Device and method for identification and authentication
First Claim
Patent Images
1. A method for generating an output code from a user device, comprising:
- receiving, by the user device, an explicit command to generate the output code;
generating, by the user device in response to the explicit command, the output code using a cryptographic key, wherein generating the output code comprises;
comparing an identifier of the holder of the user device with information identifying one or more holders of the user device, the identifier uniquely identifying the holder of the user device;
responsive to the identifier of the holder of the user device matching the information identifying one or more holders of the user device, indicating that the holder of the user device is verified; and
responsive to the holder being verified, generating a dynamic authentication code associated with an identifier of the holder of the user device;
wherein the dynamic authentication code comprises a session identifier, a session counter and a timestamp of a plurality of variant fields, and the dynamic authentication code is variant and unique from other dynamic authentication codes generated by the user device and has characteristics that provide an indicator of potentially fraudulent usage of the user device;
translating the generated output code into a plurality of emulated keystrokes; and
outputting the plurality of emulated keystrokes from the user device to an input of a client device.
4 Assignments
0 Petitions
Accused Products
Abstract
A device for identification and authentication of a remote user connecting to a service over a network includes a cryptographic processor and at least one cryptographic key and storage means, additional processing means and interface means to generate and transmit a unique authentication code as emulated keystrokes through a standard input, means of a client terminal. The code may be transmitted only by an explicit command of the user.
-
Citations
16 Claims
-
1. A method for generating an output code from a user device, comprising:
-
receiving, by the user device, an explicit command to generate the output code; generating, by the user device in response to the explicit command, the output code using a cryptographic key, wherein generating the output code comprises; comparing an identifier of the holder of the user device with information identifying one or more holders of the user device, the identifier uniquely identifying the holder of the user device; responsive to the identifier of the holder of the user device matching the information identifying one or more holders of the user device, indicating that the holder of the user device is verified; and responsive to the holder being verified, generating a dynamic authentication code associated with an identifier of the holder of the user device; wherein the dynamic authentication code comprises a session identifier, a session counter and a timestamp of a plurality of variant fields, and the dynamic authentication code is variant and unique from other dynamic authentication codes generated by the user device and has characteristics that provide an indicator of potentially fraudulent usage of the user device; translating the generated output code into a plurality of emulated keystrokes; and outputting the plurality of emulated keystrokes from the user device to an input of a client device. - View Dependent Claims (2, 3, 4, 5, 6, 12, 13)
-
-
7. A user device for providing an output code, comprising:
-
a computer processor for executing computer program modules; and a non-transitory computer readable storage device storing computer program modules executable to perform steps comprising; receiving an explicit command to generate the output code; generating, in response to the explicit command, the output code using a cryptographic key, wherein generating the output code comprises; comparing an identifier of the holder of the user device with information identifying one or more holders of the user device, the identifier uniquely identifying the holder of the user device; responsive to the identifier of the holder of the user device matching the information identifying one or more holders of the user device, indicating that the holder of the user device is verified; and responsive to the holder being verified, generating a dynamic authentication code associated with an identifier of the holder of the user device; wherein the dynamic authentication code comprises a session identifier, a session counter and a timestamp of a plurality of variant fields, and the dynamic authentication code is variant and unique from other dynamic authentication codes generated by the user device and has characteristics that provide an indicator of potentially fraudulent usage of the user device; translating the generated output code into a plurality of emulated keystrokes; and outputting the plurality of emulated keystrokes from the user device to an input of a client device. - View Dependent Claims (8, 9, 10, 11, 14, 15)
-
-
16. A non-transitory computer readable storage device storing computer program modules executable to perform steps comprising:
-
receiving an explicit command to generate an output code; generating, in response to the explicit command, the output code using a cryptographic key, wherein generating the output code comprises; comparing an identifier of the holder of the user device with information identifying one or more holders of the user device, the identifier uniquely identifying the holder of the user device; responsive to the identifier of the holder of the user device matching the information identifying one or more holders of the user device, indicating that the holder of the user device is verified; and responsive to the holder being verified, generating a dynamic authentication code associated with an identifier of the holder of the user device; wherein the dynamic authentication code comprises a session identifier, a session counter and a timestamp of a plurality of variant fields, and the dynamic authentication code is variant and unique from other dynamic authentication codes generated by the user device and has characteristics that provide an indicator of potentially fraudulent usage of the user device; translating the generated output code into a plurality of emulated keystrokes; and outputting the plurality of emulated keystrokes from the user device to an input of a client device.
-
Specification