VIRTUALIZATION OF AUTHENTICATION TOKEN FOR SECURE APPLICATIONS
First Claim
1. A computer executable file to provide for the securing of application programs and file folders with a mobile electronics device, comprising:
- a computer executable file module for execution by a mobile electronics device, and including;
an imaging program for collecting an image of an object having distinctive and characteristic features that are associative with a particular user;
an interactive graphical interface (GUI) for assisting said user in the collecting and qualification of said object as having enough distinctive and characteristic features to serve collectively as an authenticator for said user in a secure transaction;
an image processing program providing for the local selection and reduction of features identified in an image of said object into abstracts if not provided for by a remote server;
an encoding program providing for the secure encryption of said abstracts;
wherein, an abstract previously obtained and registered to said user can be compared to an abstract contemporaneously obtained during a secure transaction and used as an authenticator to control attempts at fraud.
1 Assignment
0 Petitions
Accused Products
Abstract
Data and financial transactions are secured on a mobile electronics device, with three downloadable modules. A first module provides for the mobile electronics device and a network server to interactively register a cryptographic abstract of an object usually carried by the user. These objects represent physical passwords from which processing can derive characterizing information. A second module is invoked by a transaction and signals the mobile electronics device to collect a new sample of the physical password. A cryptographic abstract of it is distilled and compared to preregistered cryptographic abstracts. A third module is a key recovery process for use when the preregistered physical password sound or object is no longer available to the user.
69 Citations
14 Claims
-
1. A computer executable file to provide for the securing of application programs and file folders with a mobile electronics device, comprising:
-
a computer executable file module for execution by a mobile electronics device, and including; an imaging program for collecting an image of an object having distinctive and characteristic features that are associative with a particular user; an interactive graphical interface (GUI) for assisting said user in the collecting and qualification of said object as having enough distinctive and characteristic features to serve collectively as an authenticator for said user in a secure transaction; an image processing program providing for the local selection and reduction of features identified in an image of said object into abstracts if not provided for by a remote server; an encoding program providing for the secure encryption of said abstracts; wherein, an abstract previously obtained and registered to said user can be compared to an abstract contemporaneously obtained during a secure transaction and used as an authenticator to control attempts at fraud. - View Dependent Claims (2, 3, 4)
-
-
5. A mobile electronics device, comprising:
-
a handset including at least a camera, a display screen, and a wireless communications device for accessing a network with a remote server; a computer executable file module for execution by the handset, and including; an imaging program providing for said camera to collect an image of an object with distinctive and characteristic features that are associative with a particular user; an interactive graphical interface (GUI) providing for said display screen to assist said user in the collecting and qualification of said object as having enough distinctive and characteristic features to serve collectively as an authenticator for said user in a financial transaction; an image processing program providing for the selection and reduction of features identified in an image of said object into abstracts; an encoding program providing for the secure encryption of said abstracts; wherein, an abstract previously obtained and registered to said user can be compared to an abstract contemporaneously obtained during a financial transaction and used as an authenticator to control attempts at fraud. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method for securing transactions, comprising:
-
using a mobile electronics device to collect an image or audio recording of a physical token during a concomitant user transaction; abstracting said image into at least forty bits of characterizing information; authenticating said physical token, and in so doing said concomitant user transaction, by comparing an abstract of said physical token to one previously registered as legitimate; and authorizing said concomitant user transaction depending on the results of the step of authenticating. - View Dependent Claims (11, 12, 13, 14)
-
Specification