SECURE AND EFFICIENT AUTHENTICATION USING PLUG-IN HARDWARE COMPATIBLE WITH DESKTOPS, LAPTOPS AND/OR SMART MOBILE COMMUNICATION DEVICES SUCH AS IPHONES
First Claim
1. A method of authenticating a user of a network device (ND) having a portable hardware device (PHD) removably and communicatively connected thereto, comprising:
- receiving, by a first application executing on the ND, a request for authentication of the user in connection with either (i) the user logging into a network site or (ii) the user entering into a transaction with the network site;
receiving, via the ND, by a second application executing on the PHD from a network security server, after receipt of the request for authentication by the first application, a secure message including a personal identification number (PIN) and readable only by the second application, for authenticating the user to the network site;
transferring the received PIN to the first application; and
directing, by the first application, transmission from the ND to the network site of the transferred PIN, to authenticate the user or authorize the transaction to the network site.
10 Assignments
0 Petitions
Accused Products
Abstract
A portable apparatus is removably and communicatively connectable to a network device to communicate authentication or authorization credentials of a user in connection with the user logging into or entering into a transaction with a network site. The apparatus includes a communications port to connect and disconnect the apparatus to and from the network device and to establish a communication link with the network device when connected thereto. A processor receives a secure message from the network security server via the port. The message has a PIN for authenticating the user to the network site, and is readable only by the apparatus. The processor either transfers, via the port, the received PIN to an application associated with the network site that is executing on the network device or causes the apparatus to display the received PIN for manual transfer to the application associated with the network site.
-
Citations
20 Claims
-
1. A method of authenticating a user of a network device (ND) having a portable hardware device (PHD) removably and communicatively connected thereto, comprising:
-
receiving, by a first application executing on the ND, a request for authentication of the user in connection with either (i) the user logging into a network site or (ii) the user entering into a transaction with the network site; receiving, via the ND, by a second application executing on the PHD from a network security server, after receipt of the request for authentication by the first application, a secure message including a personal identification number (PIN) and readable only by the second application, for authenticating the user to the network site; transferring the received PIN to the first application; and directing, by the first application, transmission from the ND to the network site of the transferred PIN, to authenticate the user or authorize the transaction to the network site. - View Dependent Claims (2, 3, 4, 5, 7, 8, 9, 10, 11)
-
-
12. A portable apparatus removably and communicatively connectable to a network device for communicating authentication credentials for a user in connection with either (i) the user logging into a network site or (ii) the user entering into a transaction with the network site, comprising:
-
a communications port configured to connect and disconnect the apparatus to and from the ND and to establish a communication link between the apparatus and the ND when connected; and a processor disposed configured to (1) receive, from a network security server via the port, a secure message, readable only by the processor and not by the ND, including a personal identification number (PIN) for authenticating the user to the network site, and (2) either (i) transfer, via the port, the received PIN to an application associated the network site and executing on the ND or (ii) cause the apparatus to display the received PIN to the user for manual transfer of the PIN to the application associated the network site. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification