[go: up one dir, main page]

NZ755192B2 - Confirming authenticity of a user to a third-party system - Google Patents

Confirming authenticity of a user to a third-party system Download PDF

Info

Publication number
NZ755192B2
NZ755192B2 NZ755192A NZ75519218A NZ755192B2 NZ 755192 B2 NZ755192 B2 NZ 755192B2 NZ 755192 A NZ755192 A NZ 755192A NZ 75519218 A NZ75519218 A NZ 75519218A NZ 755192 B2 NZ755192 B2 NZ 755192B2
Authority
NZ
New Zealand
Prior art keywords
user
electronic
party
code
digital identifier
Prior art date
Application number
NZ755192A
Other versions
NZ755192A (en
Inventor
Ravindra Bijlani
Helcio Cano
Rob Harris
Rich Huffman
Richard Michaelson
Esther Pigg
Marty Romain
Zyl Vivian Van
Original Assignee
Equifax Inc
Fidelity Information Services Llc
Filing date
Publication date
Application filed by Equifax Inc, Fidelity Information Services Llc filed Critical Equifax Inc
Priority claimed from PCT/US2018/012658 external-priority patent/WO2018129373A1/en
Publication of NZ755192A publication Critical patent/NZ755192A/en
Publication of NZ755192B2 publication Critical patent/NZ755192B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/102Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Abstract

consumer associated with a user device, such as a personal computer or mobile device, may use the device to interact with another party, such as an online service. For example, a consumer can use his or her user device to begin a transaction to open an account within an online service. To verify the identity of the consumer, the online service may request authenticating information, such as personally identifiable information. But, the consumer may enter the information incorrectly on the user device, or may not have access to all of the requested information at the user device (e.g., if the user is using a mobile device away from home). Consequently, the user may become frustrated with the authentication process, and disengage from the transaction. Further, an online service may receive a fraudulent transaction request from an impersonator who relies on the relative anonymity provided by the Internet to engage in fraudulent online transactions. For example, the impersonator may enter the user’s personal information from a different device that is not associated with the user. But, the online service may not be able to determine that the impersonator’s device is not associated with the user. The present disclosure relates to a telecommunications network server system that provides a digital identifier to a user device. The digital identifier may include identification data corresponding to a user of the user device. In addition, the telecommunications network server system receives, from one or more third-party systems, requests to authenticate the user for an electronic transaction with the respective third-party system. The telecommunications network server system provides a unique electronic transaction code to each third-party system, wherein the electronic transaction code is a unique code that indicates the requested transaction, wherein the electronic transaction code is usable by a user device of the user to request that the telecommunication network server device confirms authenticity of the user of the user device. The electronic transaction code and a digital identifier is received from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively separate from each other. The received electronic transaction code and the digital identifier are confirmed by validating the received electronic transaction code by matching the received electronic transaction code with a stored electronic transaction code from a plurality of electronic transaction codes stored in a network attached storage of the telecommunication network server device, and verifying authenticity of the user associated with the digital identifier. Responsive to confirming the electronic transaction code and the digital identifier, transmit via the network communications port a confirmation of authenticity of the user to the third-party electronic device.

Claims (14)

What is claimed is:
1. A telecommunications network server device comprising: a processor; a network communications port configured for being controlled by the processor: and a non-transitory computer-readable storage device comprising instructions that are executable by the processor to: receive via the k communications port a request from a third-party electronic device that a user is requesting to be authenticated for a transaction between the user and the thirdparty electronic device; in se to the request, transmit via the network ications port an electronic transaction code to the third-party electronic device, wherein the onic transaction code is a unique code that indicates the requested transaction, wherein the electronic transaction code is usable by a user device of the user to t that the telecommunication network server device confirms authenticity of the user of the user device; receive the electronic ction code and a digital identifier from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively te from each other; confirm the received electronic transaction code and the digital identifier, wherein confirming comprises: validating the received electronic transaction code by matching the received onic transaction code with a stored electronic transaction code from a ity of electronic transaction codes stored in a network attached storage of the mmunication network server device, and verifying authenticity of the user associated with the digital identifier; and in response to confirming the onic ction code and the digital identifier, transmit via the network communications port a confirmation of authenticity of the user to the third-party electronic device.
2. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: transmit via the network communications port the digital identifier to the user device associated with the user authenticated by the telecommunications network server device, the digital identifier being onically tethered or bound to the user device; in response to receiving the electronic transaction code and the digital identifier, transmit a demand to the user device for the user to provide confirmatory input to the user device for receipt by the mmunications network server device; and transmit via the network communications port the confirmation of authenticity of the user to the third-party electronic device only subsequent to receiving the confirmatory input.
3. The telecommunications network server device of claim 1, wherein the onic transaction code is a Quick Response (QR) code that is scanable by the user device.
4. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the sor to: monitor an amount of time between transmitting the electronic transaction code to the thirdparty electronic device and receiving the electronic transaction code and the digital identifier from the user device; and in response to determining the amount of time is greater than a pre-selected threshold amount of time, transmit via the network ications port an indication of unsuccessful confirmation of authenticity of the user to the third-party electronic device.
5. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: transmit via the k communications port an obfuscated version of the l fier to the third-party electronic device, the obfuscated version of the digital identifier being usable by the third-party onic device to authenticate the user based on the digital identifier stored in the user device and being not usable to confirm authenticity of the user with the electronic transaction code.
6. The telecommunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: e from the user device a command to share personal identification information about the user to the third-party electronic device and one or more types of personal identification information to share to the third-party electronic device, n the transaction involves transmission of personal identifiable information of the user to the third party electronic device for completing the transaction; and transmit via the network communications port the personal identification ation about the user as selected from the user device to the party electronic device.
7. The mmunications network server device of claim 1, wherein the non-transitory computer-readable storage device includes instructions that are executable by the processor to: receive requests from the third-party electronic devices that are separate from each other, the requests indicating that the user is requesting to be authenticated for transactions with the thirdparty electronic devices; transmit a plurality of electronic ction codes to the third-party electronic devices, the plurality of electronic transaction codes including unique codes such that each unique code ponds to one transaction; receive the plurality of onic transaction codes and the digital identifier from the user device; and in response to confirming the plurality of electronic transaction codes and the digital identifier, transmit confirmations of authenticity of the user to the third-party electronic devices.
8. A method of authenticating a user to a party electronic device, the method comprising operations executable by one or more processors, the operations including: receiving, by a telecommunication network server device via a network communications port a t from a party electronic device that a user is requesting to be authenticated for a transaction between the user and the third-party electronic device; in response to the request, transmitting via the network communications port an electronic transaction code to the third-party electronic device, wherein the electronic ction code is a unique code that indicates the ted transaction, wherein the electronic ction code is usable by a user device of the user to request that the telecommunication network server device ms authenticity of the user of the user device; receiving, by the telecommunication network server device, the electronic transaction code and a digital fier from a user device associated with the user, the digital identifier being storable in encrypted form in the user device and usable to authenticate the user for transactions with third-party electronic devices that are communicatively separate from each other; confirming, by the telecommunication network server device, the received electronic transaction code and the digital fier, wherein confirming the l identifier comprises: ting the received electronic transaction code by matching the received electronic transaction code with a stored electronic transaction code from a plurality of electronic transaction codes stored in a network attached storage of the telecommunication network server device, and verifying authenticity of the user associated with the digital identifier; and in response to confirming the electronic transaction code and the digital identifier, transmitting , by the telecommunication network server device, via the k ications port a confirmation of authenticity of the user to the third-party electronic device.
9. The method of claim 8, the operations further including: transmitting via the network communications port the digital identifier to the user device associated with the user, the digital identifier being electronically tethered or bound to the user device; in response to ing the electronic transaction code and the digital identifier, transmitting a demand to the user device for the user to provide confirmatory input to the user device; and transmitting via the network communications port the confirmation of authenticity of the user to the third-party electronic device only uent to receiving the confirmatory input.
10. The method of claim 8, the ions r including: ring an amount of time between transmitting the electronic ction code to the third-party electronic device and receiving the electronic transaction code and the digital identifier from the user device; and in response to determining the amount of time is greater than a pre-selected threshold amount of time, transmitting via the network communications port an indication of unsuccessful confirmation of authenticity of the user to the third-party electronic device.
11. The method of claim 8, the operations further including: transmitting via the network communications port an ated version of the digital identifier to the third-party electronic device, the obfuscated version of the digital identifier being usable by the third-party electronic device to ticate the user based on the digital identifier stored in the user device and being not usable to confirm authenticity of the user with the electronic transaction code.
12. The method of claim 8, the operations further including: receiving from the user device a command to share personal identification information about the user to the third-party electronic device and one or more types of personal fication information to share to the third-party electronic device; and transmitting via the network communications port the personal identification information about the user as selected from the user device to the third-party onic device.
13. The method of claim 8, the operations further including: receiving requests from the third-party electronic devices that are separate from each other, the requests indicating that the user is requesting to be authenticated for transactions with the thirdparty electronic devices; transmitting a plurality of onic transaction codes to the third-party electronic devices, the plurality of onic transaction codes including unique codes such that each unique code corresponds to one transaction; receiving the plurality of electronic transaction codes and the digital identifier from the user device; and in response to ming the plurality of electronic transaction codes and the digital identifier, itting, confirmations of authenticity of the user to the party electronic devices.
14. A non-transitory computer-readable medium embodying program code for authenticating a user to a third-party electronic device, the program code sing instructions which, when executed by a processor, cause the processor to perform operations according to any one of the methods of claims 8 to 13. Ugogisémz N: $2on o_co:om_m_ c8898; w: w: Ego maggog Ugmomsu?o movoo Ego mEEEmE .®_n_ mco?oEseeoog? wow 53mm 8382552 o: {9562 865 Ema E9562 wow 80:60 >tmn_-EE._. vow Now Em: 9:296 Receive, from a third-party electronic device, a request 202 indicating that a user is requesting to be authenticated for a transaction with the third-party electronic device Transmit an electronic transaction code to the third-party 204 electronic device Receive the electronic transaction code and a digital identi?er from a user devrce Electronic YES NO transaction code and l ?er confirmed? 210 212 Transmit a con?rmation of Transmit refusal to con?rm authenticity of the user to the authenticity of the user to the third-party electronic device third-party electronic device EozmoEEEoomE we? @228 co $8 mo 8me 3.5582 mo momé __n_ momé 5% mo E99; mo 335 cozommcmb BmEmo Em o 7639 EmmEo .®_n_ £5332 EEEmE momé é; mo cozommcm: mmcogmmm Em E mEo €3-25 x: ~Zr”: 3E E”, xm: A 02 EEtEm co=mo_Ew£:< E5522 ? ma?m EEom ?
NZ755192A 2018-01-05 Confirming authenticity of a user to a third-party system NZ755192B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201762443236P 2017-01-06 2017-01-06
PCT/US2018/012658 WO2018129373A1 (en) 2017-01-06 2018-01-05 Confirming authenticity of a user to a third-party system

Publications (2)

Publication Number Publication Date
NZ755192A NZ755192A (en) 2024-02-23
NZ755192B2 true NZ755192B2 (en) 2024-05-24

Family

ID=

Similar Documents

Publication Publication Date Title
KR101384608B1 (en) Method for providing card payment system using phnone number and system thereof
CN104021333B (en) Mobile security watch bag
JP2010525461A5 (en)
CN101087193A (en) New method for using the mobile number bond with account for identity identification
CN104392190B (en) The method and device of virtual card hypostazation is carried out by mobile terminal device
CN106471786B (en) For transmitting the system and method for voucher
KR101896351B1 (en) Giving and taking about writing with hand and non-face-to-face type electric contract system, and method thereof
KR20150011293A (en) Biometric authentication Electronic Signature Service methods Using an instant messenger
CN120019400A (en) System and method for encrypted context switch authentication between a website and a mobile device
KR20150003297A (en) Method and system using a cyber id to provide secure transactions
KR20250091155A (en) Method and system for authenticatiing user among smart phone users in same place using authentication beacon
UA100711C2 (en) Method for a secure transaction
KR101603963B1 (en) Authentication method using fingerprint information and certification number, user terminal and financial institution server
KR20140081041A (en) Authentication Method and System for Service Connection of Internet Site using Phone Number
CN102819799A (en) Multi-channel safety authenticating system and authenticating method based on U-Key
CN105610796A (en) Method, server and system for transferring user identity recognition information
KR101412159B1 (en) An authentication system using mobile phone and the authentication method
KR101748615B1 (en) Mobile simple payment support device based on the connection information and operating method thereof
NZ755192B2 (en) Confirming authenticity of a user to a third-party system
NZ755192A (en) Confirming authenticity of a user to a third-party system
KR101772358B1 (en) Method for Automatic Identifying Other Companies Application for Registration of Payment Means
KR20140003270A (en) A method and an apparatus providing banking service interlocking with social network service application
KR20130012315A (en) Settlement service method and system using telophone authentication
NZ795743B2 (en) Confirming authenticity of a user to a third-party system
KR20070090463A (en) Micropayment service method using mobile communication short message