NZ755192B2 - Confirming authenticity of a user to a third-party system - Google Patents
Confirming authenticity of a user to a third-party system Download PDFInfo
- Publication number
- NZ755192B2 NZ755192B2 NZ755192A NZ75519218A NZ755192B2 NZ 755192 B2 NZ755192 B2 NZ 755192B2 NZ 755192 A NZ755192 A NZ 755192A NZ 75519218 A NZ75519218 A NZ 75519218A NZ 755192 B2 NZ755192 B2 NZ 755192B2
- Authority
- NZ
- New Zealand
- Prior art keywords
- user
- electronic
- party
- code
- digital identifier
- Prior art date
Links
- 238000012790 confirmation Methods 0.000 claims abstract 9
- 238000000034 method Methods 0.000 claims abstract 9
- 101100166166 Drosophila melanogaster cas gene Proteins 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 claims 1
- 150000002500 ions Chemical class 0.000 claims 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/61—Time-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
Abstract
consumer associated with a user device, such as a personal computer or mobile device, may use the device to interact with another party, such as an online service. For example, a consumer can use his or her user device to begin a transaction to open an account within an online service. To verify the identity of the consumer, the online service may request authenticating information, such as personally identifiable information. But, the consumer may enter the information incorrectly on the user device, or may not have access to all of the requested information at the user device (e.g., if the user is using a mobile device away from home). Consequently, the user may become frustrated with the authentication process, and disengage from the transaction. Further, an online service may receive a fraudulent transaction request from an impersonator who relies on the relative anonymity provided by the Internet to engage in fraudulent online transactions. For example, the impersonator may enter the user’s personal information from a different device that is not associated with the user. But, the online service may not be able to determine that the impersonator’s device is not associated with the user. The present disclosure relates to a telecommunications network server system that provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system, wherein the electronic transaction code is a unique code that indicates the requested transaction, wherein the electronic transaction code is usable by a user device of the user to request that the telecommunication network server device confirms authenticity of the user of the user device. The electronic transaction code and a digital identifier is received from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively separate from each other. The received electronic transaction code and the digital identifier are confirmed by validating the received electronic transaction code by matching the received electronic transaction code with a stored electronic transaction code from a plurality of electronic transaction codes stored in a network attached storage of the telecommunication network server device, and verifying authenticity of the user associated with the digital identifier. Responsive to confirming the electronic transaction code and the digital identifier, transmit via the network communications port a confirmation of authenticity of the user to the third-party electronic device.
Claims (14)
1. A telecommunications network server device comprising: a processor; a network communications port configured for being controlled by the processor: and a non-transitory computer-readable storage device comprising instructions that are executable by the processor to: receive via the k communications port a request from a third-party electronic device that a user is requesting to be authenticated for a transaction between the user and the thirdparty electronic device; in se to the request, transmit via the network ications port an electronic transaction code to the third-party electronic device, wherein the onic transaction code is a unique code that indicates the requested transaction, wherein the electronic transaction code is usable by a user device of the user to t that the telecommunication network server device confirms authenticity of the user of the user device; receive the electronic ction code and a digital identifier from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively te from each other; confirm the received electronic transaction code and the digital identifier, wherein confirming comprises: validating the received electronic transaction code by matching the received onic transaction code with a stored electronic transaction code from a ity of electronic transaction codes stored in a network attached storage of the mmunication network server device, and verifying authenticity of the user associated with the digital identifier; and in response to confirming the onic ction code and the digital identifier, transmit via the network communications port a confirmation of authenticity of the user to the third-party electronic device.
2. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: transmit via the network communications port the digital identifier to the user device associated with the user authenticated by the telecommunications network server device, the digital identifier being onically tethered or bound to the user device; in response to receiving the electronic transaction code and the digital identifier, transmit a demand to the user device for the user to provide confirmatory input to the user device for receipt by the mmunications network server device; and transmit via the network communications port the confirmation of authenticity of the user to the third-party electronic device only subsequent to receiving the confirmatory input.
3. The telecommunications network server device of claim 1, wherein the onic transaction code is a Quick Response (QR) code that is scanable by the user device.
4. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the sor to: monitor an amount of time between transmitting the electronic transaction code to the thirdparty electronic device and receiving the electronic transaction code and the digital identifier from the user device; and in response to determining the amount of time is greater than a pre-selected threshold amount of time, transmit via the network ications port an indication of unsuccessful confirmation of authenticity of the user to the third-party electronic device.
5. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: transmit via the k communications port an obfuscated version of the l fier to the third-party electronic device, the obfuscated version of the digital identifier being usable by the third-party onic device to authenticate the user based on the digital identifier stored in the user device and being not usable to confirm authenticity of the user with the electronic transaction code.
6. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: e from the user device a command to share personal identification information about the user to the third-party electronic device and one or more types of personal identification information to share to the third-party electronic device, n the transaction involves transmission of personal identifiable information of the user to the third party electronic device for completing the transaction; and transmit via the network communications port the personal identification ation about the user as selected from the user device to the party electronic device.
7. The mmunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: receive requests from the third-party electronic devices that are separate from each other, the requests indicating that the user is requesting to be authenticated for transactions with the thirdparty electronic devices; transmit a plurality of electronic ction codes to the third-party electronic devices, the plurality of electronic transaction codes including unique codes such that each unique code ponds to one transaction; receive the plurality of onic transaction codes and the digital identifier from the user device; and in response to confirming the plurality of electronic transaction codes and the digital identifier, transmit confirmations of authenticity of the user to the third-party electronic devices.
8. A method of authenticating a user to a party electronic device, the method comprising operations executable by one or more processors, the operations including: receiving, by a telecommunication network server device via a network communications port a t from a party electronic device that a user is requesting to be authenticated for a transaction between the user and the third-party electronic device; in response to the request, transmitting via the network communications port an electronic transaction code to the third-party electronic device, wherein the electronic ction code is a unique code that indicates the ted transaction, wherein the electronic ction code is usable by a user device of the user to request that the telecommunication network server device ms authenticity of the user of the user device; receiving, by the telecommunication network server device, the electronic transaction code and a digital fier from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively separate from each other; confirming, by the telecommunication network server device, the received electronic transaction code and the digital fier, wherein confirming the l identifier comprises: ting the received electronic transaction code by matching the received electronic transaction code with a stored electronic transaction code from a plurality of electronic transaction codes stored in a network attached storage of the telecommunication network server device, and verifying authenticity of the user associated with the digital identifier; and in response to confirming the electronic transaction code and the digital identifier, transmitting , by the telecommunication network server device, via the k ications port a confirmation of authenticity of the user to the third-party electronic device.
9. The method of claim 8, the operations further including: transmitting via the network communications port the digital identifier to the user device associated with the user, the digital identifier being electronically tethered or bound to the user device; in response to ing the electronic transaction code and the digital identifier, transmitting a demand to the user device for the user to provide confirmatory input to the user device; and transmitting via the network communications port the confirmation of authenticity of the user to the third-party electronic device only uent to receiving the confirmatory input.
10. The method of claim 8, the ions r including: ring an amount of time between transmitting the electronic ction code to the third-party electronic device and receiving the electronic transaction code and the digital identifier from the user device; and in response to determining the amount of time is greater than a pre-selected threshold amount of time, transmitting via the network communications port an indication of unsuccessful confirmation of authenticity of the user to the third-party electronic device.
11. The method of claim 8, the operations further including: transmitting via the network communications port an ated version of the digital identifier to the third-party electronic device, the obfuscated version of the digital identifier being usable by the third-party electronic device to ticate the user based on the digital identifier stored in the user device and being not usable to confirm authenticity of the user with the electronic transaction code.
12. The method of claim 8, the operations further including: receiving from the user device a command to share personal identification information about the user to the third-party electronic device and one or more types of personal fication information to share to the third-party electronic device; and transmitting via the network communications port the personal identification information about the user as selected from the user device to the third-party onic device.
13. The method of claim 8, the operations further including: receiving requests from the third-party electronic devices that are separate from each other, the requests indicating that the user is requesting to be authenticated for transactions with the thirdparty electronic devices; transmitting a plurality of onic transaction codes to the third-party electronic devices, the plurality of onic transaction codes including unique codes such that each unique code corresponds to one transaction; receiving the plurality of electronic transaction codes and the digital identifier from the user device; and in response to ming the plurality of electronic transaction codes and the digital identifier, itting, confirmations of authenticity of the user to the party electronic devices.
14. A non-transitory computer-readable medium embodying program code for authenticating a user to a third-party electronic device, the program code sing instructions which, when executed by a processor, cause the processor to perform operations according to any one of the methods of claims 8 to 13. Ugogisémz N: $2on o_co:om_m_ c8898; w: w: Ego maggog Ugmomsu?o movoo Ego mEEEmE .®_n_ mco?oEseeoog? wow 53mm 8382552 o: {9562 865 Ema E9562 wow 80:60 >tmn_-EE._. vow Now Em: 9:296 Receive, from a third-party electronic device, a request 202 indicating that a user is requesting to be authenticated for a transaction with the third-party electronic device Transmit an electronic transaction code to the third-party 204 electronic device Receive the electronic transaction code and a digital identi?er from a user devrce Electronic YES NO transaction code and l ?er confirmed? 210 212 Transmit a con?rmation of Transmit refusal to con?rm authenticity of the user to the authenticity of the user to the third-party electronic device third-party electronic device EozmoEEEoomE we? @228 co $8 mo 8me 3.5582 mo momé __n_ momé 5% mo E99; mo 335 cozommcmb BmEmo Em o 7639 EmmEo .®_n_ £5332 EEEmE momé é; mo cozommcm: mmcogmmm Em E mEo €3-25 x: ~Zr”: 3E E”, xm: A 02 EEtEm co=mo_Ew£:< E5522 ? ma?m EEom ?
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201762443236P | 2017-01-06 | 2017-01-06 | |
PCT/US2018/012658 WO2018129373A1 (en) | 2017-01-06 | 2018-01-05 | Confirming authenticity of a user to a third-party system |
Publications (2)
Publication Number | Publication Date |
---|---|
NZ755192A NZ755192A (en) | 2024-02-23 |
NZ755192B2 true NZ755192B2 (en) | 2024-05-24 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101384608B1 (en) | Method for providing card payment system using phnone number and system thereof | |
CN104021333B (en) | Mobile security watch bag | |
JP2010525461A5 (en) | ||
CN101087193A (en) | New method for using the mobile number bond with account for identity identification | |
CN104392190B (en) | The method and device of virtual card hypostazation is carried out by mobile terminal device | |
CN106471786B (en) | For transmitting the system and method for voucher | |
KR101896351B1 (en) | Giving and taking about writing with hand and non-face-to-face type electric contract system, and method thereof | |
KR20150011293A (en) | Biometric authentication Electronic Signature Service methods Using an instant messenger | |
CN120019400A (en) | System and method for encrypted context switch authentication between a website and a mobile device | |
KR20150003297A (en) | Method and system using a cyber id to provide secure transactions | |
KR20250091155A (en) | Method and system for authenticatiing user among smart phone users in same place using authentication beacon | |
UA100711C2 (en) | Method for a secure transaction | |
KR101603963B1 (en) | Authentication method using fingerprint information and certification number, user terminal and financial institution server | |
KR20140081041A (en) | Authentication Method and System for Service Connection of Internet Site using Phone Number | |
CN102819799A (en) | Multi-channel safety authenticating system and authenticating method based on U-Key | |
CN105610796A (en) | Method, server and system for transferring user identity recognition information | |
KR101412159B1 (en) | An authentication system using mobile phone and the authentication method | |
KR101748615B1 (en) | Mobile simple payment support device based on the connection information and operating method thereof | |
NZ755192B2 (en) | Confirming authenticity of a user to a third-party system | |
NZ755192A (en) | Confirming authenticity of a user to a third-party system | |
KR101772358B1 (en) | Method for Automatic Identifying Other Companies Application for Registration of Payment Means | |
KR20140003270A (en) | A method and an apparatus providing banking service interlocking with social network service application | |
KR20130012315A (en) | Settlement service method and system using telophone authentication | |
NZ795743B2 (en) | Confirming authenticity of a user to a third-party system | |
KR20070090463A (en) | Micropayment service method using mobile communication short message |