Method and apparatus for the secure identification of the owner of a portable device
First Claim
Patent Images
1. A method for signing a document by a holder of a portable device, comprising the steps of:
- computing a one time password at the portable device, wherein the one time password is a function of a time information;
replacing a portion of the one time password with a time indicia; and
writing the one time password on the document.
5 Assignments
0 Petitions
Accused Products
Abstract
An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a challenge and a response. The challenge and response is sent to a decryption node. In response, the decryption node computes a presumed response and compares the presumed response to the response of the portable device, in order to authenticate the individual associated with the portable device.
-
Citations
15 Claims
-
1. A method for signing a document by a holder of a portable device, comprising the steps of:
-
computing a one time password at the portable device, wherein the one time password is a function of a time information; replacing a portion of the one time password with a time indicia; and writing the one time password on the document.
-
-
2. The method of claim 1 further comprising the step of authenticating the holder to the portable device.
-
3. The method of claim 1 further comprising the step of writing a date and a time on the document.
-
4. The method of claim 1 further comprising the step of writing an indicia of the holder'"'"'s identity on the document.
-
5. The method of claim 1 further comprising the step of stamping a signature of the holder on the document.
-
6. The method of claim 1 further comprising the steps of:
-
querying a database, by a decryption node, for an indicia of the portable device'"'"'s keys; and checking the validity of the computed one time password to determine if the document has been properly signed.
-
-
7. A method for corroboration of the authenticity of a signature in a document, wherein the signature belongs to a holder of a portable device, comprising the steps of:
-
authenticating the holder to the portable device; computing a one time password at the portable device, wherein the one time password is a function of a time information; replacing a portion of the one time password with a time indicia; and writing the one time password on the document.
-
-
8. The method of claim 7 further comprising the steps of:
-
querying a database, by a decryption node, for an indicia of the holder'"'"'s identity, wherein the indicia of the holder'"'"'s identity appears in the document; identifying the portable device by using the holder'"'"'s identity; checking the validity of the computed one time password to determine if the signature is authentic.
-
-
9. A method for corroboration of the authenticity of an identity of a person in a document, wherein the identity belongs to a holder of a portable device, comprising the steps of:
-
authenticating the holder to the portable device; computing a one time password at the portable device, wherein the one time password is a function of a time information; replacing a portion of the one time password with a time indicia; and writing the one time password on the document.
-
-
10. The method of claim 9 further comprising the step of conventionally signing the document by the holder of the portable device.
-
11. The method of claim 9 further comprising the steps of:
-
querying a database, by a decryption node, for an indicia of the holder'"'"'s identity; identifying the portable device by using the holder'"'"'s identity; checking the validity of the computed one time password to determine if the holder'"'"'s identity is authentic.
-
-
12. A method for corroboration of the authenticity of the identity of a signor of a document, wherein the signor has a portable device configured to generate time dependent one-time passwords corresponding to any given date and time, comprising the steps of:
-
conventionally signing the document by the signor; authenticating the signor to the portable device; generating a one time password at the portable device, wherein the one time password is a function of a time information; replacing a portion of the one time password with a time indicia; and writing the one time password in the document.
-
-
13. The method of claim 12 further comprising the step of adding to the document an indicia of the time and date of the generation of the one time password.
-
14. A method for validating a check of an account owner in addition to conventional check validation, wherein the account owner is a holder of a portable device and wherein the check has a date, comprising the steps of:
-
computing a one time password at the portable device, wherein the one time password is computed on the date of the check, and wherein the one time password is a function of a time information; replacing a portion of the one time password with a time indicia; and stamping the one time password on the check.
-
-
15. The method of claim 14 further comprising the steps of:
-
querying a database, by a decryption node, for an indicia of the account owner'"'"'s identity; identifying the portable device by using the account owner'"'"'s identity; and checking the validity of the computed one time password to determine if the check is valid.
-
Specification