Secure and efficient login and transaction authentication using iphones# and other smart mobile communication devices
First Claim
1. A method of authenticating a user of a mobile communication device, comprising:
- directing, by a first program executing on the mobile communication device, transmission, from the mobile communication device to a security server, of a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site;
receiving, by a second program executing on the mobile communication device, the request for authentication from the security server;
directing, by the second program, presentation by the mobile communication device of the received request for authentication to the user;
receiving, by the second program, a user input to the mobile communication device indicating that the requested authentication should proceed;
directing, by the second program in response to the received user input, transmission, from the mobile communication device to the security server, of an indication that the requested authorization should proceed;
receiving, by the second program from the security server, a personal identification number (PIN), in response to the transmission of the indication that the requested authorization should proceed;
automatically storing, by the second program, the received PIN in a public data store within the mobile communications device;
automatically retrieving, by the first program, the stored PIN from the public data store; and
directing, by the first program, transmission, from the mobile communications device to the network site, of the retrieved PIN, to authenticate the user or transaction to the network site.
9 Assignments
0 Petitions
Accused Products
Abstract
To authenticate a user of a mobile communication device for login or transaction authorization, a first application on the device directs transmission of a request for authentication of the user to a security server. A second application on the device receives the request for authentication from the security server and directs presentation of the received request for authentication to the user by the device. The second application receives a user input to the device indicating that the requested authentication should proceed and in response directs transmission of an indication that the requested authorization should proceed, to the security server. In response to this latter transmission, the second application receives a PIN from the authentication server. The first application directs transmission of the PIN received by the second application to the network site, which validates the transmitted PIN, in order to authenticate the user or the transaction to the network site.
95 Citations
20 Claims
-
1. A method of authenticating a user of a mobile communication device, comprising:
-
directing, by a first program executing on the mobile communication device, transmission, from the mobile communication device to a security server, of a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site; receiving, by a second program executing on the mobile communication device, the request for authentication from the security server; directing, by the second program, presentation by the mobile communication device of the received request for authentication to the user; receiving, by the second program, a user input to the mobile communication device indicating that the requested authentication should proceed; directing, by the second program in response to the received user input, transmission, from the mobile communication device to the security server, of an indication that the requested authorization should proceed; receiving, by the second program from the security server, a personal identification number (PIN), in response to the transmission of the indication that the requested authorization should proceed; automatically storing, by the second program, the received PIN in a public data store within the mobile communications device; automatically retrieving, by the first program, the stored PIN from the public data store; and directing, by the first program, transmission, from the mobile communications device to the network site, of the retrieved PIN, to authenticate the user or transaction to the network site. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An article of manufacture for authenticating a user of a mobile communication device, comprising:
-
non-transitory processor readable storage medium; and a program stored on the storage medium, wherein the stored program is configured to be readable by a processor and thereby cause the processor to operate so as to; receive, from a security server, a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site; direct a display, by the mobile communication device, of the received request for authentication; receive a user input to the mobile communication device indicating that the requested authentication should proceed; direct, in response to the received user input, transmission, from the mobile communication device to the security server, of an indication that the requested authorization should proceed; receive, from the security server, a personal identification number (PIN), in response to the transmission of the indication that the requested authorization should proceed; and automatically store the received PIN in a public data store within the mobile communications device so as to be available to another program executable by the mobile communications device, to thereby facilitate transmission of the received PIN from the mobile communication device to the network site to thereby authenticate the user or the transaction to the network site. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A mobile communication device for authenticating a user, comprising:
-
a security program; another program; a public data store; a display; a user input device; and a processor configured to (1) execute the other program to direct transmission, from the mobile communication device to a security server, of a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site, (2) execute the security program to (a) receive the request for authentication from the security server, (b) direct presentation of the received request for authentication on the display, (c) receive a user input from the user input device indicating that the requested authentication should proceed, (d) direct, to the security server in response to the received user input, transmission of an indication that the requested authorization should proceed, (e) receive, from the security server in response to the transmission of the indication that the requested authorization should proceed, a personal identification number (PIN), and (f) automatically store the received PIN in the public data store, and (3) execute the other program to (a) automatically retrieve the stored PIN from the public data store, and (b) direct transmission, to the network site, of the retrieved PIN to authenticate the user or transaction to the network site. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A security server for authenticating a user of a mobile communications device, comprising:
-
a communications port; and a processor configured to (1) receive, from a first program executing on the mobile communication device via the communications port, a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with the network site, (2) direct transmission, to a second program executing on the mobile communication device via the communications port, of the received request for authentication (3) receive, from the second program via the communications port, an indication that the requested authorization should proceed, and (4) direct transmission, to the second program via the communications port, of a personal identification number (PIN), in response to the received indication that the requested authorization should proceed and to authenticate the user to the network site. - View Dependent Claims (18, 19, 20)
-
Specification