Method and apparatus for the secure identification of the owner of a portable device
First Claim
Patent Images
1. An authentication system for authenticating an individual comprising:
- a portable device, wherein the portable device includes;
a first clock for generating a first time-dependent dynamic variable;
memory for storing a predetermined static variable; and
software for utilizing the first time-dependent dynamic variable and the predetermined static variable, wherein the software is configured to calculate a time-based challenge and a response in accordance with a first and second pre-determined algorithm, wherein the first pre-determined algorithm is used to compute the time-based challenge without utilizing a personal identification number (PIN) and the second pre-determined algorithm is used to compute the response; and
a decryption node, wherein the decryption node includes;
a second clock for generating a second time dependent dynamic variable;
wherein the decryption node is configured to perform the following steps;
receiving an identification of the portable device or an identification of an operator of the portable device;
receiving the challenge and the response displayed by the portable device during the selected time interval;
storing the predetermined static variable of the portable device;
retrieving the predetermined static variable using the received identification;
storing a last event first dynamic variable of the portable device;
retrieving the last event first dynamic variable corresponding to the portable device;
storing a last event receiver time of the portable device;
retrieving the last event receiver time corresponding to the portable device;
utilizing the second time dependent dynamic variable, the predetermined static variable, the last event first dynamic variable, the last event receiver time, and the challenge to calculate at the selected time interval an approximate value of the first time dependent dynamic variable and a presumed response in accordance with a third predetermined algorithm;
comparing the presumed response with the response;
storing the last event receiver time; and
storing the last event first dynamic variable.
5 Assignments
0 Petitions
Accused Products
Abstract
An authentication system is provided that includes a portable device and a decryption node. An individual uses the portable device, such as a portable device like a cell phone to compute a challenge and a response. The challenge and response is sent to a decryption node. In response, the decryption node computes a presumed response and compares the presumed response to the response of the portable device, in order to authenticate the individual associated with the portable device.
-
Citations
4 Claims
-
1. An authentication system for authenticating an individual comprising:
-
a portable device, wherein the portable device includes; a first clock for generating a first time-dependent dynamic variable; memory for storing a predetermined static variable; and software for utilizing the first time-dependent dynamic variable and the predetermined static variable, wherein the software is configured to calculate a time-based challenge and a response in accordance with a first and second pre-determined algorithm, wherein the first pre-determined algorithm is used to compute the time-based challenge without utilizing a personal identification number (PIN) and the second pre-determined algorithm is used to compute the response; and a decryption node, wherein the decryption node includes; a second clock for generating a second time dependent dynamic variable; wherein the decryption node is configured to perform the following steps; receiving an identification of the portable device or an identification of an operator of the portable device; receiving the challenge and the response displayed by the portable device during the selected time interval; storing the predetermined static variable of the portable device; retrieving the predetermined static variable using the received identification; storing a last event first dynamic variable of the portable device; retrieving the last event first dynamic variable corresponding to the portable device; storing a last event receiver time of the portable device; retrieving the last event receiver time corresponding to the portable device; utilizing the second time dependent dynamic variable, the predetermined static variable, the last event first dynamic variable, the last event receiver time, and the challenge to calculate at the selected time interval an approximate value of the first time dependent dynamic variable and a presumed response in accordance with a third predetermined algorithm; comparing the presumed response with the response; storing the last event receiver time; and storing the last event first dynamic variable.
-
-
2. The authentication system of claim 1, wherein the individual communicates the identification of the portable device, the challenge, and the response to the decryption node.
-
3. The authentication system of claim 1, wherein the authentication system is for authenticating a signor of a document, wherein the portable device is further configured to perform the step of adding, by the signor of the document, a time, a date and the challenge and the response to the document.
-
4. The authentication system of claim 3, wherein the decryption node is operated by an operator, wherein the operator receives the document.
Specification