×

Multi-Factor Authentication Using a Mobile Phone

  • US 20110142234A1
  • Filed: 10/04/2010
  • Published: 06/16/2011
  • Est. Priority Date: 12/15/2009
  • Status: Abandoned Application
First Claim
Patent Images

1. A method by which a presenter of a uniquely identifiable credential is authenticated for conducting a transaction with a second party comprising:

  • a. a mobile phone whereon said presenter has previously been registered and associated with a secret pass phrase known only to said presenterb. a public key generated when said presenter registered themselves on said mobile phone using said secret pass phrasec. a private key generated when said presenter registered themselves on said mobile phone using said secret pass phrased. a public data base wherein the phone number associated with said mobile phone is registered and associated with said generated public key that is transmitted to and saved in said public data base when said presenter registered themselves with said mobile phonee. the registration of said uniquely identifiable credential on said mobile phone whereon said presenter has previously been registeredf. when said uniquely identifiable credential is presented to said second party by said presenter as authority to conduct said transaction, said second party uses said phone number of said mobile phone provided by said presenter of said uniquely identifiable credential to retrieve said public key from said public data baseg. said second party transmits to said mobile phone an authentication request encrypted using said public key retrieved from said public data baseh. said mobile phone on receipt of said encrypted authentication request uses said generated private key, associated with said presenter and said secret pass phrase entered into said mobile phone by said presenter, to decrypt said authentication request received by said mobile phone from said second partyi. said mobile phone uses said decrypted contents of said authentication request to determine authenticity of said presenter of said uniquely identifiable credential included in said authentication requestj. said user is requested to authorize said transaction request presented by said second party using said mobile phonek. said mobile phone, if said presenter successfully authorizes said transaction request, generates and returns to said second party an authentication response encrypted using said generated private key associated with said presenter previously registered on said mobile phonel. said second party decrypts said authentication response using said public key retrieved from said public data base and determines whether to accept or deny said transaction,

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×