Methods and systems for two-factor authentication using contactless chip cards or devices and mobile devices or dedicated personal readers
First Claim
1. A method of generating authentication data for use in a transaction comprising:
- providing a contactless chip device associated with at least one authorized user having pre-stored secret data, configured to communicate with an unsecure mobile device;
receiving a first input value into said mobile device;
detecting said contactless chip device in proximity to said mobile device and thereafter beginning communication between said contactless chip device and said mobile device;
communicating data derived from said first input value from said mobile device to said contactless chip device;
receiving a dynamic value derived from said first input value and said pre-stored secret data from said contactless chip device sufficient to validate the involvement in said transaction of said at least one authorized user at said mobile device without receiving said pre-stored secret data at said mobile device;
after said communicating said dynamic value, detecting that said contactless chip device has been removed from being in proximity to said mobile device, thereby preventing further communication between said contactless chip device and said mobile device; and
communicating authentication data based at least in part on said dynamic value to a user of said mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Generating authentication data for use in a transaction by providing a contactless payment device or smart card configured to communicate with a mobile device, placing the contactless chip card in a proximity to the mobile device to instantiate communication between the contactless chip card and the mobile device, inputting a first input value into the mobile device, communicating data derived from the first input value from the mobile device to the contactless chip card, the contactless chip card converting a set of conversion data, including the first input value, into at least one dynamic value based at least in part on a secret value, communicating the dynamic value from the contactless chip card to the mobile device, and communicating authentication data based at least in part on the dynamic value to a user. In some embodiments the first input value is a Personal Identification Number (PIN), a challenge, or both a PIN and a challenge.
-
Citations
21 Claims
-
1. A method of generating authentication data for use in a transaction comprising:
-
providing a contactless chip device associated with at least one authorized user having pre-stored secret data, configured to communicate with an unsecure mobile device; receiving a first input value into said mobile device; detecting said contactless chip device in proximity to said mobile device and thereafter beginning communication between said contactless chip device and said mobile device; communicating data derived from said first input value from said mobile device to said contactless chip device; receiving a dynamic value derived from said first input value and said pre-stored secret data from said contactless chip device sufficient to validate the involvement in said transaction of said at least one authorized user at said mobile device without receiving said pre-stored secret data at said mobile device; after said communicating said dynamic value, detecting that said contactless chip device has been removed from being in proximity to said mobile device, thereby preventing further communication between said contactless chip device and said mobile device; and communicating authentication data based at least in part on said dynamic value to a user of said mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of operating a mobile device to generate authentication data for use in a transaction comprising:
-
operating said mobile device in accordance with a first mode of operation wherein said mobile device is capable of permitting voice communication between a user of said mobile device and a third party; and operating said mobile device in accordance with a second mode of operation in response to a command, said second mode of operation comprising; receiving a first input value; communicating data derived from said first input value to a contactless chip device associated with at least one authorized user storing secret data via near field communication; receiving a dynamic value derived from said secret data and said data derived from said first input value from said contactless chip device without receiving said secret data from said contactless chip device, the dynamic value being sufficient to validate the involvement in said transaction of said at least one authorized user; and communicating authentication data based at least in part on said dynamic value to a user of said mobile device. - View Dependent Claims (15, 16, 17)
-
-
18. An unsecure mobile device for generating authentication data, comprising:
-
a data entry device capable of receiving data from a user; a communications device capable of communicating with a contactless chip device associated with at least one authorized user; a display capable of displaying data to a user; and a processor programmed with instructions having functionality for; receiving a first input value from said data entry device; communicating data derived from said first input value to a contactless chip device storing secret data and receiving a responsive dynamic value calculated using said secret data and said data derived from said first input value without receiving said secret data from said contactless chip device, said dynamic value being sufficient to validate the involvement in said transaction of said at least one authorized user; and communicating authentication data based at least in part on said responsive dynamic value via said display. - View Dependent Claims (19, 20, 21)
-
Specification