×

Method and arrangement for secure authentication

  • US 8,335,925 B2
  • Filed: 10/03/2006
  • Issued: 12/18/2012
  • Est. Priority Date: 10/03/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for secure transfer of data between two parties, a user and a second party comprising:

  • a first session for generating a unique and new authentication factor/user code adapted for user authentication,a second session for registering of the users authentication factor(s)/user code(s) at the second party anda third session for secure user authentication between the two parties for data transfer, the user being registered at the second party and the second party being a service provider, where the user at least uses a personal terminal comprising at least a central processing unit, a communication unit, andat least one client stored in a storage device or partly stored in the storage device adapted for user authentication, and where the at least one client includes capacity to generate and store random numbers,wherein the first session comprises at least the steps of;

    B.1) the at least one client generates a random number, using a generation capacity in the at least one client,C.1) the at least one client stores the random number in the at least one client and naming the stored random number a client reference,D.1) the at least one client fetches a code being unique, associated with the personal terminal and residing in the personal terminal, and the at least one client fetches the client reference, andE.1) the at least one client uses a one or more calculating algorithms stored in the at least one client where a representation of the code being unique to the personal terminal, and the client reference are inputted to the one or more calculation algorithms, producing an output, a user code representing the user'"'"'s possession of the personal terminal;

    wherein the first session further comprises the additional steps of;

    D.1) comprises the additional steps of requesting the user to enter a pass code on the personal terminal, andE.1) comprises the additional step of inputting the pass code to the calculation algorithm, producing an output, a reproducible user code, which represents the user'"'"'s possession of the personal terminal and the knowledge of the pass code; and

    wherein the second session, registering the user code at the second party comprises at least the steps of;

    A.2) the second party requests the user to register the user code in a user data at the second party,B.2) providing the second party with authenticity information of the one or more clients, andC.2) a terminating step where the said user code is forwarded to the second party and stored as a part of the user data associated with the user at the second party.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×