographic based application downloaded to a mobile telephony device and a method of authenticating an online transaction using such a token. The method may be employed in a two factor authentication method uitilising a user password and an authentication token. The method allows a two factor authentication method to be provided by a wide range of mobile telephony devices operating either online or offline. Other authentication systems and methods of authentication are also disclosed.
59 Citations
63 Claims
-
1. A method of generating an authentication token comprising the steps of:
-
i. downloading a cryptographic based application to a mobile telephony device; ii. running the cryptographic based application on the mobile telephony device; and iii. displaying a token generated by the cryptographic based application on a display of the mobile telephony device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 34, 35, 50, 52, 60, 61, 62, 63)
-
-
11. A method as claimed in 10 wherein the user specific signature is stored in a JAR file.
-
29. A method of authenticating a transaction comprising:
-
i. downloading a cryptographic based application to a mobile telephony device; ii. supplying first authentication information to an authentication system; iii. generating an authentication token using the cryptographic based application of the mobile telephony device; iv. supplying the authentication token to the authentication system; and v. verifying the first authentication information and authentication token by the authentication system. - View Dependent Claims (30, 31, 32, 33, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 51)
-
-
53. A method of authenticating a transaction comprising:
-
a. generating an authentication token at a mobile device based on seed data and local time data wherein the token includes time of generation information; b. transmitting the authentication token to an authentication system; c. extracting the time of generation information from the token; and d. authenticating the token only if the time of generation information is within a prescribed window with respect to the time of receipt at the authentication system. - View Dependent Claims (54, 55)
-
-
56. A method of verifying the authenticity of an application downloaded to a mobile telephony device comprising:
-
a. sending a user specific URL to a user of a mobile telephony device; b. downloading an application from the user specific URL to the mobile telephony device; c. storing the user specific URL in memory of the mobile telephony device separately from the application; and d. verifying that the installed application was downloaded from the user specific URL before running the application. - View Dependent Claims (57)
-
-
58. A method of verifying the authenticity of a transaction between a mobile telephony device and a remote authentication system comprising:
-
a. inserting a user specific signature in an application downloaded to the mobile device; b. storing the user specific signature at the remote authentication system; c. generating an authentication token at the mobile telephony device based at least in part on the user specified signature using the downloaded application; d. sending the authentication token to the authentication system; and e. verifying the authentication token at the remote computer including verifying that the authentication token was generated using the user specified signature. - View Dependent Claims (59)
-
Specification