METHODS AND SYSTEMS FOR SECURE USER AUTHENTICATION
First Claim
1. A computer-implemented method for secure user authentication comprising:
- receiving, by a device, a PIN from a user, wherein the entry of the PIN is used to generate a request for a one-time password;
generating, by the device, the one-time password using an algorithm;
displaying, by the device, the one-time password;
requesting, by the device, that the user enter the one-time password and a credential;
receiving, by the device, the one-time password and the credential entered by the user;
validating, by the device, the credential entered by the user;
validating, by the device, the one-time password after determining the credential is valid, wherein validating the one-time password comprises using the received one-time password and a unique customer ID to locate a shared secret for the user;
authenticating, by the device, the user; and
accepting, by the device, a login of the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for secure user authentication using a OTP involve, for example, pre-storing a OTP application on a first computing device for generating a valid OTP value for the user responsive to receiving entry of a valid PIN value of the user, no part of the valid PIN value is stored on the first computing device and pre-storing on a back-end server the valid PIN value and a valid shared secret for the user. Upon receiving entry of a purported PIN value of the user, a purported shared secret is dynamically synthesized on the first computing device by the OTP application based on the purported PIN value of the user and a purported OTP value is generated on the first computing device. When entry of the purported OTP value is received by the back-end server in an attempt to log on the back-end server from a second computing device, the back-end server cryptographically calculates a window of OTP values, and log on to the back-end server from the second computing device is allowed if the calculated window of OTP values corresponds to the received OTP value.
255 Citations
20 Claims
-
1. A computer-implemented method for secure user authentication comprising:
-
receiving, by a device, a PIN from a user, wherein the entry of the PIN is used to generate a request for a one-time password; generating, by the device, the one-time password using an algorithm; displaying, by the device, the one-time password; requesting, by the device, that the user enter the one-time password and a credential; receiving, by the device, the one-time password and the credential entered by the user; validating, by the device, the credential entered by the user; validating, by the device, the one-time password after determining the credential is valid, wherein validating the one-time password comprises using the received one-time password and a unique customer ID to locate a shared secret for the user; authenticating, by the device, the user; and accepting, by the device, a login of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for secure user authentication comprising:
-
receiving, by a device, a PIN chosen by a user for generating a one-time password; providing, by the device, an activation code for activating a one-time password generator application in the device; receiving, by a device, a PIN and the activation code from the user; generating, by the device, the one-time password using an algorithm having a counter in response to the entry of the PIN by the user; displaying, by the device, the one-time password; requesting, by the device, that the user enter the one-time password and a credential; receiving, by the device, the one-time password and the credential entered by the user; validating, by the device, the credential entered by the user; validating, by the device, the one-time password after determining the credential is valid, wherein validating the one-time password comprises using the received one-time password and a unique customer ID to locate a shared secret for the user; authenticating, by the device, the user; and accepting, by the device, a login of the user. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for secure user authentication comprising:
-
receiving, by a device, a PIN chosen by a user for generating a one-time password; providing, by the device, an activation code for activating a one-time password generator application in the device; receiving, by a device, a PIN and the activation code from the user; generating, by the device, the one-time password using an algorithm having a time-based value in response to the entry of the PIN by the user; displaying, by the device, the one-time password; requesting, by the device, that the user enter the one-time password and a credential; receiving, by the device, the one-time password and the credential entered by the user; validating, by the device, the credential entered by the user; validating, by the device, the one-time password after determining the credential is valid, wherein validating the one-time password comprises using the received one-time password and a unique customer ID to locate a shared secret for the user; authenticating, by the device, the user; and accepting, by the device, a login of the user. - View Dependent Claims (19, 20)
-
Specification